Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-1233

Опубликовано: 02 апр. 2024
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

A flaw was found in JwtValidator.resolvePublicKey in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability.

Отчет

The SSRF vulnerability in JwtValidator.resolvePublicKey is considered a moderate severity issue due to its potential to allow unauthorized internal network access and exposure of sensitive information, albeit with certain constraints. The vulnerability leverages the absence of URL whitelisting or filtering when resolving the jku header, which can be exploited to make HTTP requests to arbitrary URLs. While the immediate impact might not directly compromise sensitive data or system integrity, it opens a pathway for attackers to discover and interact with internal services, potentially leading to further exploitation. The exploitation complexity and the need for an attacker to craft a malicious JWT token mitigate the severity to a moderate level, as it requires a certain degree of knowledge and capability to execute effectively.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform Expansion PackwildflyAffected
Important: Red Hat JBoss Enterprise Application Platform 7.4.17 Security updateeapFixedRHSA-2024:356303.06.2024
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7eap7-glassfish-elFixedRHSA-2025:958225.06.2025
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7eap7-hibernateFixedRHSA-2025:958225.06.2025
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7eap7-jackson-databindFixedRHSA-2025:958225.06.2025
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7eap7-jboss-ejb-clientFixedRHSA-2025:958225.06.2025
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7eap7-nettyFixedRHSA-2025:958225.06.2025
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7eap7-undertowFixedRHSA-2025:958225.06.2025
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7eap7-wildflyFixedRHSA-2025:958225.06.2025
Red Hat JBoss Enterprise Application Platform 7.1 EUS for RHEL 7eap7-wildfly-elytronFixedRHSA-2025:958225.06.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=2262849EAP: wildfly-elytron has a SSRF security issue

EPSS

Процентиль: 39%
0.00177
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.3
nvd
почти 2 года назад

A flaw was found in` JwtValidator.resolvePublicKey` in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability.

CVSS3: 7.3
github
почти 2 года назад

WildFly Elytron: SSRF security issue

EPSS

Процентиль: 39%
0.00177
Низкий

7.3 High

CVSS3

Уязвимость CVE-2024-1233