CVE-2017-12158

Impact:
Moderate
Public Date:
2017-10-17
CWE:
CWE-444
Bugzilla:
1489161: CVE-2017-12158 keycloak: reflected XSS using HOST header
It was found that keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.

Find out more about CVE-2017-12158 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 5.4
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Unchanged
Confidentiality Low
Integrity Impact Low
Availability Impact None

Red Hat Security Errata

Platform Errata Release Date
Red Hat Single Sign-On 7.1 for RHEL 6 Server (rh-sso7-keycloak) RHSA-2017:2904 2017-10-17
Red Hat Single Sign-On 7.1 RHSA-2017:2906 2017-10-17
Red Hat Single Sign-On 7.1 for RHEL 7 Server (rh-sso7-keycloak) RHSA-2017:2905 2017-10-17

Affected Packages State

Platform Package State
Red Hat Single Sign-On 7 keycloak Will not fix
Red Hat Mobile Application Platform On-Premise 4 keycloak Will not fix

Acknowledgements

Red Hat would like to thank Mykhailo Stadnyk (Playtech) for reporting this issue.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.