CVE-2022-3371: rdiffweb's lack of token name length limit can result in DoS or memory corruption
(updated )
rdiffweb prior to 2.5.0a3 is vulnerable to Allocation of Resources Without Limits or Throttling. A lack of limit in the length of the Token name
parameter can result in denial of service or memory corruption. Version 2.5.0a3 fixes this issue.
References
- github.com/advisories/GHSA-3fhq-72hw-jqwv
- github.com/ikus060/rdiffweb
- github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7
- github.com/pypa/advisory-database/tree/main/vulns/rdiffweb/PYSEC-2022-299.yaml
- huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce
- nvd.nist.gov/vuln/detail/CVE-2022-3371
Detect and mitigate CVE-2022-3371 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →