Overview
About vulnerability
Applications that parse ETags from “If-Match” or “If-None-Match” request headers are vulnerable to DoS attack.
Users of affected versions should upgrade to the corresponding fixed version.
Users of older, unsupported versions could enforce a size limit on “If-Match” and “If-None-Match” headers, e.g. through a Filter.
Details
- Affected product:
- Apache Struts , Apache Tapestry , Apache Tomcat , Eclipse Jetty , Spring , activemq , camel , cocoon , cxf , jersey , karaf , logging-log4j2 , taglibs-standard-impl , tika
- Affected packages:
- cxf-services-xkms-features @ 3.5.11 (+2286 more)
Applications that parse ETags from “If-Match” or “If-None-Match” request headers are vulnerable to DoS attack.
Users of affected versions should upgrade to the corresponding fixed version.
Users of older, unsupported versions could enforce a size limit on “If-Match” and “If-None-Match” headers, e.g. through a Filter.