First published: Wed Sep 21 2022(Updated: )
In rdiffweb prior to version 2.4.6, the `cookie` session_id does not have a secure attribute when the URL is invalid. Version 2.4.6 contains a fix for the issue.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Ikus-soft Rdiffweb | <2.4.6 | |
pip/rdiffweb | <2.4.6 | 2.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-3250 is medium with a CVSS score of 5.3.
The affected software for CVE-2022-3250 is Ikus-soft Rdiffweb prior to version 2.4.6.
To fix CVE-2022-3250, update your installation of Ikus-soft Rdiffweb to version 2.4.6 or later.
The Common Weakness Enumeration (CWE) ID for CVE-2022-3250 is CWE-311 and CWE-614.
You can find more information about CVE-2022-3250 at the following references: [GitHub Commit](https://github.com/ikus060/rdiffweb/commit/ac334dd27ceadac0661b1e2e059a8423433c3fee) and [Huntr.dev Bounty](https://huntr.dev/bounties/39889a3f-8bb7-448a-b0d4-a18c671bbd23).