CVE-2022-3212
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/09/2022
Last modified:
16/09/2022
Description
::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:axum-core_project:axum-core:*:*:*:*:*:rust:*:* | 0.2.8 (excluding) | |
| cpe:2.3:a:axum-core_project:axum-core:0.3.0:rc1:*:*:*:rust:*:* |
To consult the complete list of CPE names with products and versions, see this page



