Vulnerabilities > CVE-2022-38667 - Use After Free vulnerability in Crowcpp Crow
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
HTTP applications (servers) based on Crow through 1.0+4 may allow a Use-After-Free and code execution when HTTP pipelining is used. The HTTP parser supports HTTP pipelining, but the asynchronous Connection layer is unaware of HTTP pipelining. Specifically, the Connection layer is unaware that it has begun processing a later request before it has finished processing an earlier request.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 13 |
Common Weakness Enumeration (CWE)
References
- https://cwe.mitre.org/data/definitions/372.html
- https://cwe.mitre.org/data/definitions/372.html
- https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38667.md
- https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38667.md
- https://github.com/CrowCpp/Crow/pull/524
- https://github.com/CrowCpp/Crow/pull/524
- https://gynvael.coldwind.pl/?id=753
- https://gynvael.coldwind.pl/?id=753