CVE-2024-6762

Jetty PushSessionCacheFilter can be exploited by unauthenticated users to launch remote DoS attacks by exhausting the server’s memory.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*

History

08 Nov 2024, 21:29

Type Values Removed Values Added
First Time Eclipse jetty
Eclipse
CPE cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 3.1
v2 : unknown
v3 : 6.5
CWE CWE-770
References () https://github.com/jetty/jetty.project/pull/10755 - () https://github.com/jetty/jetty.project/pull/10755 - Patch
References () https://github.com/jetty/jetty.project/pull/10756 - () https://github.com/jetty/jetty.project/pull/10756 - Patch
References () https://github.com/jetty/jetty.project/pull/9715 - () https://github.com/jetty/jetty.project/pull/9715 - Patch
References () https://github.com/jetty/jetty.project/pull/9716 - () https://github.com/jetty/jetty.project/pull/9716 - Patch
References () https://github.com/jetty/jetty.project/security/advisories/GHSA-r7m4-f9h5-gr79 - () https://github.com/jetty/jetty.project/security/advisories/GHSA-r7m4-f9h5-gr79 - Vendor Advisory
References () https://gitlab.eclipse.org/security/cve-assignement/-/issues/24 - () https://gitlab.eclipse.org/security/cve-assignement/-/issues/24 - Issue Tracking, Vendor Advisory

15 Oct 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) Jetty PushSessionCacheFilter puede ser explotado por usuarios no autenticados para lanzar ataques DoS remotos agotando la memoria del servidor.

14 Oct 2024, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-14 16:15

Updated : 2024-11-08 21:29


NVD link : CVE-2024-6762

Mitre link : CVE-2024-6762

CVE.ORG link : CVE-2024-6762


JSON object : View

Products Affected

eclipse

  • jetty
CWE
CWE-770

Allocation of Resources Without Limits or Throttling

CWE-400

Uncontrolled Resource Consumption