This project might be open to known security vulnerabilities, which can be prevented by tightening the version range of affected dependencies. Find detailed information at the bottom.

Crate serde_qs

Dependencies

(8 total, 2 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 actix-web^4.04.9.0up to date
 axum^0.60.7.9out of date
 futures^0.30.3.31up to date
 percent-encoding^2.12.3.1up to date
 serde^1.01.0.216up to date
 thiserror^1.02.0.6out of date
 tracing^0.10.1.41up to date
 warp ⚠️^0.30.3.7maybe insecure

Dev dependencies

(6 total, 1 outdated, 1 possibly insecure)

CrateRequiredLatestStatus
 chrono ⚠️^0.40.4.39maybe insecure
 csv^1.11.3.1up to date
 rand^0.80.8.5up to date
 serde_derive^1.01.0.216up to date
 serde_urlencoded^0.70.7.1up to date
 serde_with^2.03.11.0out of date

Security Vulnerabilities

chrono: Potential segfault in `localtime_r` invocations

RUSTSEC-2020-0159

Impact

Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.

Workarounds

No workarounds are known.

References

warp: Improper validation of Windows paths could lead to directory traversal attack

RUSTSEC-2022-0082

Path resolution in warp::filters::fs::dir didn't correctly validate Windows paths meaning paths like /foo/bar/c:/windows/web/screen/img101.png would be allowed and respond with the contents of c:/windows/web/screen/img101.png. Thus users could potentially read files anywhere on the filesystem.

This only impacts Windows. Linux and other unix likes are not impacted by this.