Denial of Service Vulnerability in Apache Olingo by Malicious Retry-After Header
CVE-2019-17555
7.5HIGH
Summary
A vulnerability exists in the AsyncResponseWrapperImpl class of Apache Olingo versions 4.0.0 to 4.6.0, where the application processes the Retry-After header improperly. If a malicious server sends a substantially large value in this header, it can result in the Thread.sleep() method being invoked with an excessively long duration, potentially leading to a Denial of Service condition. This vulnerability underscores the importance of validating header values to prevent misuse and maintain system availability.
Affected Version(s)
Olingo 4.0.0 to 4.6.0
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved