Open mend-bolt-for-github[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
WS-2022-0132 - High Severity Vulnerability
Vulnerable Libraries - hyper-0.12.35.crate, hyper-0.13.9.crate
hyper-0.12.35.crate
A fast and correct HTTP library.
Library home page: https://crates.io/api/v1/crates/hyper/0.12.35/download
Path to dependency file: /packages/cactus-plugin-keychain-vault/src/cactus-keychain-vault-server/rust/gen/Cargo.toml
Path to vulnerable library: /packages/cactus-plugin-keychain-vault/src/cactus-keychain-vault-server/rust/gen/Cargo.toml
Dependency Hierarchy: - hashicorp_vault-1.1.0.crate (Root Library) - reqwest-0.9.24.crate - :x: **hyper-0.12.35.crate** (Vulnerable Library)
hyper-0.13.9.crate
A fast and correct HTTP library.
Library home page: https://crates.io/api/v1/crates/hyper/0.13.9/download
Path to dependency file: /packages/cactus-plugin-keychain-vault/src/cactus-keychain-vault-server/rust/gen/Cargo.toml
Path to vulnerable library: /packages/cactus-plugin-keychain-vault/src/cactus-keychain-vault-server/rust/gen/Cargo.toml
Dependency Hierarchy: - :x: **hyper-0.13.9.crate** (Vulnerable Library)
Found in base branch: master
Vulnerability Details
The parser in Hyper before 0.14.12 creates invalid uninitialized value. Affected versions of this crate called mem::uninitialized() in the HTTP1 parser to create values of type httparse::Header (from the httparse crate). This is unsound, since Header contains references and thus must be non-null
Publish Date: 2024-11-03
URL: WS-2022-0132
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://rustsec.org/advisories/RUSTSEC-2022-0022.html
Release Date: 2022-05-10
Fix Resolution: hyper - 0.14.12
Step up your Open Source Security Game with Mend here