CVE-2022-3326: rdiffweb vulnerable to password complexity bypass leading to weak passwords
5.4
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.36288%
CWE
Published
9/30/2022
Updated
10/26/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rdiffweb | pip | < 2.4.9 | 2.4.9 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insufficient password complexity checks. The key evidence is in the store.py diff where:
- Pre-patch code only checked password length (cfg.password_min_length/max_length)
- Post-patch added zxcvbn password scoring to enforce entropy
- CVE description explicitly mentions missing entropy validation
- Test cases were updated to use stronger passwords (e.g., 'pr3j5Dwi' instead of 'password') The set_password function is the core authentication mechanism where password policies should be enforced, making it the clear vulnerable point before entropy checks were added.