-
-
Notifications
You must be signed in to change notification settings - Fork 0
Description
WS-2022-0132 - High Severity Vulnerability
Vulnerable Library - hyper-0.13.7.crate
A fast and correct HTTP library.
Library home page: https://crates.io/api/v1/crates/hyper/0.13.7/download
Path to dependency file: /Cargo.toml
Path to vulnerable library: /Cargo.toml
Dependency Hierarchy:
- test_util-0.1.0 (Root Library)
- warp-0.2.5.crate
- ❌ hyper-0.13.7.crate (Vulnerable Library)
- warp-0.2.5.crate
Found in HEAD commit: 6bd9a93e55faf7abd43040d83fa5bb6fcbd55f5c
Found in base branch: master
Vulnerability Details
The parser in Hyper before 0.14.12 creates invalid uninitialized value. Affected versions of this crate called mem::uninitialized() in the HTTP1 parser to create values of type httparse::Header (from the httparse crate). This is unsound, since Header contains references and thus must be non-null
Publish Date: 2024-11-03
URL: WS-2022-0132
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://rustsec.org/advisories/RUSTSEC-2022-0022.html
Release Date: 2022-05-10
Fix Resolution: hyper - 0.14.12
Step up your Open Source Security Game with Mend here