rdiffweb's unlimited username field length can lead to DoS
High severity
GitHub Reviewed
Published
Sep 27, 2022
to the GitHub Advisory Database
•
Updated Oct 25, 2024
Description
Published by the National Vulnerability Database
Sep 26, 2022
Published to the GitHub Advisory Database
Sep 27, 2022
Reviewed
Sep 30, 2022
Last updated
Oct 25, 2024
rdiffweb prior to 2.4.8 is vulnerable to a potential Dos attack via an unlimited length "username" field. This can result in excess memory consumption, or memory corruption, leading to a Denial of Service (DoS). This issue is patched in version 2.4.8. There are no known workarounds.
References