CVE-2022-38667

HTTP applications (servers) based on Crow through 1.0+4 may allow a Use-After-Free and code execution when HTTP pipelining is used. The HTTP parser supports HTTP pipelining, but the asynchronous Connection layer is unaware of HTTP pipelining. Specifically, the Connection layer is unaware that it has begun processing a later request before it has finished processing an earlier request.
References
Link Resource
https://cwe.mitre.org/data/definitions/372.html Technical Description Third Party Advisory
https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38667.md Exploit Third Party Advisory
https://github.com/CrowCpp/Crow/pull/524 Patch Third Party Advisory
https://gynvael.coldwind.pl/?id=753 Exploit Third Party Advisory
https://cwe.mitre.org/data/definitions/372.html Technical Description Third Party Advisory
https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38667.md Exploit Third Party Advisory
https://github.com/CrowCpp/Crow/pull/524 Patch Third Party Advisory
https://gynvael.coldwind.pl/?id=753 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:crowcpp:crow:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:16

Type Values Removed Values Added
References () https://cwe.mitre.org/data/definitions/372.html - Technical Description, Third Party Advisory () https://cwe.mitre.org/data/definitions/372.html - Technical Description, Third Party Advisory
References () https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38667.md - Exploit, Third Party Advisory () https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38667.md - Exploit, Third Party Advisory
References () https://github.com/CrowCpp/Crow/pull/524 - Patch, Third Party Advisory () https://github.com/CrowCpp/Crow/pull/524 - Patch, Third Party Advisory
References () https://gynvael.coldwind.pl/?id=753 - Exploit, Third Party Advisory () https://gynvael.coldwind.pl/?id=753 - Exploit, Third Party Advisory

Information

Published : 2022-08-22 20:15

Updated : 2024-11-21 07:16


NVD link : CVE-2022-38667

Mitre link : CVE-2022-38667

CVE.ORG link : CVE-2022-38667


JSON object : View

Products Affected

crowcpp

  • crow
CWE
CWE-416

Use After Free