Allocation of Resources Without Limits or Throttling Affecting axum-core package, versions <0.3.0-rc.2


0.0
medium

Snyk CVSS

    Exploit Maturity Proof of concept
    Attack Complexity Low
    User Interaction Required
Expand this section
NVD
7.5 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-RUST-AXUMCORE-3023730
  • published 15 Sep 2022
  • disclosed 15 Sep 2022
  • credit Johseg

How to fix?

Upgrade axum-core to version 0.3.0-rc.2 or higher.

Overview

axum-core is an ergonomic and modular web framework built with Tokio, Tower, and Hyper

Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to improper limitation of the request body size in <bytes::Bytes as axum_core::extract::FromRequest>::from_request

Note

This also applies to these extractors which used Bytes::from_request internally:

  1. axum::extract::Form

  2. axum::extract::Json

  3. String