Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-6717: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

0
Medium
VulnerabilityCVE-2023-6717cvecve-2023-6717
Published: Thu Apr 25 2024 (04/25/2024, 16:02:03 UTC)
Source: CVE

Description

A flaw was found in the SAML client registration in Keycloak that could allow an administrator to register malicious JavaScript URIs as Assertion Consumer Service POST Binding URLs (ACS), posing a Cross-Site Scripting (XSS) risk. This issue may allow a malicious admin in one realm or a client with registration access to target users in different realms or applications, executing arbitrary JavaScript in their contexts upon form submission. This can enable unauthorized access and harmful actions, compromising the confidentiality, integrity, and availability of the complete KC instance.

AI-Powered Analysis

AILast updated: 11/21/2025, 12:44:58 UTC

Technical Analysis

CVE-2023-6717 is a vulnerability identified in Keycloak, an open-source identity and access management solution widely used for single sign-on and federated identity. The flaw exists in the SAML client registration component, where an attacker with administrative privileges or client registration access can register malicious JavaScript URIs as Assertion Consumer Service (ACS) POST Binding URLs. This improper neutralization of input during web page generation leads to a Cross-Site Scripting (XSS) vulnerability. When users from different realms or applications interact with the affected forms, the malicious JavaScript executes in their browser context, potentially allowing the attacker to hijack sessions, steal credentials, or perform unauthorized actions within the Keycloak instance. The vulnerability requires high privileges (administrator or client registration rights) and user interaction (form submission) to exploit. The CVSS 3.1 score is 6.0, reflecting medium severity due to the need for privileges and user interaction, but with high impact on confidentiality and integrity and low impact on availability. No public exploits have been reported yet, but the vulnerability poses a significant risk to environments relying on Keycloak for identity federation and access control.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to sensitive identity and access management functions, compromising user credentials and session tokens across multiple realms and applications. This can result in data breaches, privilege escalation, and disruption of authentication services. Organizations using Keycloak in critical sectors such as finance, healthcare, government, and telecommunications may face severe operational and reputational damage. The multi-realm impact increases the attack surface, potentially affecting a broad user base. Given the central role of Keycloak in federated identity management, exploitation could undermine trust in authentication processes and lead to cascading security failures across integrated systems.

Mitigation Recommendations

Organizations should immediately review and restrict administrative and client registration privileges to trusted personnel only, minimizing the number of users who can register SAML clients. Implement strict input validation and sanitization on ACS POST Binding URLs to prevent JavaScript URIs from being registered. Monitor Keycloak logs for suspicious client registrations or unusual administrative activities. Apply available patches or updates from Keycloak as soon as they are released. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block malicious JavaScript payloads in SAML requests. Conduct regular security audits and penetration testing focused on identity management components. Educate administrators on the risks of registering untrusted clients and enforce multi-factor authentication for administrative access to reduce risk of compromised credentials.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2023-12-12T07:30:43.924Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8717

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 11/21/2025, 12:44:58 PM

Last updated: 11/30/2025, 10:10:46 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats