Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2011-12-29 17:55
Updated : 2019-03-08 03:29
NVD link : CVE-2011-4461
Mitre link : CVE-2011-4461
JSON object : View
CWE
CWE-310
Cryptographic Issues
Products Affected
oracle
- sun_storage_common_array_manager
mortbay
- jetty