4.3
CVSSv2

CVE-2021-20323

Published: 25/03/2022 Updated: 29/03/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat keycloak

Github Repositories

CVE-2021-20323 Description Keycloak before 1800 and after 1000 contains a reflected XSS on the clients-registrations endpoint The bug is triggered by providing, by POST, a json structure with a key as parameter name that is not supported by the endpoint The response return reflects the json key in an error message and with header set as Content-Type: text/html When execu

CVE_Tool

Cappricio Securities CVE-2021-20323 Bug Scanner πŸš€πŸ”’ Table of Contents πŸ“‹ Features π

CVE_Tool

Cappricio Securities CVE-2021-20323 Bug Scanner πŸš€πŸ”’ Table of Contents πŸ“‹ Features π

Tool for finding CVE-2021-20323

Badges License MIT Installation Install Python3 and pip Instructions Here (If you can't figure this out, you shouldn't really be using this) Install via pip pip install CVE-2021-20323 Run bellow command to check CVE-2021-20323 -h Configurations We integrated with the Telegram API to receive instant no