Skip to content

WS-2022-0132 (High) detected in hyper-0.13.5.crate #21

@mend-for-github-com

Description

@mend-for-github-com

WS-2022-0132 - High Severity Vulnerability

Vulnerable Library - hyper-0.13.5.crate

A fast and correct HTTP library.

Library home page: https://crates.io/api/v1/crates/hyper/0.13.5/download

Path to dependency file: /Cargo.toml

Path to vulnerable library: /Cargo.toml

Dependency Hierarchy:

  • hyper-0.13.5.crate (Vulnerable Library)

Found in HEAD commit: 0e0c6647e60f789c71242af1b86e6ce8974fe37f

Found in base branch: master

Vulnerability Details

The parser in Hyper before 0.14.12 creates invalid uninitialized value. Affected versions of this crate called mem::uninitialized() in the HTTP1 parser to create values of type httparse::Header (from the httparse crate). This is unsound, since Header contains references and thus must be non-null

Publish Date: 2024-11-03

URL: WS-2022-0132

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://rustsec.org/advisories/RUSTSEC-2022-0022.html

Release Date: 2022-05-10

Fix Resolution: hyper - 0.14.12

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions