mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 11:06:19 +00:00
1.4 KiB
1.4 KiB
CVE-2020-27223
Description
In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.
POC
Reference
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/EdgeSecurityTeam/Vulnerability
- https://github.com/Live-Hack-CVE/CVE-2020-2722
- https://github.com/SexyBeast233/SecBooks
- https://github.com/hshivhare67/Jetty_v9.4.31_CVE-2020-27223
- https://github.com/hshivhare67/Jetty_v9.4.31_CVE-2020-27223_beforepatch
- https://github.com/motikan2010/CVE-2020-27223
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/ttestoo/Jetty-CVE-2020-27223
- https://github.com/tzwlhack/Vulnerability