Skip to content

Keycloak Cross-site Scripting (XSS) via assertion consumer service URL in SAML POST-binding flow

Moderate severity GitHub Reviewed Published Apr 17, 2024 in keycloak/keycloak • Updated Apr 25, 2024

Package

maven org.keycloak:keycloak-services (Maven)

Affected versions

< 22.0.10
>= 23.0.0, < 24.0.3

Patched versions

22.0.10
24.0.3

Description

Keycloak allows arbitrary URLs as SAML Assertion Consumer Service POST Binding URL (ACS), including JavaScript URIs (javascript:).

Allowing JavaScript URIs in combination with HTML forms leads to JavaScript evaluation in the context of the embedding origin on form submission.

Acknowledgements:

Special thanks to Lauritz Holtmann for reporting this issue and helping us improve our project.

References

@abstractj abstractj published to keycloak/keycloak Apr 17, 2024
Published to the GitHub Advisory Database Apr 17, 2024
Reviewed Apr 17, 2024
Published by the National Vulnerability Database Apr 25, 2024
Last updated Apr 25, 2024

Severity

Moderate
6.0
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
High
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L

CVE ID

CVE-2023-6717

GHSA ID

GHSA-8rmm-gm28-pj8q

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.