{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30786?format=json","vulnerability_id":"VCID-hagn-q75r-xfhs","summary":"Duplicate Advisory: Keycloak vulnerable to reflected XSS via wildcard in OIDC redirect_uri\n## Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-cvg2-7c3j-g36j. This link is maintained to preserve external references.\n\n## Original Description\nA flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.","aliases":[{"alias":"GHSA-5968-qw33-h47j"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/71580?format=json","purl":"pkg:maven/org.keycloak/keycloak-services@23.0.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2dgp-xdrz-q7dv"},{"vulnerability":"VCID-2dgt-7k4f-fyce"},{"vulnerability":"VCID-3sh8-6vsc-1uae"},{"vulnerability":"VCID-41hy-n7tz-3bee"},{"vulnerability":"VCID-5f8r-n4mm-y3g6"},{"vulnerability":"VCID-5vwq-aqk5-nkh9"},{"vulnerability":"VCID-5zh4-963a-q3gp"},{"vulnerability":"VCID-6hy1-r23s-cbhy"},{"vulnerability":"VCID-6n3p-8y8x-bbfc"},{"vulnerability":"VCID-7c1j-kcbb-v3f1"},{"vulnerability":"VCID-91gs-k267-3kbq"},{"vulnerability":"VCID-9wzh-7ych-y7c6"},{"vulnerability":"VCID-ajcu-s4zn-63cn"},{"vulnerability":"VCID-auwb-hcuv-gygf"},{"vulnerability":"VCID-bhrr-nn9f-7udu"},{"vulnerability":"VCID-by72-dvnw-m3gu"},{"vulnerability":"VCID-c11x-8jte-fuds"},{"vulnerability":"VCID-cdsa-wmby-ebbq"},{"vulnerability":"VCID-cf37-8d6y-r3d5"},{"vulnerability":"VCID-cgf7-vbkd-cua6"},{"vulnerability":"VCID-d2rd-6u56-yfd8"},{"vulnerability":"VCID-d6ku-ys87-cqh4"},{"vulnerability":"VCID-e4ub-v4ef-affb"},{"vulnerability":"VCID-ezqk-pyhr-5ffj"},{"vulnerability":"VCID-gn2j-ra6w-r3et"},{"vulnerability":"VCID-gnxr-2t9g-4ye4"},{"vulnerability":"VCID-gzz6-md9v-b3em"},{"vulnerability":"VCID-htax-rbrs-mbdu"},{"vulnerability":"VCID-j4ar-u2rr-qkfu"},{"vulnerability":"VCID-ju1d-vwgb-bqbn"},{"vulnerability":"VCID-k4xv-x1pt-guce"},{"vulnerability":"VCID-m3uj-4mag-kbf2"},{"vulnerability":"VCID-mdkf-3bgs-w7dm"},{"vulnerability":"VCID-mku9-3bpp-aqbk"},{"vulnerability":"VCID-n76a-pfh2-57bn"},{"vulnerability":"VCID-nxhc-rp71-hbdk"},{"vulnerability":"VCID-pjgz-fa5h-tkfh"},{"vulnerability":"VCID-qgbq-s33g-d7af"},{"vulnerability":"VCID-sgbm-r5mm-sbbx"},{"vulnerability":"VCID-szbr-v2vq-3kbn"},{"vulnerability":"VCID-ugtk-3bjv-s3a4"},{"vulnerability":"VCID-uuf2-u7xh-uuef"},{"vulnerability":"VCID-v77w-st1u-pfe6"},{"vulnerability":"VCID-v7r6-3873-77dc"},{"vulnerability":"VCID-ver5-9t6m-c3ef"},{"vulnerability":"VCID-vstv-ec14-quc5"},{"vulnerability":"VCID-w5f1-xryr-fucq"},{"vulnerability":"VCID-whsx-d6an-hkdm"},{"vulnerability":"VCID-x4aw-v76q-vbdc"},{"vulnerability":"VCID-xd7x-aevv-cfcp"},{"vulnerability":"VCID-xfnw-15sz-zyfr"},{"vulnerability":"VCID-y1h3-yyn9-53fr"},{"vulnerability":"VCID-ysyw-rgyv-bkhj"},{"vulnerability":"VCID-z2bw-n4x2-a7gj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.keycloak/keycloak-services@23.0.3"}],"affected_packages":[],"references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7854","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2023:7854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7855","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2023:7855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7856","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2023:7856"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7857","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2023:7857"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7858","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2023:7858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7860","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2023:7860"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7861","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2023:7861"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2249673","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2249673"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-6134","reference_id":"CVE-2023-6134","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/security/cve/CVE-2023-6134"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6134","reference_id":"CVE-2023-6134","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6134"},{"reference_url":"https://github.com/advisories/GHSA-5968-qw33-h47j","reference_id":"GHSA-5968-qw33-h47j","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-5968-qw33-h47j"}],"weaknesses":[{"cwe_id":75,"name":"Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)","description":"The product does not adequately filter user-controlled input for special elements with control implications."}],"exploits":[],"severity_range_score":"4.0 - 6.9","exploitability":null,"weighted_severity":null,"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hagn-q75r-xfhs"}