Vulnerability DatabaseRUSTSEC-2024-0009

RUSTSEC-2024-0009
Rust vulnerability analysis and mitigation

Overview

RUSTSEC-2024-0009 (CVE-2024-23644) is a high-severity vulnerability affecting the trillium-http (versions < 0.3.12) and trillium-client (versions < 0.5.4) Rust packages. The vulnerability was discovered by divergentdave and was patched on January 24, 2024. The issue involves insufficient validation of outbound header values that could lead to request splitting or response splitting attacks (GitHub Advisory).

Technical details

The vulnerability stems from insufficient validation of outbound header values and names in both trillium-http and trillium-client packages. The HeaderValue and HeaderName could be constructed infallibly without proper checks for illegal bytes during request/response transmission. This could allow attackers to inject \r\n sequences if they have control over header values or names, potentially leading to request/response splitting attacks (GitHub Advisory).

Impact

If exploited, this vulnerability could allow attackers to get the client and server out of sync, potentially leading to data exfiltration from other requests or Server-Side Request Forgery (SSRF) attacks. The impact is significant in scenarios where attackers have sufficient control over outbound headers and can insert \r\n sequences (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in trillium-http version 0.3.12 and trillium-client version 0.5.4. For trillium-http, invalid header names and values in server responses are now omitted from network transmission. For trillium-client, if any header name or value is invalid, the client returns an Error::MalformedHeader before network access. As a workaround, applications should sanitize or validate untrusted input used in header values and names, ensuring carriage return, newline, and null characters are not allowed (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22257HIGH8.8
  • RustRust
  • salvo
NoYesJan 08, 2026
CVE-2026-22698HIGH8.7
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22699HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
GHSA-g59m-gf8j-gjf5LOW3.7
  • RustRust
  • aws-sdk-controlcatalog
NoYesJan 08, 2026
GHSA-585q-cm62-757jLOW2
  • RustRust
  • mnl
NoNoJan 09, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management