Allocation of Resources Without Limits or Throttling Affecting axum-core package, versions <0.3.0-rc.2
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.07% (31st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUST-AXUMCORE-3023730
- published 15 Sep 2022
- disclosed 15 Sep 2022
- credit Johseg
Introduced: 15 Sep 2022
CVE-2022-3212 Open this link in a new tabHow to fix?
Upgrade axum-core
to version 0.3.0-rc.2 or higher.
Overview
axum-core is an ergonomic and modular web framework built with Tokio, Tower, and Hyper
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to improper limitation of the request body size in <bytes::Bytes as axum_core::extract::FromRequest>::from_request
Note
This also applies to these extractors which used Bytes::from_request
internally:
axum::extract::Form
axum::extract::Json
String