Improper Input Validation in Jetty
Moderate severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Apr 19, 2024
Package
Affected versions
<= 8.1.0.RC2
Patched versions
8.1.0.RC4
Description
Published by the National Vulnerability Database
Dec 30, 2011
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jul 13, 2022
Last updated
Apr 19, 2024
Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
References