// For flags

CVE-2022-39294

(DoS) Denial of Service from unchecked request length in conduit-hyper

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

conduit-hyper integrates a conduit application with the hyper server. Prior to version 0.4.2, `conduit-hyper` did not check any limit on a request's length before calling [`hyper::body::to_bytes`](https://docs.rs/hyper/latest/hyper/body/fn.to_bytes.html). An attacker could send a malicious request with an abnormally large `Content-Length`, which could lead to a panic if memory allocation failed for that request. In version 0.4.2, `conduit-hyper` sets an internal limit of 128 MiB per request, otherwise returning status 400 ("Bad Request"). This crate is part of the implementation of Rust's [crates.io](https://crates.io/), but that service is not affected due to its existing cloud infrastructure, which already drops such malicious requests. Even with the new limit in place, `conduit-hyper` is not recommended for production use, nor to directly serve the public Internet.

conduit-hyper integra una aplicación de conducto con el hiperservidor. Antes de la versión 0.4.2, `conduit-hyper` no verificaba ningún límite en la longitud de una solicitud antes de llamar a [`hyper::body::to_bytes`](https://docs.rs/hyper/latest/hyper/body /fn.to_bytes.html). Un atacante podría enviar una solicitud maliciosa con una ""longitud de contenido"" anormalmente grande, lo que podría provocar pánico si fallara la asignación de memoria para esa solicitud. En la versión 0.4.2, `conduit-hyper` establece un límite interno de 128 MiB por solicitud; de lo contrario, devuelve el estado 400 (""Solicitud incorrecta""). Esta caja es parte de la implementación de [crates.io](https://crates.io/) de Rust, pero ese servicio no se ve afectado debido a su infraestructura de nube existente, que ya descarta este tipo de solicitudes maliciosas. Incluso con el nuevo límite establecido, ""conduit-hyper"" no se recomienda para uso en producción ni para servir directamente a la Internet pública.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-09-02 CVE Reserved
  • 2022-10-31 CVE Published
  • 2024-05-23 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-400: Uncontrolled Resource Consumption
  • CWE-1284: Improper Validation of Specified Quantity in Input
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Conduit-hyper Project
Search vendor "Conduit-hyper Project"
Conduit-hyper
Search vendor "Conduit-hyper Project" for product "Conduit-hyper"
> 0.2.0 < 0.4.2
Search vendor "Conduit-hyper Project" for product "Conduit-hyper" and version " > 0.2.0 < 0.4.2"
rust
Affected
Conduit-hyper Project
Search vendor "Conduit-hyper Project"
Conduit-hyper
Search vendor "Conduit-hyper Project" for product "Conduit-hyper"
0.2.0
Search vendor "Conduit-hyper Project" for product "Conduit-hyper" and version "0.2.0"
rust
Affected
Conduit-hyper Project
Search vendor "Conduit-hyper Project"
Conduit-hyper
Search vendor "Conduit-hyper Project" for product "Conduit-hyper"
0.2.0
Search vendor "Conduit-hyper Project" for product "Conduit-hyper" and version "0.2.0"
alpha3, rust
Affected
Conduit-hyper Project
Search vendor "Conduit-hyper Project"
Conduit-hyper
Search vendor "Conduit-hyper Project" for product "Conduit-hyper"
0.2.0
Search vendor "Conduit-hyper Project" for product "Conduit-hyper" and version "0.2.0"
alpha4, rust
Affected