CVE-2024-1233
Eap: wildfly-elytron has a ssrf security issue
Severity Score
7.3
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
A flaw was found in` JwtValidator.resolvePublicKey` in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability.
Se encontró una falla en `JwtValidator.resolvePublicKey` en JBoss EAP, donde el validador verifica jku y envía una solicitud HTTP. Durante este proceso, no se realiza ninguna lista blanca ni ningún otro comportamiento de filtrado en la dirección URL de destino, lo que puede provocar una vulnerabilidad Server-Side Request Forgery (SSRF).
*Credits:
Red Hat would like to thank Jingcheng Yang and Jianjun Chen from Sichuan University and Zhongguancun Lab for reporting this issue.
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-02-05 CVE Reserved
- 2024-04-09 CVE Published
- 2024-06-06 EPSS Updated
- 2024-11-24 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
https://github.com/advisories/GHSA-v4mm-q8fv-r2w5 | ||
https://github.com/wildfly/wildfly/pull/17812/commits/0c02350bc0d84287bed46e7c32f90b36e50d3523 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2024:3559 | 2024-06-04 | |
https://access.redhat.com/errata/RHSA-2024:3560 | 2024-06-04 | |
https://access.redhat.com/errata/RHSA-2024:3561 | 2024-06-04 | |
https://access.redhat.com/errata/RHSA-2024:3563 | 2024-06-04 | |
https://access.redhat.com/errata/RHSA-2024:3580 | 2024-06-04 | |
https://access.redhat.com/errata/RHSA-2024:3581 | 2024-06-04 | |
https://access.redhat.com/errata/RHSA-2024:3583 | 2024-06-04 | |
https://access.redhat.com/security/cve/CVE-2024-1233 | 2024-06-04 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2262849 | 2024-06-04 | |
https://issues.redhat.com/browse/WFLY-19226 | 2024-06-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redhat Search vendor "Redhat" | Jboss Enterprise Application Platform Search vendor "Redhat" for product "Jboss Enterprise Application Platform" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Jbosseapxp Search vendor "Redhat" for product "Jbosseapxp" | * | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | * | - |
Affected
|