Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/30786?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30786?format=api", "vulnerability_id": "VCID-hagn-q75r-xfhs", "summary": "Duplicate Advisory: Keycloak vulnerable to reflected XSS via wildcard in OIDC redirect_uri\n## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-cvg2-7c3j-g36j. This link is maintained to preserve external references.\n\n## Original Description\nA flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.", "aliases": [ { "alias": "GHSA-5968-qw33-h47j" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/71580?format=api", "purl": "pkg:maven/org.keycloak/keycloak-services@23.0.3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2dgp-xdrz-q7dv" }, { "vulnerability": "VCID-2dgt-7k4f-fyce" }, { "vulnerability": "VCID-3sh8-6vsc-1uae" }, { "vulnerability": "VCID-41hy-n7tz-3bee" }, { "vulnerability": "VCID-5f8r-n4mm-y3g6" }, { "vulnerability": "VCID-5vwq-aqk5-nkh9" }, { "vulnerability": "VCID-5zh4-963a-q3gp" }, { "vulnerability": "VCID-6hy1-r23s-cbhy" }, { "vulnerability": "VCID-6n3p-8y8x-bbfc" }, { "vulnerability": "VCID-7c1j-kcbb-v3f1" }, { "vulnerability": "VCID-91gs-k267-3kbq" }, { "vulnerability": "VCID-9wzh-7ych-y7c6" }, { "vulnerability": "VCID-ajcu-s4zn-63cn" }, { "vulnerability": "VCID-auwb-hcuv-gygf" }, { "vulnerability": "VCID-bhrr-nn9f-7udu" }, { "vulnerability": "VCID-by72-dvnw-m3gu" }, { "vulnerability": "VCID-c11x-8jte-fuds" }, { "vulnerability": "VCID-cdsa-wmby-ebbq" }, { "vulnerability": "VCID-cf37-8d6y-r3d5" }, { "vulnerability": "VCID-cgf7-vbkd-cua6" }, { "vulnerability": "VCID-d2rd-6u56-yfd8" }, { "vulnerability": "VCID-d6ku-ys87-cqh4" }, { "vulnerability": "VCID-e4ub-v4ef-affb" }, { "vulnerability": "VCID-ezqk-pyhr-5ffj" }, { "vulnerability": "VCID-gn2j-ra6w-r3et" }, { "vulnerability": "VCID-gnxr-2t9g-4ye4" }, { "vulnerability": "VCID-gzz6-md9v-b3em" }, { "vulnerability": "VCID-htax-rbrs-mbdu" }, { "vulnerability": "VCID-j4ar-u2rr-qkfu" }, { "vulnerability": "VCID-ju1d-vwgb-bqbn" }, { "vulnerability": "VCID-k4xv-x1pt-guce" }, { "vulnerability": "VCID-m3uj-4mag-kbf2" }, { "vulnerability": "VCID-mdkf-3bgs-w7dm" }, { "vulnerability": "VCID-mku9-3bpp-aqbk" }, { "vulnerability": "VCID-n76a-pfh2-57bn" }, { "vulnerability": "VCID-nxhc-rp71-hbdk" }, { "vulnerability": "VCID-pjgz-fa5h-tkfh" }, { "vulnerability": "VCID-qgbq-s33g-d7af" }, { "vulnerability": "VCID-sgbm-r5mm-sbbx" }, { "vulnerability": "VCID-szbr-v2vq-3kbn" }, { "vulnerability": "VCID-ugtk-3bjv-s3a4" }, { "vulnerability": "VCID-uuf2-u7xh-uuef" }, { "vulnerability": "VCID-v77w-st1u-pfe6" }, { "vulnerability": "VCID-v7r6-3873-77dc" }, { "vulnerability": "VCID-ver5-9t6m-c3ef" }, { "vulnerability": "VCID-vstv-ec14-quc5" }, { "vulnerability": "VCID-w5f1-xryr-fucq" }, { "vulnerability": "VCID-whsx-d6an-hkdm" }, { "vulnerability": "VCID-x4aw-v76q-vbdc" }, { "vulnerability": "VCID-xd7x-aevv-cfcp" }, { "vulnerability": "VCID-xfnw-15sz-zyfr" }, { "vulnerability": "VCID-y1h3-yyn9-53fr" }, { "vulnerability": "VCID-ysyw-rgyv-bkhj" }, { "vulnerability": "VCID-z2bw-n4x2-a7gj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.keycloak/keycloak-services@23.0.3" } ], "affected_packages": [], "references": [ { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7854", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7854" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7855", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7856", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7856" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7857", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7857" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7858", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7858" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7860", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7860" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7861", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2023:7861" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249673", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249673" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2023-6134", "reference_id": "CVE-2023-6134", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/security/cve/CVE-2023-6134" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6134", "reference_id": "CVE-2023-6134", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6134" }, { "reference_url": "https://github.com/advisories/GHSA-5968-qw33-h47j", "reference_id": "GHSA-5968-qw33-h47j", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-5968-qw33-h47j" } ], "weaknesses": [ { "cwe_id": 75, "name": "Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)", "description": "The product does not adequately filter user-controlled input for special elements with control implications." } ], "exploits": [], "severity_range_score": "4.0 - 6.9", "exploitability": null, "weighted_severity": null, "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hagn-q75r-xfhs" }