{"id":"CVE-2017-12158","details":"It was found that Keycloak would accept a HOST header URL in the admin console and use it to determine web resource locations. An attacker could use this flaw against an authenticated user to attain reflected XSS via a malicious server.","aliases":["GHSA-v38p-mqq3-m6v5"],"modified":"2026-05-04T08:17:16.858741Z","published":"2017-10-26T17:29:00.203Z","withdrawn":"2026-05-04T08:17:16.858741Z","related":["CGA-v4rp-x7w9-p25f"],"references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/101618"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2904"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2905"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2906"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1489161"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-12158.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}]}