[advisory]
id = "RUSTSEC-2021-0041"
aliases = ["CAN-2021-1000007", "CVE-2021-29932", "GHSA-qpgv-g792-wh6x"]
cvss = "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
package = "parse_duration"
date = "2021-03-18"
url = "https://github.com/zeta12ti/parse_duration/issues/21"
categories = ["denial-of-service"]
keywords = ["parsing", "untrusted data"]
[versions]
patched = []
unaffected = []
[affected.functions]
"parse_duration::parse" = ["*"]
The parse_duration::parse
function allows for parsing duration strings with exponents like 5e5s
where under the hood, the BigInt
type along with the pow
function are used for such payloads. Passing an arbitrarily big exponent makes the parse_duration::parse
function to process the payload for a very long time taking up CPU and memory.
This allows an attacker to cause a DoS if the parse_duration::parse
function is used to process untrusted input.