An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS13N2htLWhteHYtcHZoZs4AA6qJ

HPACK decoder panics on invalid input

Due to insufficient checking of input data, decoding certain data sequences can lead to Decoder::decode panicking rather than returning an error.

Example code that triggers this vulnerability looks like this:

use hpack::Decoder;

pub fn main() {
  let input = &[0x3f];
  let mut decoder = Decoder::new();
  let _ = decoder.decode(input);

hpack is unmaintained. A crate with the panics fixed has been published as hpack-patched.

Also consider using fluke-hpack or httlib-huffman as an alternative.

Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 2 months ago
Updated: about 2 months ago

CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-w7hm-hmxv-pvhf
References: Repository:
Blast Radius: 18.4

Affected Packages

Dependent packages: 7
Dependent repositories: 280
Downloads: 1,130,586 total
Affected Version Ranges: <= 0.3.0
No known fixed version
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.1.0, 0.2.0, 0.3.0