CVE-2011-5035

Source: cve@mitre.org

MEDIUM
5.0
Published: December 30, 2011 at 01:55 AM
Modified: April 11, 2025 at 12:51 AM

Vulnerability Description

Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.

CVSS Metrics

Base Score
5.0
Severity
MEDIUM
Vector String
AV:N/AC:L/Au:N/C:N/I:N/A:P

Weaknesses (CWE)

Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Oracle GlassFish servers are vulnerable to a denial-of-service (DoS) attack due to a flaw in how they handle form parameters. Attackers can exploit this vulnerability by sending a large number of crafted parameters, causing the server to consume excessive CPU resources and become unresponsive, effectively shutting down critical services.

02 // Vulnerability Mechanism

Step 1: Parameter Crafting: The attacker identifies the target GlassFish server and its exposed form parameters.

Step 2: Collision Generation: The attacker crafts a large number of form parameters designed to collide within the GlassFish hash table. This involves generating parameters that, when hashed by the vulnerable function, produce the same hash value.

Step 3: Payload Delivery: The attacker sends a POST request containing the crafted parameters to a vulnerable endpoint on the GlassFish server.

Step 4: Hash Collision Trigger: The GlassFish server receives the request and begins processing the form parameters. The vulnerable hash function is invoked to store and retrieve these parameters.

Step 5: CPU Exhaustion: Due to the hash collisions, the server spends a significant amount of CPU time comparing the colliding parameters, leading to high CPU utilization.

Step 6: Denial of Service: The server becomes unresponsive to legitimate requests, resulting in a denial-of-service condition.

03 // Deep Technical Analysis

The vulnerability lies in the implementation of hash functions used to process form parameters within Oracle GlassFish. Specifically, the hash function used to store and retrieve form parameters is susceptible to hash collisions. An attacker can craft a set of parameters that, when hashed, all map to the same bucket within the hash table. This leads to a significant performance degradation as the server spends an excessive amount of time comparing the attacker-supplied parameters. The root cause is the lack of proper collision resistance in the hash function, allowing for predictable collisions. This results in CPU exhaustion and a denial-of-service condition.

04 // Exploitation Status

Public PoC. Exploits are readily available and easily adaptable. The vulnerability is relatively simple to exploit, making it a high-risk threat.

05 // Threat Intelligence

While no specific APTs are directly linked to this CVE, the ease of exploitation makes it attractive to various threat actors. This vulnerability could be used as a stepping stone for further attacks. CISA KEV: Not Listed.

06 // Detection & Hunting

  • High CPU utilization on GlassFish server processes.

  • Unusually long response times for web requests.

  • Network traffic analysis showing a large number of POST requests with a high volume of form parameters.

  • Log analysis of GlassFish server logs for signs of excessive processing or errors related to parameter handling.

  • Monitoring of application server metrics for sudden spikes in CPU usage or memory consumption.

07 // Remediation & Hardening

  • Upgrade to a patched version of GlassFish or a version that is no longer vulnerable. Check Oracle's security advisories for the latest patches.

  • Implement a Web Application Firewall (WAF) to filter malicious requests, including those with a large number of parameters.

  • Limit the number of parameters accepted by web applications.

  • Monitor server resource usage (CPU, memory, network) and set up alerts for unusual activity.

  • Review and harden the GlassFish configuration to minimize attack surface.

  • Implement rate limiting on request processing to mitigate potential DoS attacks.

08 // Affected Products

Oracle Glassfish 2.1.1Oracle Glassfish 3.0.1Oracle Glassfish 3.1.1Communications Server 2.0 (using GlassFish)Sun Java System Application Server 8.1 (using GlassFish)Sun Java System Application Server 8.2 (using GlassFish)

09 // Discovered Proof of Concept Links

Advertisement

References & Intelligence

http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html
Source: cve@mitre.org
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html
Source: cve@mitre.org
http://marc.info/?l=bugtraq&m=133364885411663&w=2
Source: cve@mitre.org
http://marc.info/?l=bugtraq&m=133847939902305&w=2
Source: cve@mitre.org
http://marc.info/?l=bugtraq&m=134254866602253&w=2
Source: cve@mitre.org
http://marc.info/?l=bugtraq&m=134254957702612&w=2
Source: cve@mitre.org
http://marc.info/?l=bugtraq&m=139344343412337&w=2
Source: cve@mitre.org
http://rhn.redhat.com/errata/RHSA-2012-0514.html
Source: cve@mitre.org
http://rhn.redhat.com/errata/RHSA-2013-1455.html
Source: cve@mitre.org
http://secunia.com/advisories/48073
Source: cve@mitre.org
http://secunia.com/advisories/48074
Source: cve@mitre.org
http://secunia.com/advisories/48589
Source: cve@mitre.org
http://secunia.com/advisories/48950
Source: cve@mitre.org
http://secunia.com/advisories/57126
Source: cve@mitre.org
http://security.gentoo.org/glsa/glsa-201406-32.xml
Source: cve@mitre.org
http://www.debian.org/security/2012/dsa-2420
Source: cve@mitre.org
http://www.kb.cert.org/vuls/id/903934
Source: cve@mitre.org
US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
Source: cve@mitre.org
http://www.nruns.com/_downloads/advisory28122011.pdf
Source: cve@mitre.org
http://www.ocert.org/advisories/ocert-2011-003.html
Source: cve@mitre.org
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html
Source: cve@mitre.org
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
Source: cve@mitre.org
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
Source: cve@mitre.org
https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py
Source: cve@mitre.org
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16908
Source: cve@mitre.org
http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=133364885411663&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=133847939902305&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=134254866602253&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=134254957702612&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=139344343412337&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2012-0514.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2013-1455.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/48073
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/48074
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/48589
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/48950
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/57126
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-201406-32.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2012/dsa-2420
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/903934
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.nruns.com/_downloads/advisory28122011.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ocert.org/advisories/ocert-2011-003.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html
Source: af854a3a-2127-422b-91ae-364da2661108
https://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.py
Source: af854a3a-2127-422b-91ae-364da2661108
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16908
Source: af854a3a-2127-422b-91ae-364da2661108