First published: Thu Sep 29 2022(Updated: )
Weak Password Requirements in GitHub repository ikus060/rdiffweb prior to 2.4.9.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Ikus-soft Rdiffweb | <2.4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3326 is a vulnerability in the GitHub repository ikus060/rdiffweb prior to version 2.4.9 that allows weak password requirements.
The severity of CVE-2022-3326 is medium with a CVSS score of 4.3.
CVE-2022-3326 affects the ikus060/rdiffweb repository prior to version 2.4.9 by allowing weak password requirements.
To fix CVE-2022-3326, it is recommended to update the ikus060/rdiffweb repository to version 2.4.9 or later.
Yes, here are some references related to CVE-2022-3326: - GitHub commit: [link](https://github.com/ikus060/rdiffweb/commit/ee98e5af78ec60db8a17fef6ea0ca250e3f31eec) - huntr.dev bounty details: [link](https://huntr.dev/bounties/1f6a5e49-23f2-45f7-8661-19f9cee8ae97)