- Description
- In Eclipse Jetty, versions <=9.4.57, <=10.0.25, <=11.0.25, <=12.0.21, <=12.1.0.alpha2, an HTTP/2 client may trigger the server to send RST_STREAM frames, for example by sending frames that are malformed or that should not be sent in a particular stream state, therefore forcing the server to consume resources such as CPU and memory. For example, a client can open a stream and then send WINDOW_UPDATE frames with window size increment of 0, which is illegal. Per specification https://www.rfc-editor.org/rfc/rfc9113.html#name-window_update , the server should send a RST_STREAM frame. The client can now open another stream and send another bad WINDOW_UPDATE, therefore causing the server to consume more resources than necessary, as this case does not exceed the max number of concurrent streams, yet the client is able to create an enormous amount of streams in a short period of time. The attack can be performed with other conditions (for example, a DATA frame for a closed stream) that cause the server to send a RST_STREAM frame. Links: * https://github.com/jetty/jetty.project/security/advisories/GHSA-mmxm-8w33-wc4h
- Source
- emo@eclipse.org
- NVD status
- Analyzed
- Products
- jetty
CVSS 4.0
- Type
- Secondary
- Base score
- 7.7
- Impact score
- -
- Exploitability score
- -
- Vector string
- CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Severity
- HIGH
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- emo@eclipse.org
- CWE-400
- Hype score
- Not currently trending
⚠️Vulnerabilidad en productos Jenkins ❗CVE-2025-5115 ➡️Más info: https://t.co/ntk4JvQQTL https://t.co/mU9SCRguLA
@CERTpy
26 Sept 2025
82 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
URGENT: Patch #SUSE Linux now for CVE-2025-5115! CVSS: 8.7 - Critical HTTP/2 DoS vuln in jetty-minimal. Read more: 👉 https://t.co/C5hCwoKGxk #Security https://t.co/AFmIdmNgyb
@Cezar_H_Linux
28 Aug 2025
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
openSUSE: jetty-annotations Moderate CVE-2025-5115 Advisory 2025:15483-1 https://t.co/YO2Z8c0XNl
@zeeshankghouri
25 Aug 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Security Advisory: #openSUSE Tumbleweed has released a patch for CVE-2025-5115, a moderate vulnerability in the jetty-annotations package (v9.4.58-1.1). Read more: 👉 https://t.co/kgWSU4RoCQ #Security https://t.co/SpSrFswQmL
@Cezar_H_Linux
24 Aug 2025
70 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Hey Open Source Community! 👋 A new security update is available for #openSUSE Tumbleweed users. The latest patch addresses a moderate-severity vulnerability (CVE-2025-5115) in the Jetty web server's annotations module. Read more:👉 https://t.co/RAAVsqcj00 #Security https:/
@Cezar_H_Linux
24 Aug 2025
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-5115 In Eclipse Jetty, versions <=9.4.57, <=10.0.25, <=11.0.25, <=12.0.21, <=12.1.0.alpha2, an HTTP/2 client may trigger the server to send RST_STREAM frames, for example by… https://t.co/9D4KNVzGUu
@CVEnew
21 Aug 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-5115 HTTP/2 Resource Exhaustion Vulnerability in Eclipse Jetty Versions <=12.1.0.alpha2 https://t.co/JvXmmq4a1W
@VulmonFeeds
20 Aug 2025
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F512BB3-9D38-43E0-9962-876DA3232AE2",
"versionEndIncluding": "9.4.57",
"versionStartIncluding": "9.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD3D394-58B1-4E91-8F5C-E343F6EB4108",
"versionEndIncluding": "10.0.25",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8C48CF-A987-4C4C-A1B5-8E6B2D321DAB",
"versionEndIncluding": "11.0.25",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B535FBFA-91E1-4E8E-8731-1671DEA66413",
"versionEndIncluding": "12.0.21",
"versionStartIncluding": "12.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:eclipse:jetty:12.1.0:alpha0:*:*:*:*:*:*",
"matchCriteriaId": "4E708B1F-1405-48BA-8B32-9611D491286C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:eclipse:jetty:12.1.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "A837B906-9792-4AFA-8391-C8A00913E1D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:eclipse:jetty:12.1.0:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "E8D7F1B4-3C3F-48FF-A7F0-C5462171E6EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]