logo

CVE-2022-39294 conduit-hyper

Package

Manager: cargo
Name: conduit-hyper
Vulnerable Version: >=0.2.0-alpha.3 <0.4.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00092 pctl0.26801

Details

conduit-hyper vulnerable to Denial of Service from unchecked request length Prior to version 0.4.2, `conduit-hyper` did not check any limit on a request's length before calling [`hyper::body::to_bytes`](https://docs.rs/hyper/latest/hyper/body/fn.to_bytes.html). An attacker could send a malicious request with an abnormally large `Content-Length`, which could lead to a panic if memory allocation failed for that request. In version 0.4.2, `conduit-hyper` sets an internal limit of 128 MiB per request, otherwise returning status 400 ("Bad Request"). This crate is part of the implementation of Rust's [crates.io](https://crates.io/), but that service is not affected due to its existing cloud infrastructure, which already drops such malicious requests. Even with the new limit in place, `conduit-hyper` is not recommended for production use, nor to directly serve the public Internet. The vulnerability was discovered by Ori Hollander from the JFrog Security Research team.

Metadata

Created: 2022-10-31T18:44:47Z
Modified: 2022-10-31T18:44:47Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-9398-5ghf-7pr6/GHSA-9398-5ghf-7pr6.json
CWE IDs: ["CWE-1284", "CWE-400"]
Alternative ID: GHSA-9398-5ghf-7pr6
Finding: F002
Auto approve: 1