A vulnerability was found in all versions of Keycloak Gatekeeper, where on using lower case HTTP headers (via cURL) an attacker can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers.
References
Link | Resource |
---|---|
https://issues.jboss.org/browse/KEYCLOAK-14090 | Issue Tracking Permissions Required Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1868591 | Issue Tracking Vendor Advisory |
Configurations
Information
Published : 2021-02-23 05:15
Updated : 2022-08-10 13:28
NVD link : CVE-2020-14359
Mitre link : CVE-2020-14359
JSON object : View
CWE
CWE-305
Authentication Bypass by Primary Weakness
Products Affected
redhat
- louketo_proxy