Описание
libhttp/url.c in shellinabox through 2.20 has an implementation flaw in the HTTP request parsing logic. By sending a crafted multipart/form-data HTTP request, an attacker could exploit this to force shellinaboxd into an infinite loop, exhausting available CPU resources and taking the service down.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needs-triage |
| cosmic | ignored | end of life |
| devel | not-affected | 2.21 |
| disco | not-affected | 2.21 |
| eoan | not-affected | 2.21 |
| esm-apps/bionic | needs-triage | |
| esm-apps/focal | not-affected | 2.21 |
| esm-apps/jammy | not-affected | 2.21 |
| esm-apps/noble | not-affected | 2.21 |
| esm-apps/xenial | needs-triage |
Показывать по
7.8 High
CVSS2
7.5 High
CVSS3
Связанные уязвимости
libhttp/url.c in shellinabox through 2.20 has an implementation flaw in the HTTP request parsing logic. By sending a crafted multipart/form-data HTTP request, an attacker could exploit this to force shellinaboxd into an infinite loop, exhausting available CPU resources and taking the service down.
libhttp/url.c in shellinabox through 2.20 has an implementation flaw i ...
libhttp/url.c in shellinabox through 2.20 has an implementation flaw in the HTTP request parsing logic. By sending a crafted multipart/form-data HTTP request, an attacker could exploit this to force shellinaboxd into an infinite loop, exhausting available CPU resources and taking the service down.
7.8 High
CVSS2
7.5 High
CVSS3