CVE-2022-3274: rdiffweb Cross-Site Request Forgery vulnerability can lead to user email ID being changed
7
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.76934%
CWE
Published
9/23/2022
Updated
10/25/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rdiffweb | pip | < 2.4.7 | 2.4.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from handling user settings actions without CSRF protections. The pre-patch code in pref_general.py's render_prefs_panel function executed actions like 'set_profile_info' based solely on the 'action' parameter, regardless of HTTP method. The fix added a critical cherrypy.request.method == 'POST' check, indicating the original vulnerability allowed non-POST requests to modify user settings. This matches classic CSRF patterns where attackers can forge GET requests to execute privileged actions.