Overview
About vulnerability
Applications that parse ETags from “If-Match” or “If-None-Match” request headers are vulnerable to DoS attack.
Users of affected versions should upgrade to the corresponding fixed version.
Users of older, unsupported versions could enforce a size limit on “If-Match” and “If-None-Match” headers, e.g. through a Filter.
Details
- Affected product:
- Apache Struts , Apache Tapestry , Apache Tomcat , Eclipse Jetty , Spring , activemq , camel , cocoon , crash , cxf , glassfish-hk2 , jersey , karaf , logging-log4j2 , taglibs-standard-impl , tika
- Affected packages:
- spring-bridge @ 2.2.0 (+3101 more)
Applications that parse ETags from “If-Match” or “If-None-Match” request headers are vulnerable to DoS attack.
Users of affected versions should upgrade to the corresponding fixed version.
Users of older, unsupported versions could enforce a size limit on “If-Match” and “If-None-Match” headers, e.g. through a Filter.