Description
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU.
Remediation
References
Related Vulnerabilities
silverstripeCMS Incorrect Default Permissions Vulnerability (CVE-2020-6165)
WordPress Plugin YITH Custom Thank You Page for Woocommerce Security Bypass (1.1.6)
phpMyAdmin Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2012-4219)
WordPress Plugin Zedna Contact form Directory Traversal (1.1)