Description
In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.
Remediation
References
Related Vulnerabilities
Django Improper Input Validation Vulnerability (CVE-2010-4535)
WordPress Plugin Current Book Cross-Site Scripting (1.0.1)
WordPress Plugin Captcha by BestWebSoft Multiple Cross-Site Scripting Vulnerabilities (4.1.5)
XOOPS URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2017-12138)
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2012-5394)