CVE-2022-4722: rdiffweb vulnerable to Authentication Bypass by Primary Weakness
(updated )
In rdiffweb prior to 2.5.5, the username field is not unique to users. This allows exploitation of primary key logic by creating the same name with different combinations & may allow unauthorized access.
References
- github.com/advisories/GHSA-wf33-6x33-wcf9
- github.com/ikus060/rdiffweb
- github.com/ikus060/rdiffweb/commit/d1aaa96b665a39fba9e98d6054a9de511ba0a837
- github.com/pypa/advisory-database/tree/main/vulns/rdiffweb/PYSEC-2022-43008.yaml
- huntr.dev/bounties/c62126dc-d9a6-4d3e-988d-967031876c58
- nvd.nist.gov/vuln/detail/CVE-2022-4722
Detect and mitigate CVE-2022-4722 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →