Untrusted, user-controlled data from the HTTP Proxy-Authorization header can induce a denial of service state.
Untrusted data is extracted from the user-controlled HTTP Proxy-Authorization header and passed to Extension::tryfrom and flows into parsettl_extension where it is parsed as a TTL value. If an attacker supplies a TTL of zero (e.g. by using a username such as 'configuredUser-ttl-0'), the modulo operation 'timestamp % ttl' will cause a division by zero panic, causing the server to crash causing a denial-of-service.
The code assumed to be responsible for this can be found here: https://github.com/0x676e67/vproxy/blob/ab304c3854bf8480be577039ada0228907ba0923/src/extension.rs#L173-L183
curl -x "http://test-ttl-0:test@127.0.0.1:8101" https://google.com
The resulting crash renders the proxy server unusable until it is reset.
Finally, one last note: I'm reporting this on behalf of another researcher at Black Duck. Credit for discovery should be attributed to David Bohannon (dbohannon)
{ "github_reviewed": true, "severity": "HIGH", "github_reviewed_at": "2025-07-30T16:33:41Z", "cwe_ids": [ "CWE-369" ], "nvd_published_at": "2025-07-30T20:15:37Z" }