CVE-2022-4137
moderate-risk
Published 2023-09-25
A reflected cross-site scripting (XSS) vulnerability was found in the 'oob' OAuth endpoint due to incorrect null-byte handling. This issue allows a malicious link to insert an arbitrary URI into a Keycloak error page. This flaw requires a user or administrator to interact with a link in order to be vulnerable. This may compromise user details, allowing it to be changed or collected by an attacker.
Do I need to act?
-
0.53% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ LOW complexity
Affected Products (2)
Affected Vendors
References (12)
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:1043
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:1044
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:1045
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:1049
Vendor Advisory
https://access.redhat.com/security/cve/CVE-2022-4137
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2148496
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:1043
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:1044
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:1045
Vendor Advisory
https://access.redhat.com/errata/RHSA-2023:1049
Vendor Advisory
https://access.redhat.com/security/cve/CVE-2022-4137
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=2148496
37
/ 100
moderate-risk
Severity
28/34 · Critical
Exploitability
2/34 · Minimal
Exposure
7/34 · Low