CVE-2020-14359

A vulnerability was found in all versions of Keycloak Gatekeeper, where on using lower case HTTP headers (via cURL) an attacker can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1868591 Issue Tracking Vendor Advisory
https://issues.jboss.org/browse/KEYCLOAK-14090 Issue Tracking Permissions Required Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1868591 Issue Tracking Vendor Advisory
https://issues.jboss.org/browse/KEYCLOAK-14090 Issue Tracking Permissions Required Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:louketo_proxy:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:03

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=1868591 - Issue Tracking, Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1868591 - Issue Tracking, Vendor Advisory
References () https://issues.jboss.org/browse/KEYCLOAK-14090 - Issue Tracking, Permissions Required, Third Party Advisory () https://issues.jboss.org/browse/KEYCLOAK-14090 - Issue Tracking, Permissions Required, Third Party Advisory

Information

Published : 2021-02-23 13:15

Updated : 2024-11-21 05:03


NVD link : CVE-2020-14359

Mitre link : CVE-2020-14359

CVE.ORG link : CVE-2020-14359


JSON object : View

Products Affected

redhat

  • louketo_proxy
CWE
CWE-305

Authentication Bypass by Primary Weakness