CVE-2022-3273: rdiffweb does not have a rate limit on incorrect password attempts to prevent brute force attacks
(updated )
rdiffweb prior to 2.5.0a4 does not have a rate limit to prevent attackers attempting brute force attacks to guess passwords. Version 2.5.0a4 limits the number of incorrect password attempts.
References
- github.com/advisories/GHSA-9g3v-v24q-jj5p
- github.com/ikus060/rdiffweb
- github.com/ikus060/rdiffweb/commit/b5e3bb0a98268d18ceead36ab9b2b7eaacd659a8
- github.com/pypa/advisory-database/tree/main/vulns/rdiffweb/PYSEC-2022-43156.yaml
- huntr.dev/bounties/a6df4bad-3382-4add-8918-760d885690f6
- nvd.nist.gov/vuln/detail/CVE-2022-3273
Detect and mitigate CVE-2022-3273 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →