VYPR
High severityNVD Advisory· Published Nov 9, 2020· Updated Aug 4, 2024

CVE-2020-14366

CVE-2020-14366

Description

A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Keycloak's resources endpoint allows path traversal via URL-encoded path segments, exposing limited folder hierarchies.

The vulnerability resides in Keycloak's resources endpoint, which transforms URL paths to file paths. Due to insufficient sanitization, an attacker can use URL-encoded path segments (e.g., %2e%2e) to traverse directories [1][2].

Exploitation requires sending a specially crafted HTTP request to the resources endpoint. The description notes that only specific folder hierarchies can be exposed, limiting the scope of the traversal [1].

Impact: An attacker could read files from those directories, potentially exposing configuration files or other sensitive data. The exact scope depends on the deployment.

Mitigation: Red Hat has acknowledged the issue and likely provided patches in subsequent Keycloak releases. Users should update to the latest version [2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.keycloak:keycloak-parentMaven
< 12.0.012.0.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.