Skip to main content

CVE-2022-3267: CWE-352 Cross-Site Request Forgery (CSRF) in ikus060 ikus060/rdiffweb

Medium
VulnerabilityCVE-2022-3267cvecve-2022-3267cwe-352
Published: Thu Sep 22 2022 (09/22/2022, 09:20:14 UTC)
Source: CVE
Vendor/Project: ikus060
Product: ikus060/rdiffweb

Description

Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.6.

AI-Powered Analysis

AILast updated: 07/08/2025, 20:58:05 UTC

Technical Analysis

CVE-2022-3267 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the GitHub project ikus060/rdiffweb prior to version 2.4.6. rdiffweb is a web-based interface for rdiff-backup, a tool used for incremental backups. The vulnerability arises because the application does not adequately verify the origin of requests that perform state-changing operations, allowing an attacker to trick an authenticated user into submitting unwanted actions via crafted web requests. The CVSS 3.0 base score is 6.8 (medium severity), with the vector AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L indicating that the attack requires adjacent network access, low attack complexity, no privileges required, but user interaction is necessary. The impact on confidentiality is high, as unauthorized commands could lead to data exposure or leakage. Integrity impact is low, and availability impact is low but present. No known exploits are reported in the wild, and no specific affected versions are detailed beyond being prior to 2.4.6. The vulnerability is categorized under CWE-352, which is a common web security issue where CSRF tokens or other anti-CSRF mechanisms are missing or improperly implemented, enabling attackers to perform unauthorized actions on behalf of authenticated users.

Potential Impact

For European organizations using rdiffweb for backup management, this vulnerability could lead to unauthorized disclosure of sensitive backup data or manipulation of backup operations if an attacker successfully tricks an authenticated user into executing malicious requests. Given that backups often contain critical business and personal data, exposure could result in data breaches, regulatory non-compliance (e.g., GDPR violations), and operational disruptions. The medium severity rating reflects that exploitation requires user interaction and network proximity, limiting remote exploitation but still posing a risk in environments where users access rdiffweb interfaces from shared or insecure networks. The confidentiality impact is particularly concerning for organizations handling personal or sensitive data, as unauthorized access to backup data could lead to privacy violations and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade rdiffweb to version 2.4.6 or later, where the CSRF protections have been implemented or improved. If upgrading is not immediately possible, administrators should implement compensating controls such as enforcing strict network segmentation to limit access to the rdiffweb interface only to trusted hosts and users. Additionally, deploying web application firewalls (WAFs) with rules to detect and block CSRF attack patterns can provide temporary protection. Enabling multi-factor authentication (MFA) for access to the backup interface can reduce the risk of unauthorized actions. It is also advisable to review and implement anti-CSRF tokens or headers in any custom integrations or front-end components interacting with rdiffweb. Regular monitoring of logs for unusual or unauthorized requests targeting the backup interface can help detect attempted exploitation early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntrdev
Date Reserved
2022-09-22T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6830dc700acd01a249275668

Added to database: 5/23/2025, 8:37:04 PM

Last enriched: 7/8/2025, 8:58:05 PM

Last updated: 8/15/2025, 11:06:06 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats