Division by zero Affecting vproxy package, versions <2.4.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-VPROXY-11343423
  • published31 Jul 2025
  • disclosed30 Jul 2025
  • creditUnknown

Introduced: 30 Jul 2025

NewCVE-2025-54581  (opens in a new tab)
CWE-369  (opens in a new tab)

How to fix?

Upgrade vproxy to version 2.4.0 or higher.

Overview

Affected versions of this package are vulnerable to Division by zero via the parse_ttl_extension function in the extension.rs file. An attacker can cause the server to crash by supplying a specially crafted HTTP Proxy-Authorization header with a TTL value of zero, resulting in a division by zero during the modulo operation.

PoC

  1. Send a cUrl request like the following, adjusting address and port as necessary: ;curl -x "http://test-ttl-0:test@127.0.0.1:8101" https://google.com;
  2. Wait for a cUrl error indicating "Proxy CONNECT aborted"
  3. View logs from the vproxy server
  4. Observe that the vproxy server crashed due to a divide-by-zero panic

CVSS Base Scores

version 4.0
version 3.1