NA

CVE-2022-3212

Published: 14/09/2022 Updated: 16/09/2022
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

<bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

axum-core project axum-core

axum-core project axum-core 0.3.0