A vulnerability was found in all versions of Keycloak Gatekeeper, where on using lower case HTTP headers (via cURL) an attacker can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1868591 | Issue Tracking Vendor Advisory |
https://issues.jboss.org/browse/KEYCLOAK-14090 | Issue Tracking Permissions Required Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1868591 | Issue Tracking Vendor Advisory |
https://issues.jboss.org/browse/KEYCLOAK-14090 | Issue Tracking Permissions Required Third Party Advisory |
Configurations
History
21 Nov 2024, 05:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1868591 - Issue Tracking, Vendor Advisory | |
References | () https://issues.jboss.org/browse/KEYCLOAK-14090 - Issue Tracking, Permissions Required, Third Party Advisory |
Information
Published : 2021-02-23 13:15
Updated : 2024-11-21 05:03
NVD link : CVE-2020-14359
Mitre link : CVE-2020-14359
CVE.ORG link : CVE-2020-14359
JSON object : View
Products Affected
redhat
- louketo_proxy
CWE
CWE-305
Authentication Bypass by Primary Weakness