Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS0zZmhxLTcyaHctanF3ds4AAvJb
rdiffweb's lack of token name length limit can result in DoS or memory corruption
rdiffweb prior to 2.5.0a3 is vulnerable to Allocation of Resources Without Limits or Throttling. A lack of limit in the length of the Token name
parameter can result in denial of service or memory corruption. Version 2.5.0a3 fixes this issue.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0zZmhxLTcyaHctanF3ds4AAvJb
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 12 months ago
Updated: 8 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-3fhq-72hw-jqwv, CVE-2022-3371
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-3371
- https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7
- https://huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce
- https://github.com/pypa/advisory-database/tree/main/vulns/rdiffweb/PYSEC-2022-299.yaml
- https://github.com/advisories/GHSA-3fhq-72hw-jqwv
Affected Packages
pypi:rdiffweb
Versions: < 2.5.0a3Fixed in: 2.5.0a3