Exploit
CVE-2023-6134

Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) (CWE-75)

Published: Nov 14, 2023 / Updated: 12mo ago

010
CVSS 4.6EPSS 0.04%Medium
CVE info copied to clipboard

A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

Timeline

Vendor Advisory

RedHat CVE advisory released a security advisory (CVE-2023-6134).

Nov 15, 2023 at 12:35 AM
First Article

Feedly found the first article mentioning CVE-2023-6134. See article

Nov 17, 2023 at 6:03 PM / Red Hat CVE Database
Vendor Advisory

RedHat released a security advisory (RHSA-2023:7858).

Dec 14, 2023 at 8:00 AM
CVE Assignment

NVD published the first details for CVE-2023-6134

Dec 14, 2023 at 2:15 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 10.6%)

Dec 15, 2023 at 11:01 PM
Vendor Advisory

GitHub Advisories released a security advisory.

Dec 18, 2023 at 1:40 PM
Threat Intelligence Report

The vulnerability CVE-2023-6134 in Keycloak allows for cross-site scripting (XSS) attacks through wildcard redirect URIs. It has a fix in Keycloak 23.0.3, but the patch only partially addresses the issue, enabling bypassing of redirect URI restrictions. There is no information provided regarding the criticality, exploitation in the wild, proof-of-concept exploits, mitigations, detections, patches, or downstream impacts to other vendors or technology. See article

Jan 12, 2024 at 7:15 AM
Proof of Concept (PoC) Released

A proof of concept exploit has been released

Feb 2, 2024 at 10:10 AM
Vendor Advisory

RedHat released a security advisory (RHSA-2024:0804).

Feb 13, 2024 at 8:00 AM
Static CVE Timeline Graph

Affected Systems

Redhat/openshift_container_platform
+null more

Exploits

https://access.redhat.com/errata/RHSA-2023:7857
+null more

Patches

bugzilla.redhat.com
+null more

Links to Mitre Att&cks

T1070: Indicator Removal on Host
+null more

Attack Patterns

CAPEC-81: Web Logs Tampering
+null more

Vendor Advisory

[GHSA-cvg2-7c3j-g36j] Keycloak vulnerable to reflected XSS via wildcard in OIDC redirect_uri
GitHub Security Advisory: GHSA-cvg2-7c3j-g36j Release Date: 2023-12-18 Update Date: 2023-12-18 Severity: Moderate CVE-2023-6134 Base Score: 4.6 Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N Package Information Package: org.keycloak:keycloak-services Affected Versions: Patched Versions: 23.0.3 Description Keycloak prevents certain schemes in redirects, but permits them if a wildcard is appended to the token.

References

RHSA-2024:0799: Important: Red Hat Single Sign-On 7.6.7 security update on RHEL 8
Important: Red Hat Single Sign-On 7.6.7 security update on RHEL 8 A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
RHSA-2024:0800: Important: Red Hat Single Sign-On 7.6.7 security update on RHEL 9
New Red Hat Single Sign-On 7.6.7 packages are now available for Red Hat Enterprise Linux 9.Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
CVE-2023-6927
This issue may allow an attacker to steal authorization codes or tokens from clients using a wildcard in the JARM response mode "form_post.jwt" which could be used to bypass the security patch implemented to address CVE-2023-6134. 2255027 - keycloak: open redirect via "form_post.jwt" JARM response mode
See 3 more references

News

Multiple Vulnerabilities in Hitachi Ops Center Common Services
Multiple vulnerabilities have been found in Hitachi Ops Center Common Services. Product name: Hitachi Ops Center Common Services
POST to XSS: Leveraging Pseudo Protocols to Gain JavaScript Evaluation in SSO Flows
In 2020, a blog post was published here about the real-world security implications of a vague specification of the Redirect URI within the OAuth 2.0 RFC1. At that time, I focussed on redirect-based flows. This post uncovers additional protocol-level issues that lead to security vulnerabilities in popular and well-audited SSO implementations such as Authentik (CVE-2024-21637), Keycloak (CVE-2023-6134), and FusionAuth. Notably, the vulnerabilities were identified in the context of the OAuth 2.0 Form Post Response Mode2 and the SAML POST-Binding3 and therefore are not limited to OAuth 2.0 and OpenID Connect, but also affect SAML-based SSO-Flows. In this post, we will dive into specification inaccuracies regarding the use of dangerous pseudo-schemes (JavaScript-URIs) in combination with POST-based SSO flows such as the OAuth 2.0 Form Post Response Mode2 and the SAML POST-Bindings3, resulting in a protocol-level Cross-Site Scripting (XSS) vulnerability pattern.
Multiple vulnerabilities in Red Hat Single Sign-On 7.6 on RHEL 8
Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information. The vulnerability allows a remote attacker to gain access to sensitive information.
Multiple vulnerabilities in Red Hat Single Sign-On 7.6 on RHEL 9
Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information. The vulnerability allows a remote attacker to gain access to sensitive information.
Vigilance.fr - Keycloak: Cross Site Scripting via OIDC Redirect_uri Wildcard, analyzed on 15/12/2023
Vulnerable products: Keycloak, Red Hat SSO . This computer vulnerability announce impacts software or systems such as Keycloak, Red Hat SSO .
See 35 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:Low
User Interaction:Required
Scope:Unchanged
Confidentiality:Low
Integrity:Low
Availability Impact:None

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI