Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-14359

Опубликовано: 19 янв. 2021
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

A vulnerability was found in all versions of Keycloak Gatekeeper, where on using lower case HTTP headers (via cURL) an attacker can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Single Sign-On 7keycloak-gatekeeperNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-305
https://bugzilla.redhat.com/show_bug.cgi?id=1868591keycloak-gatekeeper: gatekeeper bypass via cURL when using lower case HTTP headers

EPSS

Процентиль: 49%
0.00259
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
nvd
почти 5 лет назад

A vulnerability was found in all versions of Keycloak Gatekeeper, where on using lower case HTTP headers (via cURL) an attacker can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers.

CVSS3: 7.3
debian
почти 5 лет назад

A vulnerability was found in all versions of Keycloak Gatekeeper, wher ...

CVSS3: 7.3
github
почти 4 года назад

Keycloak Gatekeeper vulnerable to bypass on using lower case HTTP headers

EPSS

Процентиль: 49%
0.00259
Низкий

7.3 High

CVSS3