rdiffweb vulnerable to password complexity bypass leading to weak passwords
Moderate severity
GitHub Reviewed
Published
Sep 30, 2022
to the GitHub Advisory Database
•
Updated Oct 26, 2024
Description
Published by the National Vulnerability Database
Sep 29, 2022
Published to the GitHub Advisory Database
Sep 30, 2022
Reviewed
Oct 1, 2022
Last updated
Oct 26, 2024
ikus060/rdiffweb prior to 2.4.9 allows a user to set there password to all spaces. While rdiffweb has a password policy requiring passwords to be between 8 and 128 characters, it does not validate the password entropy, allowing users to bypass password complexity requirements with weak passwords. This issue has been fixed in version 2.4.9. No workarounds are known to exist.
References