View all vulnerabilities

CVE-2024-8184

Eclipse Jetty's ThreadLimitHandler.getRemote() vulnerable to remote DoS attacks

### ImpactRemote DOS attack can cause out of memory ### DescriptionThere exists a security vulnerability in Jetty's `ThreadLimitHandler.getRemote()` whichcan be exploited by unauthorized users to cause remote denial-of-service (DoS) attack. Byrepeatedly sending crafted requests, attackers can trigger OutofMemory errors and exhaust theserver's memory.### Affected Versions* Jetty 12.0.0-12.0.8 (Supported)* Jetty 11.0.0-11.0.23 (EOL)* Jetty 10.0.0-10.0.23 (EOL)* Jetty 9.3.12-9.4.55 (EOL)### Patched Versions* Jetty 12.0.9* Jetty 11.0.24* Jetty 10.0.24* Jetty 9.4.56### WorkaroundsDo not use `ThreadLimitHandler`. Consider use of `QoSHandler` instead to artificially limit resource utilization.### ReferencesJetty 12 - https://github.com/jetty/jetty.project/pull/11723

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
5.8
Score Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Versions
org.eclipse.jetty:jetty-server >= 12.0.0 < 12.0.9; org.eclipse.jetty:jetty-server >= 10.0.0 < 10.0.24; org.eclipse.jetty:jetty-server >= 11.0.0 < 11.0.24; org.eclipse.jetty:jetty-server >= 9.3.12 < 9.4.56
Severity
Medium
Ecosystem
Publish Date
October 14, 2024
Modified Date
November 8, 2024