# Keycloak 代理绕过漏洞
## 概述
Keycloak 存在因不正确输入验证导致的安全漏洞,攻击者可利用此问题绕过反向代理的路径过滤机制。
## 影响版本
未明确具体版本,需参考官方补丁信息确认受影响范围。
## 细节
Keycloak 接受符合 RFC 的 URL 路径段中的矩阵参数(matrix parameters),而常见的反向代理(如 Nginx、Apache)通常忽略或错误处理此类参数。攻击者可构造包含矩阵参数的恶意请求,使路径在代理层被错误解析,从而隐藏实际路径段。
## 影响
攻击者可能绕过反向代理的路径访问控制,访问本应不可达的管理或敏感接口,导致未授权访问或信息泄露。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: 2429869 – (CVE-2026-0976) CVE-2026-0976 org.keycloak/keycloak-quarkus-server: Keycloak: Proxy bypass due to improper handling of matrix parameters in URL paths -- 🔗来源链接
标签:issue-trackingx_refsource_REDHAT
神龙速读:
## 关键信息
- **漏洞编号**: Bug 2429869 (CVE-2026-0976)
- **漏洞描述**: Improper input validation vulnerability in Keycloak related to the handling of matrix parameters in URL paths.
- **CVSS**: CVE-2026-0976
- **组件**: vulnerability
- **版本**: unspecified
- **受影响的操作系统**: Linux
- **优先级**: low
- **严重性**: low
- **报告时间**: 2026-01-15 07:10 UTC
- **修改时间**: 2026-01-15 11:21 UTC
## 漏洞详情
Improper input validation vulnerability in Keycloak related to the handling of matrix parameters in URL paths. The issue occurs because Keycloak, via its JAX-RS routing layer, accepts RFC-compliant matrix parameters (e.g., `;param`) in path segments, while common reverse proxy configurations may ignore or mishandle them when enforcing access restrictions. A remote attacker can craft requests such as `/realms;abc/master/account` to mask path segments and bypass proxy-level path filtering. Although authentication is still required, this may expose administrative or sensitive endpoints that operators believe are not externally reachable. Exploitation is network-based, requires no authentication, and depends on the reverse proxy configuration in front of Keycloak.
暂无评论