First published: Tue Sep 13 2022(Updated: )
rdiffweb version 2.4.1 has no password policy or password checking, which could make users vulnerable to brute force password guessing attacks. Version 2.4.2 enforces minimum and maximum password lengths.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Ikus-soft Rdiffweb | <2.4.2 | |
pip/rdiffweb | =2.4.1 | 2.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-3179.
The title of the vulnerability is Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.2.
The software affected by this vulnerability is Ikus-soft Rdiffweb version up to 2.4.2.
The severity of this vulnerability is high.
To fix this vulnerability, update your Ikus-soft Rdiffweb software to version 2.4.2 or above.