Loading HuntDB...

CVE-2020-14359

UNKNOWN
Published 2021-02-23T12:42:06
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2020-14359. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

A vulnerability was found in all versions of Keycloak Gatekeeper, where on using lower case HTTP headers (via cURL) an attacker can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

✓ GitHub Reviewed HIGH

Keycloak Gatekeeper vulnerable to bypass on using lower case HTTP headers

GHSA-jh6m-3pqw-242h

Advisory Details

A vulnerability was found in all versions of the deprecated package Keycloak Gatekeeper, where on using lower case HTTP headers (via cURL) we can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers.

Affected Packages

Go github.com/keycloak/keycloak-gatekeeper
ECOSYSTEM: ≥0 ≤1.2.8

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Advisory provided by GitHub Security Advisory Database. Published: February 9, 2022, Modified: August 12, 2022

References

Published: 2021-02-23T12:42:06
Last Modified: 2024-08-04T12:39:36.641Z
Copied to clipboard!