Brute Force Affecting rdiffweb package, versions [,2.4.4)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Brute Force vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-RDIFFWEB-5926711
  • published1 Oct 2023
  • disclosed1 Oct 2023
  • creditUnknown

Introduced: 1 Oct 2023

CVE NOT AVAILABLE CWE-307  (opens in a new tab)

How to fix?

Upgrade rdiffweb to version 2.4.4 or higher.

Overview

rdiffweb is an A web interface to rdiff-backup repositories.

Affected versions of this package are vulnerable to Brute Force due to a weak IP detection mechanism in the login API. Under usual circumstances, the user's IP address should be blocked after five unsuccessful login attempts. However, a loophole in the system can be exploited using the X-Forwarded-For header, enabling attackers to bypass IP detection and carry out a brute-force attack to crack the password.

References

CVSS Scores

version 3.1