Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2011-12-30 01:55
Updated : 2024-02-04 17:54
NVD link : CVE-2011-4461
Mitre link : CVE-2011-4461
CVE.ORG link : CVE-2011-4461
JSON object : View
Products Affected
mortbay
- jetty
oracle
- sun_storage_common_array_manager
CWE
CWE-310
Cryptographic Issues