跳转到帖子

Red Hat JBossEAP: Server-Side Request Forgery (SSRF) (CVE-2024-1233)

recommended_posts

发布于
  • Members

Red Hat JBossEAP: Server-Side Request Forgery (SSRF) (CVE-2024-1233)

Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
04/02/2024
Created
09/20/2024
Added
09/19/2024
Modified
12/20/2024

Description

A flaw was found in` JwtValidator.resolvePublicKey` in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability.. A flaw was found in` JwtValidator.resolvePublicKey` in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability.

Solution(s)

  • red-hat-jboss-eap-upgrade-latest

References

  • https://attackerkb.com/topics/cve-2024-1233
  • CVE - 2024-1233
  • https://access.redhat.com/security/cve/CVE-2024-1233
  • https://bugzilla.redhat.com/show_bug.cgi?id=2262849
  • https://github.com/advisories/GHSA-v4mm-q8fv-r2w5
  • https://github.com/wildfly/wildfly/pull/17812/commits/0c02350bc0d84287bed46e7c32f90b36e50d3523
  • https://issues.redhat.com/browse/WFLY-19226
  • https://access.redhat.com/errata/RHSA-2024:3559
  • https://access.redhat.com/errata/RHSA-2024:3560
  • https://access.redhat.com/errata/RHSA-2024:3561
  • https://access.redhat.com/errata/RHSA-2024:3563
  • https://access.redhat.com/errata/RHSA-2024:3580
  • https://access.redhat.com/errata/RHSA-2024:3581
  • https://access.redhat.com/errata/RHSA-2024:3583
View more
  • 查看数 702
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…