logo

CVE-2024-6762 org.eclipse.jetty:jetty-servlets

Package

Manager: maven
Name: org.eclipse.jetty:jetty-servlets
Vulnerable Version: >=10.0.0 <10.0.18 || >=11.0.0 <11.0.18 || >=12.0.0 <12.0.4

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

EPSS: 0.01582 pctl0.80893

Details

Eclipse Jetty's PushSessionCacheFilter can cause remote DoS attacks ### Impact Jetty PushSessionCacheFilter can be exploited by unauthenticated users to launch remote DoS attacks by exhausting the server’s memory. ### Patches * https://github.com/jetty/jetty.project/pull/9715 * https://github.com/jetty/jetty.project/pull/9716 ### Workarounds The session usage is intrinsic to the design of the PushCacheFilter. The issue can be avoided by: + not using the PushCacheFilter. Push has been deprecated by the various IETF specs and early hints responses should be used instead. + reducing the reducing the idle timeout on unauthenticated sessions will reduce the time such session stay in memory. + configuring a session cache to use [session passivation](https://jetty.org/docs/jetty/12/programming-guide/server/session.html), so that sessions are not stored in memory, but rather in a database or file system that may have significantly more capacity than memory. ### References * https://github.com/jetty/jetty.project/pull/10756 * https://github.com/jetty/jetty.project/pull/10755

Metadata

Created: 2024-10-14T21:07:29Z
Modified: 2024-11-08T22:17:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-r7m4-f9h5-gr79/GHSA-r7m4-f9h5-gr79.json
CWE IDs: ["CWE-400", "CWE-770"]
Alternative ID: GHSA-r7m4-f9h5-gr79
Finding: F067
Auto approve: 1