Vulnerability Details CVE-2020-1697
It was found in all keycloak versions before 9.0.0 that links to external applications (Application Links) in the admin console are not validated properly and could allow Stored XSS attacks. An authed malicious user could create URLs to trick users in other realms, and possibly conduct further attacks.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 43.4%
CVSS Severity
CVSS v3 Score 6.1
CVSS v2 Score 3.5
Products affected by CVE-2020-1697
-
cpe:2.3:a:redhat:keycloak:-
-
cpe:2.3:a:redhat:keycloak:1.0
-
cpe:2.3:a:redhat:keycloak:1.0.0
-
cpe:2.3:a:redhat:keycloak:1.0.1
-
cpe:2.3:a:redhat:keycloak:1.0.2
-
cpe:2.3:a:redhat:keycloak:1.0.3
-
cpe:2.3:a:redhat:keycloak:1.0.4
-
cpe:2.3:a:redhat:keycloak:1.0.5
-
cpe:2.3:a:redhat:keycloak:1.1.0
-
cpe:2.3:a:redhat:keycloak:1.1.1
-
cpe:2.3:a:redhat:keycloak:1.2.0
-
cpe:2.3:a:redhat:keycloak:1.3.0
-
cpe:2.3:a:redhat:keycloak:1.3.1
-
cpe:2.3:a:redhat:keycloak:1.4.0
-
cpe:2.3:a:redhat:keycloak:1.5.0
-
cpe:2.3:a:redhat:keycloak:1.5.1
-
cpe:2.3:a:redhat:keycloak:1.6.0
-
cpe:2.3:a:redhat:keycloak:1.6.1
-
cpe:2.3:a:redhat:keycloak:1.7.0
-
cpe:2.3:a:redhat:keycloak:1.8.0
-
cpe:2.3:a:redhat:keycloak:1.8.1
-
cpe:2.3:a:redhat:keycloak:1.8.2
-
cpe:2.3:a:redhat:keycloak:1.9.0
-
cpe:2.3:a:redhat:keycloak:1.9.1
-
cpe:2.3:a:redhat:keycloak:1.9.2
-
cpe:2.3:a:redhat:keycloak:1.9.3
-
cpe:2.3:a:redhat:keycloak:1.9.4
-
cpe:2.3:a:redhat:keycloak:1.9.5
-
cpe:2.3:a:redhat:keycloak:1.9.6
-
cpe:2.3:a:redhat:keycloak:1.9.7
-
cpe:2.3:a:redhat:keycloak:1.9.8
-
cpe:2.3:a:redhat:keycloak:2.0.0
-
cpe:2.3:a:redhat:keycloak:2.1.0
-
cpe:2.3:a:redhat:keycloak:2.2.0
-
cpe:2.3:a:redhat:keycloak:2.2.1
-
cpe:2.3:a:redhat:keycloak:2.3.0
-
cpe:2.3:a:redhat:keycloak:2.4.0
-
cpe:2.3:a:redhat:keycloak:2.5.0
-
cpe:2.3:a:redhat:keycloak:2.5.1
-
cpe:2.3:a:redhat:keycloak:2.5.10
-
cpe:2.3:a:redhat:keycloak:2.5.2
-
cpe:2.3:a:redhat:keycloak:2.5.3
-
cpe:2.3:a:redhat:keycloak:2.5.4
-
cpe:2.3:a:redhat:keycloak:2.5.5
-
cpe:2.3:a:redhat:keycloak:2.5.6
-
cpe:2.3:a:redhat:keycloak:2.5.7
-
cpe:2.3:a:redhat:keycloak:2.5.8
-
cpe:2.3:a:redhat:keycloak:2.5.9
-
cpe:2.3:a:redhat:keycloak:3.0.0
-
cpe:2.3:a:redhat:keycloak:3.1.0
-
cpe:2.3:a:redhat:keycloak:3.1.1
-
cpe:2.3:a:redhat:keycloak:3.2.0
-
cpe:2.3:a:redhat:keycloak:3.2.1
-
cpe:2.3:a:redhat:keycloak:3.3.0
-
cpe:2.3:a:redhat:keycloak:3.4.0
-
cpe:2.3:a:redhat:keycloak:3.4.1
-
cpe:2.3:a:redhat:keycloak:3.4.2
-
cpe:2.3:a:redhat:keycloak:3.4.3
-
cpe:2.3:a:redhat:keycloak:4.0.0
-
cpe:2.3:a:redhat:keycloak:4.1.0
-
cpe:2.3:a:redhat:keycloak:4.2.0
-
cpe:2.3:a:redhat:keycloak:4.2.1
-
cpe:2.3:a:redhat:keycloak:4.3.0
-
cpe:2.3:a:redhat:keycloak:4.4.0
-
cpe:2.3:a:redhat:keycloak:4.5.0
-
cpe:2.3:a:redhat:keycloak:4.6.0
-
cpe:2.3:a:redhat:keycloak:4.7.0
-
cpe:2.3:a:redhat:keycloak:4.8.0
-
cpe:2.3:a:redhat:keycloak:4.8.1
-
cpe:2.3:a:redhat:keycloak:4.8.2
-
cpe:2.3:a:redhat:keycloak:4.8.3
-
cpe:2.3:a:redhat:keycloak:5.0.0
-
cpe:2.3:a:redhat:keycloak:6.0.0
-
cpe:2.3:a:redhat:keycloak:6.0.1
-
cpe:2.3:a:redhat:keycloak:6.0.2
-
cpe:2.3:a:redhat:keycloak:7.0.0
-
cpe:2.3:a:redhat:keycloak:7.0.1
-
cpe:2.3:a:redhat:keycloak:8.0.0
-
cpe:2.3:a:redhat:keycloak:8.0.2
-
cpe:2.3:a:redhat:single_sign-on:7.3