Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-39294— (DoS) Denial of Service from unchecked request length in conduit-hyper

CVSS 7.5 · High EPSS 0.33% · P56
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-39294

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
(DoS) Denial of Service from unchecked request length in conduit-hyper
Source: NVD (National Vulnerability Database)
Vulnerability Description
conduit-hyper integrates a conduit application with the hyper server. Prior to version 0.4.2, `conduit-hyper` did not check any limit on a request's length before calling [`hyper::body::to_bytes`](https://docs.rs/hyper/latest/hyper/body/fn.to_bytes.html). An attacker could send a malicious request with an abnormally large `Content-Length`, which could lead to a panic if memory allocation failed for that request. In version 0.4.2, `conduit-hyper` sets an internal limit of 128 MiB per request, otherwise returning status 400 ("Bad Request"). This crate is part of the implementation of Rust's [crates.io](https://crates.io/), but that service is not affected due to its existing cloud infrastructure, which already drops such malicious requests. Even with the new limit in place, `conduit-hyper` is not recommended for production use, nor to directly serve the public Internet.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Source: NVD (National Vulnerability Database)
Vulnerability Title
conduit-hyper 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
conduit-hyper是conduit-rust开源的一个库。用于将导管应用程序与超级服务器集成。 conduit-hyper 0.4.2之前的版本存在安全漏洞,该漏洞源于其调用hyper::body::to_bytes之前不检查请求的长度导致攻击者可以发送过长的恶意请求导致内存分配失败。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
conduit-rustconduit-hyper >= 0.2.0-alpha.3, < 0.4.2 -

II. Public POCs for CVE-2022-39294

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-39294

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2022-39294

No comments yet


Leave a comment