
Cloud Vulnerability DB
A community-led vulnerabilities database
A weak password requirements vulnerability was identified in GitHub repository ikus060/rdiffweb prior to version 2.5.0a4. The vulnerability, tracked as CVE-2022-3376, allowed users to set their new password to be the same as their current password, which is considered a security weakness (Debian Tracker).
The vulnerability is classified as CWE-521 (Weak Password Requirements) as confirmed by the NVD CNA Status report (NVD CNA Report). The issue specifically allowed users to set their new password identical to their current password during password change operations, which violates security best practices for password management.
The vulnerability could potentially weaken the security posture of affected systems by allowing users to bypass password change requirements, effectively maintaining the same password indefinitely without actual changes to their credentials.
The issue was fixed in rdiffweb version 2.5.0a4 by implementing additional password policy checks that prevent users from setting their new password to be the same as their current password. The fix includes validation that raises an error message stating 'The new password must be different from the current password' when such an attempt is made (GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."