First published: Wed Nov 16 2022(Updated: )
Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior to 2.5.0a6.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Ikus-soft Rdiffweb | <=2.4.10 | |
Ikus-soft Rdiffweb | =2.5.0-alpha1 | |
Ikus-soft Rdiffweb | =2.5.0-alpha2 | |
Ikus-soft Rdiffweb | =2.5.0-alpha3 | |
Ikus-soft Rdiffweb | =2.5.0-alpha4 | |
Ikus-soft Rdiffweb | =2.5.0-alpha5 | |
pip/rdiffweb | <2.5.0a6 | 2.5.0a6 |
<=2.4.10 | ||
=2.5.0-alpha1 | ||
=2.5.0-alpha2 | ||
=2.5.0-alpha3 | ||
=2.5.0-alpha4 | ||
=2.5.0-alpha5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4018 is a vulnerability that allows an attacker to bypass authentication for critical functions in the GitHub repository ikus060/rdiffweb prior to version 2.5.0a6.
The severity of CVE-2022-4018 is medium, with a severity value of 4.3.
CVE-2022-4018 affects versions up to and including 2.4.10, 2.5.0-alpha1, 2.5.0-alpha2, 2.5.0-alpha3, 2.5.0-alpha4, and 2.5.0-alpha5 of Ikus-soft Rdiffweb.
To fix CVE-2022-4018, it is recommended to upgrade to version 2.5.0a6 of the GitHub repository ikus060/rdiffweb or later.
More information about CVE-2022-4018 can be found at the following references: [link1], [link2].