Description
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. These waiting streams each consumed a thread. A malicious client could therefore construct a series of HTTP/2 requests that would consume all available processing threads.
Remediation
References
Related Vulnerabilities
WordPress Plugin UpdraftPlus WordPress Backup Cross-Site Request Forgery (1.23.3)
Mailman Other Vulnerability (CVE-2001-1132)
Atlassian Jira Server-Side Request Forgery (SSRF) Vulnerability (CVE-2017-16865)
WordPress Plugin GEO my WordPress Unspecified Vulnerability (2.6.1.1)
WordPress Plugin Portfolio-WordPress Portfolio Cross-Site Request Forgery (2.8.8)