Description
A reflected cross-site scripting (XSS) vulnerability was found in the 'oob' OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise user details, allowing it to be changed or collected by an attacker.
Remediation
References
https://access.redhat.com/errata/RHSA-2023:1043
https://access.redhat.com/errata/RHSA-2023:1044
https://access.redhat.com/security/cve/CVE-2022-4137
https://bugzilla.redhat.com/show_bug.cgi?id=2148496
https://access.redhat.com/errata/RHSA-2023:1045
https://access.redhat.com/errata/RHSA-2023:1049
Related Vulnerabilities
CVE-2022-36886 Vulnerability in maven package org.jenkins-ci.plugins:external-monitor-job
CVE-2015-5348 Vulnerability in maven package org.apache.camel:camel-http
CVE-2022-41249 Vulnerability in maven package com.meowlomo.jenkins:scm-httpclient
CVE-2020-12480 Vulnerability in maven package com.typesafe.play:play_2.12
CVE-2011-1772 Vulnerability in maven package org.apache.struts.xwork:xwork-core