Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. web-push
  4. ›
  5. GHSA-fc83-9jwq-gc2m

GHSA-fc83-9jwq-gc2m: Web Push Denial of Service via malicious Web Push endpoint

March 24, 2025

Prior to version 0.10.3, the built-in clients of the web-push crate eagerly allocated memory based on the Content-Length header returned by the Web Push endpoint. Malicious Web Push endpoints could return a large Content-Length without ever having to send as much data, leading to denial of service by memory exhaustion.

Services providing Web Push notifications typically allow the user to register an arbitrary endpoint, so the endpoint should not be trusted.

The fixed version 0.10.3 now limits the amount of memory it will allocate for each response, limits the amount of data it will read from the endpoint, and returns an error if the endpoint sends too much data.

As before, it is recommended that services add a timeout for each request to Web Push endpoints.

References

  • github.com/advisories/GHSA-fc83-9jwq-gc2m
  • github.com/pimeys/rust-web-push
  • github.com/pimeys/rust-web-push/pull/68
  • rustsec.org/advisories/RUSTSEC-2025-0015.html

Code Behaviors & Features

Detect and mitigate GHSA-fc83-9jwq-gc2m with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.10.4

Fixed versions

  • 0.10.4

Solution

Upgrade to version 0.10.4 or above.

Weakness

  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

cargo/web-push/GHSA-fc83-9jwq-gc2m.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 00:14:38 +0000.