rdiffweb's lack of token name length limit can result in DoS or memory corruption
High severity
GitHub Reviewed
Published
Oct 1, 2022
to the GitHub Advisory Database
•
Updated Oct 25, 2024
Description
Published by the National Vulnerability Database
Sep 30, 2022
Published to the GitHub Advisory Database
Oct 1, 2022
Reviewed
Oct 3, 2022
Last updated
Oct 25, 2024
rdiffweb prior to 2.5.0a3 is vulnerable to Allocation of Resources Without Limits or Throttling. A lack of limit in the length of the
Token name
parameter can result in denial of service or memory corruption. Version 2.5.0a3 fixes this issue.References