目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2026-33495— Ory Oathkeeper 安全漏洞

CVSS 6.5 · Medium EPSS 0.05% · P14
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2026-33495の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Ory Oathkeeper has an authentication bypass by usage of untrusted header
ソース: NVD (National Vulnerability Database)
脆弱性説明
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Ory Oathkeeper is often deployed behind other components like CDNs, WAFs, or reverse proxies. Depending on the setup, another component might forward the request to the Oathkeeper proxy with a different protocol (http vs. https) than the original request. In order to properly match the request against the configured rules, Oathkeeper considers the `X-Forwarded-Proto` header when evaluating rules. The configuration option `serve.proxy.trust_forwarded_headers` (defaults to false) governs whether this and other `X-Forwarded-*` headers should be trusted. Prior to version 26.2.0, Oathkeeper did not properly respect this configuration, and would always consider the `X-Forwarded-Proto` header. In order for an attacker to abuse this, an installation of Ory Oathkeeper needs to have distinct rules for HTTP and HTTPS requests. Also, the attacker needs to be able to trigger one but not the other rule. In this scenario, the attacker can send the same request but with the `X-Forwarded-Proto` header in order to trigger the other rule. We do not expect many configurations to meet these preconditions. Version 26.2.0 contains a patch. Ory Oathkeeper will correctly respect the `serve.proxy.trust_forwarded_headers` configuration going forward, thereby eliminating the attack scenario. We recommend upgrading to a fixed version even if the preconditions are not met. As an additional mitigation, it is generally recommended to drop any unexpected headers as early as possible when a request is handled, e.g. in the WAF.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
授权机制缺失
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Ory Oathkeeper 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Ory Oathkeeper是Ory开源的一个访问控制决策软件。 ORY Oathkeeper 26.2.0之前版本存在安全漏洞,该漏洞源于未正确遵循配置,始终信任X-Forwarded-Proto标头,可能导致规则匹配绕过。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
oryoathkeeper < 26.2.0 -

II. CVE-2026-33495の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2026-33495のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · ory · 2026-03-26 · 7 CVEs total

CVE-2026-3349410.0 CRITICALOry Oathkeeper has a path traversal authorization bypass
CVE-2026-335068.8 HIGHDOM-Based XSS in Ory Polis Login Page
CVE-2026-334968.1 HIGHOry Oathkeeper has an authentication bypass by cache key confusion
CVE-2026-335037.2 HIGHOry Kratos has a SQL injection via forged pagination tokens
CVE-2026-335047.2 HIGHOry Hydra has a SQL injection via forged pagination tokens
CVE-2026-335057.2 HIGHOry Keto has a SQL injection via forged pagination tokens

IV. 関連脆弱性

V. CVE-2026-33495へのコメント

まだコメントはありません


コメントを残す