<bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
axum-core project axum-core |
||
axum-core project axum-core 0.3.0 |