CVE-2017-12158

It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:redhat:single_sign_on:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign_on:7.1:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:keycloak:keycloak:-:*:*:*:*:*:*:*

Information

Published : 2017-10-26 10:29

Updated : 2019-10-09 16:22


NVD link : CVE-2017-12158

Mitre link : CVE-2017-12158


JSON object : View

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Advertisement

dedicated server usa

Products Affected

keycloak

  • keycloak

redhat

  • enterprise_linux_server
  • single_sign_on