Path Traversal
High severity
GitHub Reviewed
Published
Feb 9, 2022
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Nov 9, 2020
Reviewed
Apr 1, 2021
Published to the GitHub Advisory Database
Feb 9, 2022
Last updated
Feb 1, 2023
A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw
References