Allocation of Resources Without Limits or Throttling in ikus060/rdiffweb
Description
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.8.0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Rdiffweb prior to 2.8.0 lacks rate limiting on the 'send me a status report' feature, allowing attackers to flood email notifications.
Vulnerability
Description
CVE-2023-4138 is an allocation of resources without limits or throttling vulnerability in Rdiffweb, a web-based backup management application [1]. The issue resides in the "send me a status report" endpoint, which prior to version 2.8.0 did not enforce any rate limiting, allowing an attacker to trigger unlimited email notifications [2].
Exploitation
Conditions
An attacker can exploit this vulnerability by sending repeated POST requests to the affected endpoint without requiring authentication [3]. The only prerequisite is network access to the Rdiffweb web interface. The commit that fixes the issue explicitly adds a rate limit to the POST method of the report controller, confirming the attack vector [3].
Impact
Successful exploitation leads to email flooding, exhausting server resources (e.g., mail transfer agent capacity) and potentially causing a denial of service for legitimate users. The impact is limited to the email notification subsystem, but it can degrade the overall availability of the service [4].
Mitigation
The vulnerability is patched in Rdiffweb version 2.8.0, which introduces rate limiting on the affected endpoint. Users are advised to upgrade to the latest version; no workaround is documented.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
rdiffwebPyPI | < 2.8.1 | 2.8.1 |
Affected products
2- ikus060/ikus060/rdiffwebv5Range: unspecified
Patches
1feef0d7b11d8Merge branch 'patrik-ratelimit-send-report' into 'master'
2 files changed · +2 −0
rdiffweb/controller/page_pref_notification.py+1 −0 modified@@ -134,6 +134,7 @@ def populate_obj(self, userobj): class PagePrefNotification(Controller): @cherrypy.expose + @cherrypy.tools.ratelimit(methods=['POST']) def default(self, **kwargs): # Process the parameters. report_form = ReportForm(obj=self.app.currentuser)
README.md+1 −0 modified@@ -131,6 +131,7 @@ Professional support for Rdiffweb is available by [contacting IKUS Soft](https:/ * Add support for SQLAlchemy v2.0 * When reaching 100% disk usage, show quota in red to improve visibility * Send notification when user's quota reach 90% #46 +* Add ratelimit to "send me a status report" to avoid email flooding #272 - credit to [Nehal Pillai](https://www.linkedin.com/in/nehal-pillai-02a854172) ## 2.7.1 (2023-04-27)
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.