Vulnerability DatabaseRUSTSEC-2024-0008

RUSTSEC-2024-0008
Rust vulnerability analysis and mitigation

Overview

RUSTSEC-2024-0008 is associated with CVE-2024-23644, affecting the trillium-http (versions < 0.3.12) and trillium-client (versions < 0.5.4) Rust crates. The vulnerability was discovered by divergentdave and involves improper validation of outbound header values that could lead to request splitting or response splitting attacks (GitHub Advisory).

Technical details

The vulnerability stems from insufficient validation of outbound header values in both trillium-http::HeaderValue and trillium-http::HeaderName components. These could be constructed infallibly and were not checked for illegal bytes when sending requests from the client or responses from the server. This oversight could allow attackers to inject \r\n sequences if they have sufficient control over header values or names, potentially leading to request/response splitting attacks (GitHub Advisory).

Impact

If exploited, this vulnerability could allow attackers to get the client and server out of sync, potentially leading to data exfiltration from other requests and Server-Side Request Forgery (SSRF) attacks. The impact is particularly severe in scenarios where attackers have control over outbound headers and can insert "\r\n" sequences (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in trillium-http version 0.3.12 and trillium-client version 0.5.4. For trillium-http, invalid header names in server response headers are now omitted from network transmission, and invalid header values are individually omitted while preserving other valid values with the same header name. For trillium-client, any invalid header name or value in client request headers returns an Error::MalformedHeader before network access. As a workaround, applications should sanitize or validate untrusted input used in header values and names, ensuring carriage return, newline, and null characters are not allowed (GitHub Advisory).

Community reactions

The vulnerability was reported by divergentdave and initially faced a delay in response. The maintainers acknowledged this delay and updated their security policy to prevent similar delays in the future. Patches were issued within 24 hours of the vulnerability being noticed by the maintenance team (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22863CRITICAL9.2
  • RustRust
  • deno
NoYesJan 15, 2026
CVE-2026-23519HIGH8.9
  • RustRust
  • cmov
NoYesJan 15, 2026
RUSTSEC-2026-0003HIGH8.9
  • RustRust
  • cmov
NoYesJan 14, 2026
CVE-2026-22864HIGH8.1
  • RustRust
  • deno
NoYesJan 15, 2026
CVE-2026-22782LOW2.9
  • RustRust
  • rustfs
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management