Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2021-20323 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Reflected XSS in Keycloak's `clients-registrations` endpoint. πŸ“‰ **Consequences**: Malicious JS executes in victim's browser. πŸ’₯ **Impact**: Session hijacking, credential theft, or defacement.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-79 (Improper Neutralization of Input During Web Page Generation). πŸ” **Flaw**: POST request parameters (JSON keys) are reflected in error messages without sanitization.…

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Red Hat Keycloak. πŸ“¦ **Component**: `keycloak-services`. πŸ“… **Affected Versions**: Before 18.0.0 AND after 10.0.0. 🌍 **Scope**: Impacts ALL available realms on the instance.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Privileges**: No authentication required! 🎯 **Data Access**: Can steal session cookies, tokens, or personal data of logged-in users. πŸ”„ **Action**: Execute arbitrary JavaScript in the context of the victim's browser.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: LOW. 🚫 **Auth**: None required. πŸ“€ **Trigger**: Simple POST request with a malformed JSON key. 🌐 **Access**: Publicly accessible endpoint. Anyone can trigger it!

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploits**: YES. Multiple PoCs available on GitHub (e.g., ndmalc, Cappricio-Securities). πŸ› οΈ **Tools**: Scanners like Nuclei and custom Python tools exist.…

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Send POST to `/clients-registrations` with a JSON key containing HTML/JS. πŸ‘€ **Observe**: Look for reflected script in `text/html` response.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Fix**: Upgrade Keycloak to version **18.0.0 or later**. βœ… **Official**: Red Hat has addressed this in newer releases. πŸ“¦ **Action**: Apply vendor patches immediately.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching isn't possible, implement WAF rules to block POST requests with suspicious JSON keys. 🚫 **Filter**: Sanitize input at the reverse proxy level.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: HIGH. 🚨 **Urgency**: Critical due to zero-auth requirement and widespread impact. ⏳ **Action**: Patch immediately. πŸ“’ **Alert**: Notify all users of affected Keycloak instances.