CVE-2022-3272 – rdiffweb
Package
Manager: pip
Name: rdiffweb
Vulnerable Version: >=0 <2.4.8
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00085 pctl0.25496
Details
rdiffweb's unlimited length email field can lead to DoS rdiffweb prior to 2.4.8 does not validate email length, allowing users to insert an email longer than 255 characters. If a user signs up with an email with a length of 1 million or more characters and logs in, withdraws, or changes their email, the server may cause denial of service due to overload. Version 2.4.8 sets length limits for username, email, and root directory.
Metadata
Created: 2022-09-27T00:00:17Z
Modified: 2025-05-21T18:46:55Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-qrj3-hrgj-fm7r/GHSA-qrj3-hrgj-fm7r.json
CWE IDs: ["CWE-130"]
Alternative ID: GHSA-qrj3-hrgj-fm7r
Finding: F184
Auto approve: 1