CVE-2022-3212
14.09.2022, 16:15
<bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json StringEnginsight
Vendor | Product | Version |
---|---|---|
axum-core_project | axum-core | 𝑥 < 0.2.8 |
axum-core_project | axum-core | 0.3.0:rc1 |
𝑥
= Vulnerable software versions