CVE-2024-1233

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers to perform server-side request forgery (SSRF) attacks against JBoss EAP servers. When the JWT validator processes tokens with a 'jku' (JWK Set URL) parameter, it fetches public keys from arbitrary URLs without validation, enabling attackers to make the server send HTTP requests to internal or external systems. This affects JBoss EAP deployments using JWT validation with the vulnerable component.

💻 Affected Systems

Products:
  • JBoss EAP
Versions: Multiple versions as specified in Red Hat advisories
Operating Systems: Linux, Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when using JWT validation with the JwtValidator component that processes 'jku' parameters. Not all JBoss EAP deployments use this feature.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or pivot to other systems by making the vulnerable server send requests to internal network resources, potentially leading to data breaches or further compromise.

🟠

Likely Case

Attackers could probe internal networks, access metadata services (like AWS/Azure instance metadata), or interact with internal APIs to gather information or perform limited actions.

🟢

If Mitigated

With proper network segmentation and egress filtering, impact would be limited to external resources only, reducing the risk of internal network compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the ability to submit JWT tokens to the vulnerable endpoint. The vulnerability is straightforward to exploit once an attacker can interact with the JWT validation functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple versions as specified in Red Hat advisories RHSA-2024:3559, RHSA-2024:3560, RHSA-2024:3561, RHSA-2024:3563, RHSA-2024:3580

Vendor Advisory: https://access.redhat.com/errata/RHSA-2024:3559

Restart Required: Yes

Instructions:

1. Identify affected JBoss EAP version. 2. Apply the appropriate Red Hat patch from the advisory links. 3. Restart the JBoss EAP server. 4. Verify the fix by checking the version and testing JWT validation.

🔧 Temporary Workarounds

Disable jku processing

all

Configure JWT validation to ignore or reject tokens containing 'jku' parameters

Modify JWT validator configuration to set 'allowJku' to false or implement custom validation that rejects jku URLs

Network egress filtering

all

Restrict outbound HTTP requests from JBoss EAP servers to only trusted domains

Configure firewall rules to block outbound HTTP/HTTPS from JBoss servers except to approved destinations

🧯 If You Can't Patch

  • Implement network segmentation to isolate JBoss EAP servers from sensitive internal systems
  • Deploy web application firewall (WAF) rules to block JWT tokens containing suspicious jku URLs

🔍 How to Verify

Check if Vulnerable:

Check if JBoss EAP is using JWT validation with JwtValidator and if the version matches affected ranges in Red Hat advisories

Check Version:

jboss-cli.sh --connect --command=":read-attribute(name=product-version)" or check server logs for version information

Verify Fix Applied:

Verify the JBoss EAP version has been updated to a patched version and test that JWT tokens with jku parameters no longer trigger unfiltered HTTP requests

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from JBoss EAP server to unexpected domains
  • JWT validation errors or warnings related to jku processing

Network Indicators:

  • HTTP requests from JBoss servers to internal IP ranges or unusual external domains
  • Pattern of requests triggered by JWT validation

SIEM Query:

source="jboss" AND (http_request OR url_fetch) AND (jku OR jwks_uri)

🔗 References

📤 Share & Export