Files
CVEs-PoC/2021/CVE-2021-20323.md
2025-09-29 21:09:30 +02:00

34 lines
1.3 KiB
Markdown

### [CVE-2021-20323](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20323)
![](https://img.shields.io/static/v1?label=Product&message=keycloak-services&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=keycloak%2017.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79&color=brightgreen)
### Description
A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Cappricio-Securities/CVE-2021-20323
- https://github.com/DmitriiKuzmi4ev/casualStories
- https://github.com/FelipeSilvany/Disclosed_Vulnerabilities
- https://github.com/Rasuchan/CVE-tool
- https://github.com/Sunjid-Ahmed/reconftw-main
- https://github.com/carlosalbertotuma/Keycloak-Sniper
- https://github.com/cscpwn0sec/CVE-2021-20323
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/mdaseem03/cpanel_xss_2023
- https://github.com/ndmalc/CVE-2021-20323
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/sabbir-wp/reconftwtest
- https://github.com/six2dez/reconftw
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC