|Re: [jetty-users] POST params, DoS from hash collisions|
Last week, a widespread denial of service vulnerability was announced wherein the attacker can choose specific strings (or other objects) which all resolve to the same hashtable key. A POST request would be sufficient to trigger the denial of service.Jetty is listed as one of the vulnerable web servers (among many others) and Oracle, I believe, has stated that they will not release any update. One mitigation is limiting a request size, however, the attack's effect is only reduced.Is anyone working on a real fix for Jetty by placing request parameters into a different Map structure?
jetty-users mailing list
Back to the top