First published: Wed Sep 28 2022(Updated: )
ikus060/rdiffweb prior to 2.4.9 allows a user to set there password to all spaces. While rdiffweb has a password policy requiring passwords to be between 8 and 128 characters, it does not validate the password entropy, allowing users to bypass password complexity requirements with weak passwords. This issue has been fixed in version 2.4.9. No workarounds are known to exist.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Ikus-soft Rdiffweb | <2.4.9 | |
pip/rdiffweb | <2.4.9 | 2.4.9 |
<2.4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3326 is a vulnerability in the GitHub repository ikus060/rdiffweb prior to version 2.4.9 that allows weak password requirements.
The severity of CVE-2022-3326 is medium with a CVSS score of 4.3.
CVE-2022-3326 affects the ikus060/rdiffweb repository prior to version 2.4.9 by allowing weak password requirements.
To fix CVE-2022-3326, it is recommended to update the ikus060/rdiffweb repository to version 2.4.9 or later.
Yes, here are some references related to CVE-2022-3326: - GitHub commit: [link](https://github.com/ikus060/rdiffweb/commit/ee98e5af78ec60db8a17fef6ea0ca250e3f31eec) - huntr.dev bounty details: [link](https://huntr.dev/bounties/1f6a5e49-23f2-45f7-8661-19f9cee8ae97)