First published: Fri Dec 23 2022(Updated: )
Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.5.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Ikus-soft Rdiffweb | <2.5.5 | |
pip/rdiffweb | <2.5.5 | 2.5.5 |
<2.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-4720 is medium with a CVSS score of 6.1.
The Open Redirect vulnerability in ikus060/rdiffweb can be exploited by an attacker to redirect a user to a malicious website.
CVE-2022-4720 affects versions of ikus060/rdiffweb prior to 2.5.5.
Yes, a patch is available. Upgrading ikus060/rdiffweb to version 2.5.5 or later fixes the vulnerability.
You can find more information about CVE-2022-4720 at the following references: [Reference 1](https://github.com/ikus060/rdiffweb/commit/6afaae56a29536f0118b3380d296c416aa6d078d) and [Reference 2](https://huntr.dev/bounties/339687af-6e25-4ad8-823d-c097f607ea70).