Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1233: Server-Side Request Forgery (SSRF)

0
High
VulnerabilityCVE-2024-1233cvecve-2024-1233
Published: Tue Apr 09 2024 (04/09/2024, 07:01:47 UTC)
Source: CVE Database V5

Description

A flaw was found in` JwtValidator.resolvePublicKey` in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 08:16:04 UTC

Technical Analysis

CVE-2024-1233 is a Server-Side Request Forgery (SSRF) vulnerability identified in the JwtValidator.resolvePublicKey method of JBoss Enterprise Application Platform (EAP). This method is responsible for validating JSON Web Tokens (JWTs) by retrieving the public key from a URL specified in the 'jku' (JSON Web Key Set URL) header parameter. The vulnerability exists because the implementation does not perform any whitelisting or filtering on the destination URL before making an HTTP request. Consequently, an attacker can craft a malicious JWT with a controlled 'jku' URL, causing the server to send arbitrary HTTP requests to internal or external systems. This can lead to unauthorized access to internal services, exposure of sensitive data, or further exploitation of internal network resources. The vulnerability requires no authentication or user interaction, making it easier to exploit remotely. The CVSS v3.1 base score is 7.3, indicating high severity, with attack vector as network, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits are currently known, the flaw poses a significant risk due to the widespread use of JBoss EAP in enterprise environments and the critical role of JWT validation in authentication and authorization workflows.

Potential Impact

The impact of CVE-2024-1233 is substantial for organizations using JBoss EAP, particularly those relying on JWT-based authentication. Successful exploitation allows attackers to induce the server to make arbitrary HTTP requests, potentially accessing internal-only services, metadata endpoints, or other sensitive resources not directly accessible externally. This can lead to information disclosure, such as leaking internal IP addresses, credentials, or configuration data. Additionally, attackers might leverage SSRF to pivot within the network, launching further attacks against internal systems, compromising integrity by injecting malicious data, or causing denial of service by overwhelming internal services. The vulnerability affects confidentiality, integrity, and availability, with no authentication or user interaction required, increasing the attack surface. Organizations in sectors like finance, government, healthcare, and critical infrastructure that use JBoss EAP are particularly at risk, as attackers could exploit this flaw to bypass perimeter defenses and access sensitive internal assets.

Mitigation Recommendations

To mitigate CVE-2024-1233, organizations should implement strict whitelisting of allowed URLs for the 'jku' parameter to ensure the server only fetches public keys from trusted, pre-approved domains. Network-level controls such as egress filtering and segmentation should be enforced to restrict outbound HTTP requests from JBoss EAP servers to only necessary destinations. Monitoring and logging outbound requests can help detect anomalous or suspicious activity indicative of SSRF exploitation attempts. Applying vendor patches or updates as soon as they become available is critical to fully remediate the vulnerability. In the interim, disabling or restricting JWT validation features that rely on external URLs, or configuring the system to use local key stores instead of remote fetching, can reduce exposure. Security teams should also conduct internal penetration testing and code reviews to identify similar SSRF risks in custom or third-party components. Finally, educating developers and administrators about SSRF risks and secure JWT handling practices will help prevent future vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-02-05T18:40:46.701Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68efb0ddb00d656ee54120c5

Added to database: 10/15/2025, 2:34:05 PM

Last enriched: 2/28/2026, 8:16:04 AM

Last updated: 3/25/2026, 5:33:31 AM

Views: 153

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses