mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 19:16:22 +00:00
1.4 KiB
1.4 KiB
CVE-2020-11996
Description
A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
POC
Reference
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/dromara/J2EEFAST
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/rusakovichma/tomcat-embed-core-9.0.31-CVE-2020-11996
- https://github.com/soosmile/POC
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough