<bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String
References
Link Resource
https://research.jfrog.com/vulnerabilities/axum-core-dos/ Exploit Third Party Advisory
https://rustsec.org/advisories/RUSTSEC-2022-0055.html Exploit Issue Tracking Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: JFROG

Published: 2022-09-14T16:05:09

Updated: 2022-09-14T16:05:09

Reserved: 2022-09-14T00:00:00


Link: CVE-2022-3212

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-09-14T16:15:11.883

Modified: 2022-09-16T19:22:49.303


Link: CVE-2022-3212

JSON object: View

cve-icon Redhat Information

No data.

CWE