Duplicate of GHSA-m77f-652q-wwp4
High severity
GitHub Reviewed
Published
Sep 15, 2022
to the GitHub Advisory Database
•
Updated Jan 28, 2023
Withdrawn
This advisory was withdrawn on Sep 16, 2022
Description
Published by the National Vulnerability Database
Sep 14, 2022
Published to the GitHub Advisory Database
Sep 15, 2022
Reviewed
Sep 16, 2022
Withdrawn
Sep 16, 2022
Last updated
Jan 28, 2023
Duplicate advisory
This advisory is a duplicate of GHSA-m77f-652q-wwp4. This link is maintained to preserve external references.
Original Description
<bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used Bytes::from_request internally: axum::extract::Form axum::extract::Json String
References