Eclipse Jetty's ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks
Moderate severity
GitHub Reviewed
Published
Oct 14, 2024
in
jetty/jetty.project
•
Updated Nov 8, 2024
Package
Affected versions
>= 12.0.0, <= 12.0.8
>= 10.0.0, <= 10.0.23
>= 11.0.0, <= 11.0.23
>= 9.3.12, <= 9.4.55
Patched versions
12.0.9
10.0.24
11.0.24
9.4.56
Description
Published by the National Vulnerability Database
Oct 14, 2024
Published to the GitHub Advisory Database
Oct 14, 2024
Reviewed
Oct 14, 2024
Last updated
Nov 8, 2024
Impact
Remote DOS attack can cause out of memory
Description
There exists a security vulnerability in Jetty's
ThreadLimitHandler.getRemote()
whichcan be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. By
repeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust the
server's memory.
Affected Versions
Patched Versions
Workarounds
Do not use
ThreadLimitHandler
.Consider use of
QoSHandler
instead to artificially limit resource utilization.References
Jetty 12 - jetty/jetty.project#11723
References