CVE-2022-0225
Java vulnerability analysis and mitigation

Overview

A stored Cross-site Scripting (XSS) vulnerability was discovered in Keycloak, identified as CVE-2022-0225. The vulnerability affects all versions of Keycloak prior to 20.0.0, including version 16.0.1. The flaw allows a privileged attacker to inject malicious payload as the group name while creating a new group from the admin console (GitHub Advisory, CVE Mitre).

Technical details

The vulnerability exists in the "Groups" dropdown functionality within the "Add user" section of the Keycloak admin console. The issue stems from improper escaping of group names, which allows for the injection of malicious scripts. The vulnerability was discovered to be exploitable through the group creation process, where an attacker could insert malicious payloads that would be triggered when viewing the groups dropdown (Red Hat Bugzilla).

Impact

The successful exploitation of this vulnerability could allow privileged attackers to execute malicious scripts in the admin console and potentially steal data from other users. The impact is considered moderate to low due to the requirement of privileged credentials for exploitation (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Keycloak version 20.0.0. Red Hat has released several security updates to address this issue across different versions of Red Hat Single Sign-On, including versions 7.5 and 7.6. Users are advised to upgrade to the patched versions through the available security updates (Red Hat Errata).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management