Jetty PushSessionCacheFilter can be exploited by unauthenticated users to launch remote DoS attacks by exhausting the server’s memory.
The session usage is intrinsic to the design of the PushCacheFilter. The issue can be avoided by: + not using the PushCacheFilter. Push has been deprecated by the various IETF specs and early hints responses should be used instead. + reducing the reducing the idle timeout on unauthenticated sessions will reduce the time such session stay in memory. + configuring a session cache to use session passivation, so that sessions are not stored in memory, but rather in a database or file system that may have significantly more capacity than memory.
{ "nvd_published_at": "2024-10-14T16:15:03Z", "cwe_ids": [ "CWE-400", "CWE-770" ], "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2024-10-14T21:07:29Z" }