Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2011-12-30 01:55
Updated : 2025-04-11 00:51
NVD link : CVE-2011-4461
Mitre link : CVE-2011-4461
CVE.ORG link : CVE-2011-4461
JSON object : View
Products Affected
oracle
- sun_storage_common_array_manager
mortbay
- jetty
CWE
CWE-310
Cryptographic Issues