In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Allocation of Resources Without Limits or Throttling vulnerabilities in an interactive lesson.
Start learningA fix was pushed into the master branch but not yet published.
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via repeated client-initiated TLS renegotiation requests. An attacker can exhaust server CPU resources by sending multiple renegotiation requests over unauthenticated connections.
Note:
This issue affects only TLS 1.2 users, TLS 1.3 completely removes support for renegotiation, effectively closing this potential attack vector.
This vulnerability can be mitigated by configuring the system to reject client-initiated TLS renegotiation using the Java system property -Djdk.tls.rejectClientInitiatedRenegotiation=true. Additionally, deploying the system behind proper network access controls and rate-limiting mechanisms can further reduce exposure.