First published: Thu Oct 06 2022(Updated: )
rdiffweb prior to 2.5.0a4 allows users to set their new password to be the same as the old password during a password reset. Version 2.5.0a4 enforces a password policy in which a new password cannot be the same as the old one.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Ikus-soft Rdiffweb | <=2.4.10 | |
Ikus-soft Rdiffweb | =2.5.0-alpha1 | |
Ikus-soft Rdiffweb | =2.5.0-alpha2 | |
Ikus-soft Rdiffweb | =2.5.0-alpha3 | |
pip/rdiffweb | <2.5.0 | 2.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this weak password requirements vulnerability is CVE-2022-3376.
The severity of CVE-2022-3376 is medium with a severity value of 5.3.
This vulnerability affects the GitHub repository ikus060/rdiffweb prior to version 2.5.0a4.
To fix this vulnerability, update the GitHub repository ikus060/rdiffweb to version 2.5.0a4 or later.
Yes, you can find more information about this vulnerability at the following references: [Reference 1](https://github.com/ikus060/rdiffweb/commit/2ffc2af65c8f8113b06e0b89929c604bcdf844b9) and [Reference 2](https://huntr.dev/bounties/a9021e93-6d18-4ac1-98ce-550c4697a4ed).