VYPR
Medium severity5.4NVD Advisory· Published Oct 26, 2017· Updated May 13, 2026

CVE-2017-12158

CVE-2017-12158

Description

It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.keycloak:keycloak-parentMaven
< 3.4.03.4.0

Affected products

4
  • Red Hat, Inc./keycloakv5
    Range: 3.4.0
  • cpe:2.3:a:redhat:single_sign_on:7.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:redhat:single_sign_on:7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:single_sign_on:7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:keycloak:keycloak:-:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.