CVE-2022-2256
ADVISORY - githubSummary
A Stored XSS vulnerability was reported in the Keycloak Security mailing list, affecting all the versions of Keycloak, including the latest release (18.0.1). The vulnerability allows a privileged attacker to execute malicious scripts in the admin console, abusing of the default roles functionality.
CVSS 3.1 - 3.8
Vector String: AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
Vector Clarification:
- User interaction is not required as the admin console is regularly used during an administrator's work
- The scope is unchanged since the admin console web application is both the vulnerable component and where the exploit executes
Credits
Aytaç Kalıncı, Ilker Bulgurcu, Yasin Yılmaz (@aytackalinci, @smileronin, @yasinyilmaz) - NETAŞ PENTEST TEAM
Common Weakness Enumeration (CWE)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in