CVE-2024-1233: WildFly Elytron: SSRF security issue
(updated )
A flaw was found in JwtValidator.resolvePublicKey in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no allow list or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability.
References
- access.redhat.com/errata/RHSA-2024:3559
- access.redhat.com/errata/RHSA-2024:3560
- access.redhat.com/errata/RHSA-2024:3561
- access.redhat.com/errata/RHSA-2024:3563
- access.redhat.com/errata/RHSA-2024:3580
- access.redhat.com/errata/RHSA-2024:3581
- access.redhat.com/errata/RHSA-2024:3583
- access.redhat.com/errata/RHSA-2025:9582
- access.redhat.com/errata/RHSA-2025:9583
- access.redhat.com/security/cve/CVE-2024-1233
- bugzilla.redhat.com/show_bug.cgi?id=2262849
- github.com/advisories/GHSA-v4mm-q8fv-r2w5
- github.com/wildfly-security/wildfly-elytron
- github.com/wildfly/wildfly/commit/aa151a00d75d6dbc4a1bf1b68d58b9de3087bb62
- github.com/wildfly/wildfly/pull/17812/commits/0c02350bc0d84287bed46e7c32f90b36e50d3523
- issues.redhat.com/browse/WFLY-19226
- nvd.nist.gov/vuln/detail/CVE-2024-1233
Code Behaviors & Features
Detect and mitigate CVE-2024-1233 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →