cvelist/2020/1xxx/CVE-2020-1697.json

72 lines
2.2 KiB
JSON
Raw Normal View History

2019-11-27 17:00:59 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-1697",
2020-02-10 15:01:24 +00:00
"ASSIGNER": "secalert@redhat.com",
"STATE": "PUBLIC"
2020-02-07 16:23:03 -03:00
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Red Hat",
"product": {
"product_data": [
{
"product_name": "keycloak",
"version": {
"version_data": [
{
"version_value": "All versions before 9.0.0"
2020-02-07 16:23:03 -03:00
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1697",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1697",
"refsource": "CONFIRM"
}
]
2019-11-27 17:00:59 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "It was found in all keycloak versions before 9.0.0 that links to external applications (Application Links) in the admin console are not validated properly and could allow Stored XSS attacks. An authed malicious user could create URLs to trick users in other realms, and possibly conduct further attacks."
2019-11-27 17:00:59 +00:00
}
]
2020-02-07 16:23:03 -03:00
},
"impact": {
"cvss": [
[
{
"vectorString": "6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
]
]
2019-11-27 17:00:59 +00:00
}
2020-02-10 15:01:24 +00:00
}