First published: Thu Aug 13 2020(Updated: )
A vulnerability was found in keycloak, where on using lower case HTTP headers (via cURL) we can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers. References: <a href="https://issues.jboss.org/browse/KEYCLOAK-14090">https://issues.jboss.org/browse/KEYCLOAK-14090</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Keycloak | ||
Eclipse Jetty |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1868591 is considered high due to the potential for security bypass using lowercase HTTP headers.
To fix REDHAT-BUG-1868591, you should apply the latest updates provided by Red Hat for Keycloak and Jetty that address this vulnerability.
REDHAT-BUG-1868591 affects various releases of Red Hat Build of Keycloak and Eclipse Jetty that allow lowercase HTTP headers.
REDHAT-BUG-1868591 could allow attackers to bypass security checks by sending requests with lowercase HTTP headers.
As of now, the recommended approach to mitigate REDHAT-BUG-1868591 is to implement header normalization or filtering before reaching the Gatekeeper.