
Cloud Vulnerability DB
A community-led vulnerabilities database
A business logic error was identified in GitHub repository ikus060/rdiffweb prior to version 2.5.0a7, tracked as CVE-2022-3363. The vulnerability relates to insufficient notification controls when enabling or disabling Multi-Factor Authentication (MFA) features (Debian Tracker).
The vulnerability stems from a lack of email notifications when MFA settings were modified for user accounts. This was addressed by implementing email notifications to users when their MFA status changes, as evidenced by code changes that added notification functionality for both enabling and disabling MFA (GitHub Commit).
The vulnerability could allow unauthorized MFA changes to go unnoticed by users, potentially compromising account security if an attacker gained access to modify MFA settings. Without proper notification, users might remain unaware of security-critical changes to their authentication settings.
The issue was resolved in rdiffweb version 2.5.0a7 by implementing email notifications when MFA is enabled or disabled. Users are advised to upgrade to this version or later. The fix includes sending email notifications with subjects 'Two-Factor Authentication turned on' or 'Two-Factor Authentication turned off' depending on the action taken (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."