VYPR
Moderate severityNVD Advisory· Published Apr 18, 2023· Updated Feb 13, 2025

OutOfMemoryError for large multipart without filename in Eclipse Jetty

CVE-2023-26048

Description

Jetty is a java based web server and servlet engine. In affected versions servlets with multipart support (e.g. annotated with @MultipartConfig) that call HttpServletRequest.getParameter() or HttpServletRequest.getParts() may cause OutOfMemoryError when the client sends a multipart request with a part that has a name but no filename and very large content. This happens even with the default settings of fileSizeThreshold=0 which should stream the whole part content to disk. An attacker client may send a large multipart request and cause the server to throw OutOfMemoryError. However, the server may be able to recover after the OutOfMemoryError and continue its service -- although it may take some time. This issue has been patched in versions 9.4.51, 10.0.14, and 11.0.14. Users are advised to upgrade. Users unable to upgrade may set the multipart parameter maxRequestSize which must be set to a non-negative value, so the whole multipart content is limited (although still read into memory).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Jetty servlet multipart parsing can trigger OutOfMemoryError when a large part with a name but no filename is sent, even with streaming configured.

Vulnerability

CVE-2023-26048 is a denial-of-service vulnerability in Eclipse Jetty, affecting servlets configured for multipart processing (e.g., annotated with @MultipartConfig). When HttpServletRequest.getParameter() or HttpServletRequest.getParts() is invoked on a multipart request containing a part that has a name but no filename and a very large content, Jetty may throw an OutOfMemoryError. This occurs even when the default fileSizeThreshold=0 is set, which should normally cause the entire part content to be streamed to disk rather than held in memory [1].

Exploitation

An attacker can exploit this by sending a crafted multipart request with one part that satisfies the name/no-filename condition and carries an extremely large payload. No authentication is required; the issue can be triggered remotely through a standard HTTP request to any vulnerable endpoint with multipart handling enabled [1]. The server may eventually recover after the OutOfMemoryError, but service disruption and degraded performance will occur during the recovery period.

Impact

The primary impact is denial of service (DoS) – the JVM's heap is exhausted, leading to an OutOfMemoryError. Although the server can continue after recovery, the attack consumes resources and can cause temporary unavailability of the affected application [1].

Mitigation

Patches are available in Jetty versions 9.4.51, 10.0.14, and 11.0.14 [1]. Users unable to upgrade immediately can mitigate the issue by setting the multipart parameter maxRequestSize to a non-negative value, which limits the total size of the multipart content (though it remains read into memory) [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.eclipse.jetty:jetty-serverMaven
< 9.4.51.v202302179.4.51.v20230217
org.eclipse.jetty:jetty-serverMaven
>= 10.0.0, < 10.0.1410.0.14
org.eclipse.jetty:jetty-serverMaven
>= 11.0.0, < 11.0.1411.0.14

Affected products

13

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

0

No linked articles in our index yet.