
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-3179 is a security vulnerability identified in the GitHub repository ikus060/rdiffweb versions prior to 2.4.2, related to weak password requirements. The vulnerability was discovered and disclosed in September 2022 (NVD).
The vulnerability is classified as a weak password requirements issue (CWE-521). It received a CVSS v3.1 base score of 8.8 (HIGH) from NVD with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating network accessibility, low attack complexity, and high impact on confidentiality, integrity, and availability (NVD).
The weak password requirements could potentially allow attackers to compromise user accounts through password-based attacks, leading to unauthorized access to the system. The high CVSS score indicates significant potential impact on system security, including compromise of confidentiality, integrity, and availability (NVD).
The vulnerability was patched in rdiffweb version 2.4.2. The fix implements password length restrictions with a minimum of 8 characters and a maximum of 128 characters. Users should upgrade to version 2.4.2 or later to address this security issue (GitHub Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."