CVE-2022-3212

<bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String
References
Link Resource
https://research.jfrog.com/vulnerabilities/axum-core-dos/ Exploit Third Party Advisory
https://rustsec.org/advisories/RUSTSEC-2022-0055.html Exploit Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:axum-core_project:axum-core:*:*:*:*:*:rust:*:*
cpe:2.3:a:axum-core_project:axum-core:0.3.0:rc1:*:*:*:rust:*:*

History

No history.

Information

Published : 2022-09-14 16:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-3212

Mitre link : CVE-2022-3212

CVE.ORG link : CVE-2022-3212


JSON object : View

Products Affected

axum-core_project

  • axum-core
CWE
CWE-770

Allocation of Resources Without Limits or Throttling