CVE-2024-8184 – org.eclipse.jetty:jetty-server
Package
Manager: maven
Name: org.eclipse.jetty:jetty-server
Vulnerable Version: >=12.0.0 <12.0.9 || >=10.0.0 <10.0.24 || >=11.0.0 <11.0.24 || >=9.3.12 <9.4.56
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0025 pctl0.48215
Details
Eclipse Jetty's ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks ### Impact Remote DOS attack can cause out of memory ### Description There exists a security vulnerability in Jetty's `ThreadLimitHandler.getRemote()` which can be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the server's memory. ### Affected Versions * Jetty 12.0.0-12.0.8 (Supported) * Jetty 11.0.0-11.0.23 (EOL) * Jetty 10.0.0-10.0.23 (EOL) * Jetty 9.3.12-9.4.55 (EOL) ### Patched Versions * Jetty 12.0.9 * Jetty 11.0.24 * Jetty 10.0.24 * Jetty 9.4.56 ### Workarounds Do not use `ThreadLimitHandler`. Consider use of `QoSHandler` instead to artificially limit resource utilization. ### References Jetty 12 - https://github.com/jetty/jetty.project/pull/11723
Metadata
Created: 2024-10-14T21:08:38Z
Modified: 2024-10-14T21:08:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-g8m5-722r-8whq/GHSA-g8m5-722r-8whq.json
CWE IDs: ["CWE-400", "CWE-770"]
Alternative ID: GHSA-g8m5-722r-8whq
Finding: F067
Auto approve: 1