CVE-2022-3457: Origin Validation Error in rdiffweb
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.70803%
CWE
Published
10/14/2022
Updated
11/22/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| rdiffweb | pip | < 2.5.0a5 | 2.5.0a5 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The critical vulnerability stems from improper Origin header validation in the set_headers function. The commit diff shows the validation was changed from a prefix check (startswith) to an exact match comparison. The original implementation's use of startswith() allowed malicious origins with matching prefixes (e.g., 'http://victim.com.attacker.net' matching 'http://victim.com'). The added test case 'test_post_with_prefixed_origin' demonstrates this vulnerability by showing prefixed origins were previously accepted. The CWE-346 classification and CVSS 9.8 score confirm the critical nature of this origin validation flaw in the identified function.