CVE-2020-14359Authentication Bypass by Primary Weakness in Keycloak Keycloak-gatekeeper

Severity
7.3HIGHNVD
EPSS
0.3%
top 50.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 23
Latest updateFeb 9

Description

A vulnerability was found in all versions of Keycloak Gatekeeper, where on using lower case HTTP headers (via cURL) an attacker can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LExploitability: 3.9 | Impact: 3.4

Affected Packages2 packages

CVEListV5redhat/keycloakall versions as of 2021-02-22

🔴Vulnerability Details

3
OSV
Keycloak Gatekeeper vulnerable to bypass on using lower case HTTP headers2022-02-09
GHSA
Keycloak Gatekeeper vulnerable to bypass on using lower case HTTP headers2022-02-09
CVEList
CVE-2020-14359: A vulnerability was found in all versions of Keycloak Gatekeeper, where on using lower case HTTP headers (via cURL) an attacker can bypass our Gatekee2021-02-23

📋Vendor Advisories

1
Red Hat
keycloak-gatekeeper: gatekeeper bypass via cURL when using lower case HTTP headers2021-01-19

💬Community

1
Bugzilla
CVE-2020-14359 keycloak-gatekeeper: gatekeeper bypass via cURL when using lower case HTTP headers2020-08-13
CVE-2020-14359 — HIGH severity | cvebase