Vulnerability Details : CVE-2022-38667
HTTP applications (servers) based on Crow through 1.0+4 may allow a Use-After-Free and code execution when HTTP pipelining is used. The HTTP parser supports HTTP pipelining, but the asynchronous Connection layer is unaware of HTTP pipelining. Specifically, the Connection layer is unaware that it has begun processing a later request before it has finished processing an earlier request.
Vulnerability category: Memory Corruption
Exploit prediction scoring system (EPSS) score for CVE-2022-38667
Probability of exploitation activity in the next 30 days: 0.78%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 81 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-38667
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2022-38667
-
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-38667
-
https://github.com/CrowCpp/Crow/pull/524
Prevent HTTP pipelining by The-EDev · Pull Request #524 · CrowCpp/Crow · GitHubPatch;Third Party Advisory
-
https://gynvael.coldwind.pl/?id=753
Crow HTTP framework use-after-free - gynvael.coldwind//vx.logExploit;Third Party Advisory
-
https://cwe.mitre.org/data/definitions/372.html
CWE - CWE-372: Incomplete Internal State Distinction (4.8)Technical Description;Third Party Advisory
-
https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38667.md
CVEs/CVE-2022-38667.md at main · 0xhebi/CVEs · GitHubExploit;Third Party Advisory
Products affected by CVE-2022-38667
- cpe:2.3:a:crowcpp:crow:*:*:*:*:*:*:*:*