<bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: JFROG
Published: 2022-09-14T16:05:09
Updated: 2024-08-03T01:00:10.862Z
Reserved: 2022-09-14T00:00:00
Link: CVE-2022-3212
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-09-14T16:15:11.883
Modified: 2024-11-21T07:19:03.723
Link: CVE-2022-3212
Redhat
No data.