-
Bug
-
Resolution: Done
-
Major
-
None
-
None
-
None
There are insufficient limitations placed on the amount of CONTINUATION frames that can be sent within a single stream. This issue could allow an unauthenticated remote attacker to send packets to vulnerable servers, which could use up memory resources to cause a Denial of Service.
We have a max header config in Undertow that cna be used to limit the amount of continuatoin frames, but it is not being enforced by default.
- is incorporated by
-
WFCORE-6862 CVE-2024-6162 CVE-2024-27316 Upgrade Undertow to 2.3.14.Final
- Resolved
- is related to
-
UNDERTOW-2411 Create HTTP2_MAX_HEADER_SIZE UndertowOption
- Open