Cryptographic Issues Affecting org.eclipse.jetty.aggregate:jetty-servlet package, versions [,8.1.0.RC4)


Severity

0.0
medium
0
10

    Threat Intelligence

    EPSS
    1.65% (88th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JAVA-ORGECLIPSEJETTYAGGREGATE-31124
  • published 13 May 2015
  • disclosed 30 Dec 2011
  • credit Alexander Klink

How to fix?

Upgrade org.eclipse.jetty.aggregate:jetty-servlet to version 8.1.0.RC4 or higher.

Overview

org.eclipse.jetty.aggregate:jetty-servlet is a lightweight highly scalable java based web server and servlet engine.

Affected versions of this package are vulnerable to Cryptographic Issues. It computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.

References

CVSS Scores

version 3.1
Expand this section

Snyk

5.3 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    None
  • Integrity (I)
    None
  • Availability (A)
    Low
Expand this section

NVD

5.3 medium
Expand this section

Red Hat

5.3 medium