Miggo Logo

GHSA-3m6f-3gfg-4x56: Panic on incorrect date input to `simple_asn1`

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
6/17/2022
Updated
6/13/2023
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
simple_asn1rust= 0.6.00.6.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in the UTCTime parsing logic within from_der_. The critical code path converts raw bytes to a String via char conversion, then performs a direct slice (v[0..2]) without validating UTF-8 boundaries. This matches the advisory's description of panicking on high-ASCII second bytes. The commit diff shows this logic was introduced when switching from chrono to time crate handling. The function is directly mentioned in vulnerability descriptions and matches the panic scenario described.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

V*rsion *.*.* o* t** `simpl*_*sn*` *r*t* p*ni*s on **rt*in m*l*orm** inputs to its p*rsin* *un*tions, in*lu*in* `*rom_**r` *n* `**r_***o**`. ****us* t*is *r*t* is *r*qu*ntly us** wit* inputs *rom t** n*twork, t*is s*oul* ** *onsi**r** * s**urity vuln

Reasoning

T** vuln*r**ility m*ni**sts in t** UT*Tim* p*rsin* lo*i* wit*in *rom_**r_. T** *riti**l *o** p*t* *onv*rts r*w *yt*s to * Strin* vi* ***r *onv*rsion, t**n p*r*orms * *ir**t sli** (v[*..*]) wit*out v*li**tin* UT*-* *oun**ri*s. T*is m*t***s t** **visor