cve/2018/CVE-2018-14655.md

20 lines
855 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2018-14655](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14655)
![](https://img.shields.io/static/v1?label=Product&message=keycloak&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%203.4.3.Final%2C%204.0.0.Beta2%2C%204.3.0.Final%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79&color=brighgreen)
### Description
A flaw was found in Keycloak 3.4.3.Final, 4.0.0.Beta2, 4.3.0.Final. When using 'response_mode=form_post' it is possible to inject arbitrary Javascript-Code via the 'state'-parameter in the authentication URL. This allows an XSS-Attack upon succesfully login.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NeuronAddict/keycloak-scanner
- https://github.com/jm33-m0/go-lpe