CVE-2023-6134

A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.
References
Link Resource
https://access.redhat.com/errata/RHSA-2023:7854 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7855 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7856 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7857 Exploit Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7858 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7860 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7861 Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:0798
https://access.redhat.com/errata/RHSA-2024:0799
https://access.redhat.com/errata/RHSA-2024:0800
https://access.redhat.com/errata/RHSA-2024:0801
https://access.redhat.com/errata/RHSA-2024:0804
https://access.redhat.com/security/cve/CVE-2023-6134 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2249673 Issue Tracking
https://access.redhat.com/errata/RHSA-2023:7854 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7855 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7856 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7857 Exploit Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7858 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7860 Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:7861 Vendor Advisory
https://access.redhat.com/errata/RHSA-2024:0798
https://access.redhat.com/errata/RHSA-2024:0799
https://access.redhat.com/errata/RHSA-2024:0800
https://access.redhat.com/errata/RHSA-2024:0801
https://access.redhat.com/errata/RHSA-2024:0804
https://access.redhat.com/security/cve/CVE-2023-6134 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2249673 Issue Tracking
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
OR cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*

History

21 Nov 2024, 08:43

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : 4.6
References () https://access.redhat.com/errata/RHSA-2023:7854 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:7854 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7855 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:7855 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7856 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:7856 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7857 - Exploit, Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:7857 - Exploit, Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7858 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:7858 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7860 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:7860 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7861 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:7861 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2024:0798 - () https://access.redhat.com/errata/RHSA-2024:0798 -
References () https://access.redhat.com/errata/RHSA-2024:0799 - () https://access.redhat.com/errata/RHSA-2024:0799 -
References () https://access.redhat.com/errata/RHSA-2024:0800 - () https://access.redhat.com/errata/RHSA-2024:0800 -
References () https://access.redhat.com/errata/RHSA-2024:0801 - () https://access.redhat.com/errata/RHSA-2024:0801 -
References () https://access.redhat.com/errata/RHSA-2024:0804 - () https://access.redhat.com/errata/RHSA-2024:0804 -
References () https://access.redhat.com/security/cve/CVE-2023-6134 - Vendor Advisory () https://access.redhat.com/security/cve/CVE-2023-6134 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2249673 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=2249673 - Issue Tracking

14 Feb 2024, 03:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2024:0799 -
  • () https://access.redhat.com/errata/RHSA-2024:0800 -
  • () https://access.redhat.com/errata/RHSA-2024:0801 -
  • () https://access.redhat.com/errata/RHSA-2024:0804 -
  • () https://access.redhat.com/errata/RHSA-2024:0798 -

02 Feb 2024, 16:18

Type Values Removed Values Added
CWE CWE-74
First Time Redhat enterprise Linux
Redhat openshift Container Platform For Power
Redhat openshift Container Platform Ibm Z Systems
Redhat openshift Container Platform
CPE cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.9:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
References () https://access.redhat.com/errata/RHSA-2023:7857 - Vendor Advisory () https://access.redhat.com/errata/RHSA-2023:7857 - Exploit, Vendor Advisory

20 Dec 2023, 20:29

Type Values Removed Values Added
References () https://access.redhat.com/errata/RHSA-2023:7855 - () https://access.redhat.com/errata/RHSA-2023:7855 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7856 - () https://access.redhat.com/errata/RHSA-2023:7856 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7861 - () https://access.redhat.com/errata/RHSA-2023:7861 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7857 - () https://access.redhat.com/errata/RHSA-2023:7857 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2023-6134 - () https://access.redhat.com/security/cve/CVE-2023-6134 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2249673 - () https://bugzilla.redhat.com/show_bug.cgi?id=2249673 - Issue Tracking
References () https://access.redhat.com/errata/RHSA-2023:7860 - () https://access.redhat.com/errata/RHSA-2023:7860 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7854 - () https://access.redhat.com/errata/RHSA-2023:7854 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2023:7858 - () https://access.redhat.com/errata/RHSA-2023:7858 - Vendor Advisory
CPE cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*
CWE CWE-79
CWE-74
First Time Redhat
Redhat keycloak
Redhat single Sign-on
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4

14 Dec 2023, 22:44

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-14 22:15

Updated : 2024-11-21 08:43


NVD link : CVE-2023-6134

Mitre link : CVE-2023-6134

CVE.ORG link : CVE-2023-6134


JSON object : View

Products Affected

redhat

  • openshift_container_platform
  • openshift_container_platform_for_power
  • openshift_container_platform_ibm_z_systems
  • keycloak
  • enterprise_linux
  • single_sign-on
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')