First published: Fri Dec 23 2022(Updated: )
Authentication Bypass by Primary Weakness in GitHub repository ikus060/rdiffweb prior to 2.5.5.
Credit: security@huntr.dev security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
pip/rdiffweb | <2.5.5 | 2.5.5 |
Ikus-soft Rdiffweb | <2.5.5 | |
<2.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-4722 is a vulnerability in the GitHub repository ikus060/rdiffweb prior to version 2.5.5 that allows authentication bypass due to a weakness in the username field.
CVE-2022-4722 affects rdiffweb versions prior to 2.5.5 by allowing unauthorized access through the use of similar usernames.
CVE-2022-4722 has a severity rating of high with a value of 7.
To fix CVE-2022-4722, you should upgrade rdiffweb to version 2.5.5 or higher.
More information about CVE-2022-4722 can be found at the following references: - [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-4722) - [GitHub Commit](https://github.com/ikus060/rdiffweb/commit/d1aaa96b665a39fba9e98d6054a9de511ba0a837) - [Huntr.dev](https://huntr.dev/bounties/c62126dc-d9a6-4d3e-988d-967031876c58)