CVE-2024-1233
CVSS V2 None
CVSS V3 None
Description
A flaw was found in` JwtValidator.resolvePublicKey` in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability.
Overview
- CVE ID
- CVE-2024-1233
- Assigner
- redhat
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-04-09T07:01:47.673Z
- Last Modified Date
- 2024-06-04T16:53:51.662Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://access.redhat.com/errata/RHSA-2024:3559 | vendor-advisory x_refsource_REDHAT |
https://access.redhat.com/errata/RHSA-2024:3560 | vendor-advisory x_refsource_REDHAT |
https://access.redhat.com/errata/RHSA-2024:3561 | vendor-advisory x_refsource_REDHAT |
https://access.redhat.com/errata/RHSA-2024:3563 | vendor-advisory x_refsource_REDHAT |
https://access.redhat.com/errata/RHSA-2024:3580 | vendor-advisory x_refsource_REDHAT |
https://access.redhat.com/errata/RHSA-2024:3581 | vendor-advisory x_refsource_REDHAT |
https://access.redhat.com/errata/RHSA-2024:3583 | vendor-advisory x_refsource_REDHAT |
https://access.redhat.com/security/cve/CVE-2024-1233 | vdb-entry x_refsource_REDHAT |
https://bugzilla.redhat.com/show_bug.cgi?id=2262849 | issue-tracking x_refsource_REDHAT |
https://github.com/advisories/GHSA-v4mm-q8fv-r2w5 | |
https://github.com/wildfly/wildfly/pull/17812/commits/0c02350bc0d84287bed46e7c32f90b36e50d3523 | |
https://issues.redhat.com/browse/WFLY-19226 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-1233 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1233 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 06:21:02 | Added to TrackCVE |