Описание
Jetty PushSessionCacheFilter can be exploited by unauthenticated users
to launch remote DoS attacks by exhausting the server’s memory.
A flaw was found in Jetty. In certain circumstances, this flaw allows unauthenticated users to launch remote denial of service (DoS) attacks by exhausting the server’s memory in the Jetty PushSessionCacheFilter.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
A-MQ Clients 2 | org.eclipse.jetty/jetty-servlets | Not affected | ||
OpenShift Serverless | org.eclipse.jetty/jetty-servlets | Not affected | ||
Red Hat build of Apache Camel for Spring Boot 3 | org.eclipse.jetty/jetty-servlets | Not affected | ||
Red Hat build of Apache Camel for Spring Boot 4 | org.eclipse.jetty/jetty-servlets | Not affected | ||
Red Hat build of Apicurio Registry 2 | org.eclipse.jetty/jetty-servlets | Not affected | ||
Red Hat build of Debezium 2 | org.eclipse.jetty/jetty-servlets | Not affected | ||
Red Hat Build of Keycloak | org.eclipse.jetty/jetty-servlets | Not affected | ||
Red Hat Data Grid 8 | org.eclipse.jetty/jetty-servlets | Not affected | ||
Red Hat Fuse 7 | org.eclipse.jetty/jetty-servlets | Not affected | ||
Red Hat Integration Camel K 1 | org.eclipse.jetty/jetty-servlets | Not affected |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
EPSS
3.1 Low
CVSS3
Связанные уязвимости
Jetty PushSessionCacheFilter can be exploited by unauthenticated users to launch remote DoS attacks by exhausting the server’s memory.
Jetty PushSessionCacheFilter can be exploited by unauthenticated users to launch remote DoS attacks by exhausting the server’s memory.
Jetty PushSessionCacheFilter can be exploited by unauthenticated users ...
Eclipse Jetty's PushSessionCacheFilter can cause remote DoS attacks
Уязвимость контейнера сервлетов Eclipse Jetty, связанная с некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
3.1 Low
CVSS3