An out-of-bounds read in the rewrite function at /modules/caddyhttp/rewrite/rewrite.go in Caddy v2.5.1 allows attackers to cause a Denial of Service (DoS) via a crafted URI. Note: This has been disputed as a bug, not a security vulnerability, in the Caddy web server that emerged when an administrator's bad configuration containing a malformed request URI caused the server to return an empty reply instead of a valid HTTP response to the client.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-6374 An out-of-bounds read in the rewrite function at /modules/caddyhttp/rewrite/rewrite.go in Caddy v2.5.1 allows attackers to cause a Denial of Service (DoS) via a crafted URI. Note: This has been disputed as a bug, not a security vulnerability, in the Caddy web server that emerged when an administrator's bad configuration containing a malformed request URI caused the server to return an empty reply instead of a valid HTTP response to the client.
Github GHSA Github GHSA GHSA-m7gr-5w5g-36jf Withdrawn Advisory: Out-of-bounds Read can lead to client side denial of service
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T08:16:17.148Z

Reserved: 2022-06-20T00:00:00

Link: CVE-2022-34037

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-07-22T15:15:08.580

Modified: 2024-11-21T07:08:49.080

Link: CVE-2022-34037

cve-icon Redhat

Severity :

Publid Date: 2022-07-22T00:00:00Z

Links: CVE-2022-34037 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses