|Date: (C)2017-10-30 (M)2017-11-15|| |
It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.
|CVSS Score: 3.5||Access Vector: NETWORK|
|Exploit Score: 6.8||Access Complexity: MEDIUM|
|Impact Score: 2.9||Authentication: SINGLE_INSTANCE|
| ||Confidentiality: NONE|
| ||Integrity: PARTIAL|
| ||Availability: NONE|