CVE-2014-3648

The simplepush server iterates through the application installations and pushes a notification to the server provided by deviceToken. But this is user controlled. If a bogus applications is registered with bad deviceTokens, one can generate endless exceptions when those endpoints can't be reached or can slow the server down by purposefully wasting it's time with slow endpoints. Similarly, one can provide whatever HTTP end point they want. This turns the server into a DDOS vector or an anonymizer for the posting of malware and so on.
References
Link Resource
https://issues.redhat.com/browse/AEROGEAR-6091 Issue Tracking Permissions Required Vendor Advisory
https://issues.redhat.com/browse/AEROGEAR-6091 Issue Tracking Permissions Required Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:redhat:jboss_aerogear:1.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () https://issues.redhat.com/browse/AEROGEAR-6091 - Issue Tracking, Permissions Required, Vendor Advisory () https://issues.redhat.com/browse/AEROGEAR-6091 - Issue Tracking, Permissions Required, Vendor Advisory

Information

Published : 2022-07-01 14:15

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3648

Mitre link : CVE-2014-3648

CVE.ORG link : CVE-2014-3648


JSON object : View

Products Affected

redhat

  • jboss_aerogear
CWE
CWE-400

Uncontrolled Resource Consumption