Description
It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.
Remediation
References
https://bugzilla.redhat.com/show_bug.cgi?id=1489161
https://access.redhat.com/errata/RHSA-2017:2906
https://access.redhat.com/errata/RHSA-2017:2905
https://access.redhat.com/errata/RHSA-2017:2904
http://www.securityfocus.com/bid/101618
Related Vulnerabilities
CVE-2020-2126 Vulnerability in maven package com.dubture.jenkins:digitalocean-plugin
CVE-2020-8127 Vulnerability in maven package org.webjars:reveal.js
CVE-2019-9844 Vulnerability in npm package simple-markdown
CVE-2020-7637 Vulnerability in maven package org.webjars.npm:class-transformer
CVE-2017-9735 Vulnerability in maven package org.eclipse.jetty:jetty-util