Miggo Logo

GHSA-pr59-jjr4-gcf6: anon-vec lacks sufficient checks in public API

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
Published
6/5/2025
Updated
6/5/2025
KEV Status
No
Technology
TechnologyRust

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
anon-vecrust<= 0.1.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability lies in the anon-vec crate, specifically within three public API functions: AnonVec::get_ref(), AnonVec::get_mut(), and AnonVec::remove_get(). According to the RustSec advisory RUSTSEC-2025-0039 and the GitHub advisory GHSA-pr59-jjr4-gcf6, these functions do not perform sufficient checks on their arguments. This lack of input validation can lead to unsound behavior, potentially causing memory corruption if the functions are called with invalid arguments. The crate is unmaintained, and no patch is available. The file path src/lib.rs is assumed as the standard location for Rust library code, although it could not be confirmed by fetching the file content due to repository access issues.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** *ollowin* *un*tions in t** *non-v** *r*t* *r* unsoun* *u* to insu**i*i*nt ****ks on t**ir *r*um*nts:: - `*nonV**::**t_r**()` - `*nonV**::**t_mut()` - `*nonV**::r*mov*_**t()` T** *r*t* w*s *uilt *s * l**rnin* proj**t *n* is not **in* m*int*in**.

Reasoning

T** vuln*r**ility li*s in t** `*non-v**` *r*t*, sp**i*i**lly wit*in t*r** pu*li* *PI *un*tions: `*nonV**::**t_r**()`, `*nonV**::**t_mut()`, *n* `*nonV**::r*mov*_**t()`. ***or*in* to t** RustS** **visory RUSTS**-****-**** *n* t** *it*u* **visory **S*-