Description
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. These waiting streams each consumed a thread. A malicious client could therefore construct a series of HTTP/2 requests that would consume all available processing threads.
Remediation
References
Related Vulnerabilities
WordPress Plugin Tickera-WordPress Event Ticketing Cross-Site Request Forgery (3.4.9.9)
Moodle Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-5340)
MediaWiki Insufficiently Protected Credentials Vulnerability (CVE-2020-29005)
Sqlite Permissions, Privileges, and Access Controls Vulnerability (CVE-2015-6607)
WordPress Plugin Simple PDF Viewer Cross-Site Scripting (1.9)