First published: Mon Nov 09 2020(Updated: )
A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Keycloak | <12.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14366 is a vulnerability found in Keycloak, where path traversal using URL-encoded path segments in the request is possible.
CVE-2020-14366 has a severity rating of 7.5 (high).
Red Hat Keycloak versions up to 12.0.0 are affected by CVE-2020-14366.
The vulnerability in CVE-2020-14366 allows an attacker to perform path traversal by using URL-encoded path segments in the request.
Upgrading to a version of Red Hat Keycloak beyond 12.0.0 will fix the vulnerability CVE-2020-14366.