First published: Thu Oct 13 2022(Updated: )
ikus060/rdiffweb prior to 2.5.0a5 did not enforce origin validation in web traffic. Users are advised to upgrade to version 2.5.0a5.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Ikus-soft Rdiffweb | <2.5.0 | |
Ikus-soft Rdiffweb | =2.5.0-alpha1 | |
Ikus-soft Rdiffweb | =2.5.0-alpha2 | |
Ikus-soft Rdiffweb | =2.5.0-alpha3 | |
Ikus-soft Rdiffweb | =2.5.0-alpha4 | |
pip/rdiffweb | <2.5.0a5 | 2.5.0a5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3457 is a vulnerability in the GitHub repository ikus060/rdiffweb prior to version 2.5.0a5.
CVE-2022-3457 has a severity rating of 9.8 (Critical).
CVE-2022-3457 affects Ikus-soft Rdiffweb versions up to 2.5.0-alpha4.
To fix CVE-2022-3457, update your Ikus-soft Rdiffweb installation to version 2.5.0a5 or later.
For more information about CVE-2022-3457, you can refer to the GitHub commit [here](https://github.com/ikus060/rdiffweb/commit/afc1bdfab5161c74012ff2590a6ec49cc0d8fde0) and the huntr.dev page [here](https://huntr.dev/bounties/cfcab02e-d6ad-4dcf-b1b0-da90434bc55b).