CVE-2021-20195

A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1919143 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*

History

05 Aug 2022, 15:21

Type Values Removed Values Added
CWE CWE-20 CWE-116

02 Jun 2021, 15:30

Type Values Removed Values Added
CPE cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 9.6
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1919143 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1919143 - Issue Tracking, Vendor Advisory

28 May 2021, 11:37

Type Values Removed Values Added
CWE CWE-20

28 May 2021, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-28 11:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-20195

Mitre link : CVE-2021-20195

CVE.ORG link : CVE-2021-20195


JSON object : View

Products Affected

redhat

  • keycloak
CWE
CWE-116

Improper Encoding or Escaping of Output

CWE-20

Improper Input Validation