Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-14366

Опубликовано: 04 нояб. 2020
Источник: redhat
CVSS3: 6.8
EPSS Низкий

Описание

A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw

A flaw was found in keycloak. A path traversal, using URL-encoded path segments in a request, is possible due to transformation of the URL path to a file path at the resource endpoint. The highest threat from this vulnerability is to data confidentiality.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Decision Manager 7keycloakNot affected
Red Hat Fuse 7keycloakNot affected
Red Hat OpenShift Application RuntimeskeycloakNot affected
Red Hat Process Automation 7keycloakNot affected
Red Hat Single Sign-On 7keyccloakAffected
Red Hat support for Spring BootkeycloakNot affected
Red Hat Single Sign-On 7.4.3FixedRHSA-2020:493104.11.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1869764keycloak: path traversal in resources

EPSS

Процентиль: 59%
0.00384
Низкий

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
nvd
около 5 лет назад

A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw

CVSS3: 6.8
debian
около 5 лет назад

A vulnerability was found in keycloak, where path traversal using URL- ...

CVSS3: 7.5
github
почти 4 года назад

Path Traversal

EPSS

Процентиль: 59%
0.00384
Низкий

6.8 Medium

CVSS3