{"id":"CVE-2024-1233","summary":"Eap: wildfly-elytron has a ssrf security issue","details":"A flaw was found in` JwtValidator.resolvePublicKey` in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability.","aliases":["GHSA-v4mm-q8fv-r2w5"],"modified":"2026-05-18T05:56:00.560699531Z","published":"2024-04-09T07:01:47.673Z","database_specific":{"cwe_ids":["CWE-918"],"cna_assigner":"redhat","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/1xxx/CVE-2024-1233.json"},"references":[{"type":"WEB","url":"https://access.redhat.com/downloads/content/package-browser/"},{"type":"WEB","url":"https://access.redhat.com/jbossnetwork/restricted/listSoftware.html"},{"type":"WEB","url":"https://github.com/wildfly/wildfly/pull/17812/commits/0c02350bc0d84287bed46e7c32f90b36e50d3523"},{"type":"WEB","url":"https://issues.redhat.com/browse/WFLY-19226"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3559"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3560"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3561"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3563"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3580"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3581"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3583"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:9582"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:9583"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2024-1233"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/1xxx/CVE-2024-1233.json"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-v4mm-q8fv-r2w5"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1233"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262849"},{"type":"PACKAGE","url":"https://github.com/wildfly/wildfly"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wildfly/wildfly","events":[{"introduced":"0"},{"fixed":"f409784b2d2f7619b503e0f42c05dec4846a3fd0"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"32.0.0.Final"}],"source":"AFFECTED_FIELD"}}],"versions":["32.0.0.Beta1","31.0.0.Final","31.0.0.Beta1","30.0.0.Final","30.0.0.Beta1","29.0.0.Final","29.0.0.Beta1","29.0.0.Alpha1","28.0.0.Final","28.0.0.Beta1","27.0.0.Beta1","27.0.0.Alpha4","Pre_EE10_Big_Bang","27.0.0.Alpha3","27.0.0.Alpha2","27.0.0.Alpha1","26.0.0.Beta1","25.0.0.Final","25.0.0.Beta1","24.0.0.Beta1","23.0.0.Final","23.0.0.Beta1","22.0.0.Final","22.0.0.Beta1","22.0.0.Alpha1","21.0.0.Final","21.0.0.Beta1","20.0.0.Final","20.0.0.Beta1","19.0.0.Beta2","19.0.0.Beta1","18.0.0.Final","18.0.0.Beta1","17.0.0.Final","17.0.0.Beta1","17.0.0.Alpha1","16.0.0.Final","16.0.0.Beta1","15.0.0.Final","15.0.0.Beta1","14.0.0.Final","14.0.0.Beta2","14.0.0.Beta1","13.0.0.Beta1","12.0.0.Final","12.0.0.CR1","12.0.0.Beta1","11.0.0.Final","11.0.0.CR1","10.0.0.Final","10.0.0.CR5","10.0.0.CR4","10.0.0.CR3","10.0.0.CR2","10.0.0.CR1","10.0.0.Beta2","10.0.0.Beta1","10.0.0.Alpha6","10.0.0.Alpha5","10.0.0.Alpha4","10.0.0.Alpha3","10.0.0.Alpha2","10.0.0.Alpha1","9.0.0.CR1","9.0.0.Beta2","9.0.0.Beta1","8.1.0.CR2","8.1.0.CR1","8.0.0.Final","8.0.0.CR1","8.0.0.Beta1","8.0.0.Alpha4","8.0.0.Alpha3","8.0.0.Alpha2","8.0.0.Alpha1","7.2.0.Final-prerelease1","7.2.0.Final","7.1.2.Final","7.1.2-prerelease","7.1.1.Final","7.1.0.Final","7.1.0.Final-prerelease2","7.1.0.Final-prerelease","7.1.0.CR1","7.1.0.Beta1","7.1.0.Alpha1","7.0.0.Final","7.0.0.Final-prerelease3","7.0.0.Final-prerelease2","7.0.0.Final-prerelease","7.0.0.CR1","7.0.0.Beta3","7.0.0.Beta2","7.0.0.Beta2-prerelease","7.0.0.Beta1-prerelease","7.0.0.Alpha1-final","7.0.0.Alpha1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-1233.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}]}