logo

CVE-2022-3371 rdiffweb

Package

Manager: pip
Name: rdiffweb
Vulnerable Version: >=0 <2.5.0a3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.0042 pctl0.6114

Details

rdiffweb's lack of token name length limit can result in DoS or memory corruption rdiffweb prior to 2.5.0a3 is vulnerable to Allocation of Resources Without Limits or Throttling. A lack of limit in the length of the `Token name` parameter can result in denial of service or memory corruption. Version 2.5.0a3 fixes this issue.

Metadata

Created: 2022-10-01T00:00:21Z
Modified: 2024-10-25T21:39:31Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/10/GHSA-3fhq-72hw-jqwv/GHSA-3fhq-72hw-jqwv.json
CWE IDs: ["CWE-770"]
Alternative ID: GHSA-3fhq-72hw-jqwv
Finding: F067
Auto approve: 1