logo

CVE-2022-3272 rdiffweb

Package

Manager: pip
Name: rdiffweb
Vulnerable Version: >=0 <2.4.8

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00085 pctl0.25496

Details

rdiffweb's unlimited length email field can lead to DoS rdiffweb prior to 2.4.8 does not validate email length, allowing users to insert an email longer than 255 characters. If a user signs up with an email with a length of 1 million or more characters and logs in, withdraws, or changes their email, the server may cause denial of service due to overload. Version 2.4.8 sets length limits for username, email, and root directory.

Metadata

Created: 2022-09-27T00:00:17Z
Modified: 2025-05-21T18:46:55Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-qrj3-hrgj-fm7r/GHSA-qrj3-hrgj-fm7r.json
CWE IDs: ["CWE-130"]
Alternative ID: GHSA-qrj3-hrgj-fm7r
Finding: F184
Auto approve: 1