A flaw was found in` JwtValidator.resolvePublicKey` in JBoss EAP, where the validator checks jku and sends a HTTP request. During this process, no whitelisting or other filtering behavior is performed on the destination URL address, which may result in a server-side request forgery (SSRF) vulnerability.
https://issues.redhat.com/browse/WFLY-19226
https://github.com/wildfly/wildfly/pull/17812/commits/0c02350bc0d84287bed46e7c32f90b36e50d3523
https://github.com/advisories/GHSA-v4mm-q8fv-r2w5
https://bugzilla.redhat.com/show_bug.cgi?id=2262849
https://access.redhat.com/security/cve/CVE-2024-1233
https://access.redhat.com/errata/RHSA-2024:3583
https://access.redhat.com/errata/RHSA-2024:3581
https://access.redhat.com/errata/RHSA-2024:3580
https://access.redhat.com/errata/RHSA-2024:3563
https://access.redhat.com/errata/RHSA-2024:3561