Miggo Logo

CVE-2025-5115: Eclipse Jetty affected by MadeYouReset HTTP/2 vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
-
Published
8/20/2025
Updated
8/20/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.eclipse.jetty.http2:http2-commonmaven>= 9.3.0, <= 9.4.579.4.58
org.eclipse.jetty.http2:http2-commonmaven>= 10.0.0, <= 10.0.2510.0.26
org.eclipse.jetty.http2:http2-commonmaven>= 11.0.0, <= 11.0.2511.0.26
org.eclipse.jetty.http2:jetty-http2-commonmaven>= 12.0.0, <= 12.0.2412.0.25
org.eclipse.jetty.http2:jetty-http2-commonmaven>= 12.1.0.alpha0, <= 12.1.0.beta212.1.0.beta3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability lies in the HTTP/2 implementation's handling of certain control frames, which allows a client to trigger an unbounded number of stream resets from the server, leading to a denial of service. The analysis of the patch clearly shows two primary vulnerable code paths that were fixed. The first is in WindowUpdateBodyParser.onWindowUpdate, which improperly handled WINDOW_UPDATE frames with a zero-delta value. The second is in HTTP2Session.onWindowUpdate, which did not properly handle WINDOW_UPDATE frames sent to streams that were already closed. Both of these functions would be on the execution path during an exploit, as they are responsible for processing the malicious frames. The patch mitigates the vulnerability by introducing rate-limiting in these functions, preventing the server from being overwhelmed by reset-triggering frames. Therefore, these two functions are identified as the core vulnerable functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## T***ni**l **t*ils **low is * t***ni**l *xpl*n*tion o* * n*wly *is*ov*r** vuln*r**ility in *TTP/*, w*i** w* r***r to *s “M***YouR*s*t.” ### M***YouR*s*t Vuln*r**ility Summ*ry T** M***YouR*s*t **oS vuln*r**ility is * lo*i**l vuln*r**ility in t** *

Reasoning

T** vuln*r**ility li*s in t** *TTP/* impl*m*nt*tion's **n*lin* o* **rt*in *ontrol *r*m*s, w*i** *llows * *li*nt to tri***r *n un*oun*** num**r o* str**m r*s*ts *rom t** s*rv*r, l***in* to * **ni*l o* s*rvi**. T** *n*lysis o* t** p*t** *l**rly s*ows t