CVE-2020-1697

It was found in all keycloak versions before 9.0.0 that links to external applications (Application Links) in the admin console are not validated properly and could allow Stored XSS attacks. An authed malicious user could create URLs to trick users in other realms, and possibly conduct further attacks.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1697 Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1697 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:single_sign-on:7.3:*:*:*:*:*:*:*

History

21 Nov 2024, 05:11

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1697 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1697 - Issue Tracking, Third Party Advisory
CVSS v2 : 3.5
v3 : 5.4
v2 : 3.5
v3 : 6.1

Information

Published : 2020-02-10 15:15

Updated : 2024-11-21 05:11


NVD link : CVE-2020-1697

Mitre link : CVE-2020-1697

CVE.ORG link : CVE-2020-1697


JSON object : View

Products Affected

redhat

  • single_sign-on
  • keycloak
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')