Description
<bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String
Published: 2022-09-14
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-6873 <bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String
Github GHSA Github GHSA GHSA-m77f-652q-wwp4 axum-core has no default limit put on request bodies
History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00104}

epss

{'score': 0.00111}


Subscriptions

Axum-core Project Axum-core
cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2024-08-03T01:00:10.862Z

Reserved: 2022-09-14T00:00:00.000Z

Link: CVE-2022-3212

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-09-14T16:15:11.883

Modified: 2024-11-21T07:19:03.723

Link: CVE-2022-3212

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses