CVE-2021-38512
moderate-risk
Published 2021-08-10
An issue was discovered in the actix-http crate before 3.0.0-beta.9 for Rust. HTTP/1 request smuggling (aka HRS) can occur, potentially leading to credential disclosure.
Do I need to act?
-
0.42% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (11)
Actix-Http
Actix-Http
Actix-Http
Actix-Http
Actix-Http
Actix-Http
Actix-Http
Actix-Http
Actix-Http
Actix-Http
Affected Vendors
References (6)
Third Party Advisory
https://rustsec.org/advisories/RUSTSEC-2021-0081.html
Third Party Advisory
https://rustsec.org/advisories/RUSTSEC-2021-0081.html
44
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
2/34 · Minimal
Exposure
16/34 · Moderate