Описание
<bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String
Ссылки
- ExploitThird Party Advisory
- ExploitIssue TrackingPatchThird Party Advisory
- ExploitThird Party Advisory
- ExploitIssue TrackingPatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.2.8 (исключая)
Одно из
cpe:2.3:a:axum-core_project:axum-core:*:*:*:*:*:rust:*:*
cpe:2.3:a:axum-core_project:axum-core:0.3.0:rc1:*:*:*:rust:*:*
EPSS
Процентиль: 50%
0.00266
Низкий
7.5 High
CVSS3
Дефекты
CWE-770
CWE-770
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
axum-core has no default limit put on request bodies
EPSS
Процентиль: 50%
0.00266
Низкий
7.5 High
CVSS3
Дефекты
CWE-770
CWE-770