Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
(DoS) Denial of Service from unchecked request length in conduit-hyper
Vulnerability Description
conduit-hyper integrates a conduit application with the hyper server. Prior to version 0.4.2, `conduit-hyper` did not check any limit on a request's length before calling [`hyper::body::to_bytes`](https://docs.rs/hyper/latest/hyper/body/fn.to_bytes.html). An attacker could send a malicious request with an abnormally large `Content-Length`, which could lead to a panic if memory allocation failed for that request. In version 0.4.2, `conduit-hyper` sets an internal limit of 128 MiB per request, otherwise returning status 400 ("Bad Request"). This crate is part of the implementation of Rust's [crates.io](https://crates.io/), but that service is not affected due to its existing cloud infrastructure, which already drops such malicious requests. Even with the new limit in place, `conduit-hyper` is not recommended for production use, nor to directly serve the public Internet.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Vulnerability Title
conduit-hyper 资源管理错误漏洞
Vulnerability Description
conduit-hyper是conduit-rust开源的一个库。用于将导管应用程序与超级服务器集成。 conduit-hyper 0.4.2之前的版本存在安全漏洞,该漏洞源于其调用hyper::body::to_bytes之前不检查请求的长度导致攻击者可以发送过长的恶意请求导致内存分配失败。
CVSS Information
N/A
Vulnerability Type
N/A