rdiffweb prior to 2.5.0a3 is vulnerable to Allocation of Resources Without Limits or Throttling. A lack of limit in the length of the Token name
parameter can result in denial of service or memory corruption. Version 2.5.0a3 fixes this issue.
References
- https://nvd.nist.gov/vuln/detail/CVE-2022-3371
- https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7
- https://huntr.dev/bounties/4e8f6136-50c7-4fa1-ac98-699bcb7b35ce
- https://github.com/pypa/advisory-database/tree/main/vulns/rdiffweb/PYSEC-2022-299.yaml
- https://github.com/advisories/GHSA-3fhq-72hw-jqwv