Bug 2262849 (CVE-2024-1233) - CVE-2024-1233 JBoss EAP: wildfly-elytron has a SSRF security issue
Summary: CVE-2024-1233 JBoss EAP: wildfly-elytron has a SSRF security issue
Keywords:
Status: NEW
Alias: CVE-2024-1233
Deadline: 2024-04-02
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2262850
TreeView+ depends on / blocked
 
Reported: 2024-02-05 18:37 UTC by Rohit Keshri
Modified: 2024-06-04 13:35 UTC (History)
25 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:3559 0 None None None 2024-06-03 16:58:45 UTC
Red Hat Product Errata RHSA-2024:3560 0 None None None 2024-06-03 17:00:14 UTC
Red Hat Product Errata RHSA-2024:3561 0 None None None 2024-06-03 16:59:44 UTC
Red Hat Product Errata RHSA-2024:3563 0 None None None 2024-06-03 17:10:20 UTC
Red Hat Product Errata RHSA-2024:3580 0 None None None 2024-06-04 11:03:36 UTC
Red Hat Product Errata RHSA-2024:3581 0 None None None 2024-06-04 11:00:39 UTC
Red Hat Product Errata RHSA-2024:3583 0 None None None 2024-06-04 10:59:08 UTC

Description Rohit Keshri 2024-02-05 18:37:05 UTC
In` JwtValidator.resolvePublicKey`, the Validator checks jku and sends an HTTP request. During this process, no whitelisting or other filtering behavior was performed on the destination URL address. Caused SSRF vulnerability.

Comment 11 errata-xmlrpc 2024-06-03 16:58:44 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 on RHEL 7

Via RHSA-2024:3559 https://access.redhat.com/errata/RHSA-2024:3559

Comment 12 errata-xmlrpc 2024-06-03 16:59:42 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 9

Via RHSA-2024:3561 https://access.redhat.com/errata/RHSA-2024:3561

Comment 13 errata-xmlrpc 2024-06-03 17:00:12 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.4 for RHEL 8

Via RHSA-2024:3560 https://access.redhat.com/errata/RHSA-2024:3560

Comment 14 errata-xmlrpc 2024-06-03 17:10:18 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2024:3563 https://access.redhat.com/errata/RHSA-2024:3563

Comment 15 errata-xmlrpc 2024-06-04 10:59:06 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2024:3583 https://access.redhat.com/errata/RHSA-2024:3583

Comment 16 errata-xmlrpc 2024-06-04 11:00:37 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 9

Via RHSA-2024:3581 https://access.redhat.com/errata/RHSA-2024:3581

Comment 17 errata-xmlrpc 2024-06-04 11:03:34 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 8.0 for RHEL 8

Via RHSA-2024:3580 https://access.redhat.com/errata/RHSA-2024:3580

Comment 18 Sandipan Roy 2024-06-04 13:24:46 UTC
Upstream Advisory: https://github.com/advisories/GHSA-v4mm-q8fv-r2w5


Note You need to log in before you can comment on or make changes to this bug.