5.3

CVE-2020-27223

In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhausted processing those quality values.

Data is provided by the National Vulnerability Database (NVD)
EclipseJetty Version >= 9.4.7 < 9.4.36
EclipseJetty Version9.4.6 Update20170531
EclipseJetty Version9.4.6 Update20180619
EclipseJetty Version9.4.36 Update-
EclipseJetty Version9.4.36 Update20210114
EclipseJetty Version10.0.0 Update-
EclipseJetty Version11.0.0 Update-
ApacheNifi Version1.13.0
ApacheSpark Version3.1.1 Update-
NetappE-series Santricity Os Controller Version >= 11.0.0 <= 11.70.1
NetappE-series Santricity Web Services Version- SwPlatformweb_services_proxy
NetappHci Version-
NetappSnapcenter Version-
NetappSnapmanager Version- SwPlatformoracle
NetappSnapmanager Version- SwPlatformsap
NetappSolidfire Version-
DebianDebian Linux Version10.0
ApacheSolr Version8.8.1
OracleRest Data Services SwEdition- Version < 20.4.3.050.1904
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 33.82% 0.968
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
emo@eclipse.org 5.2 1.5 3.6
CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

CWE-407 Inefficient Algorithmic Complexity

An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached.