Password Pusher, an open source application to communicate sensitive information over the web, comes with a configurable rate limiter. In versions prior to v1.49.0, the rate limiter could be bypassed by forging proxy headers allowing bad actors to send unlimited traffic to the site potentially causing a denial of service. In v1.49.0, a fix was implemented to only authorize proxies on local IPs which resolves this issue. As a workaround, one may add rules to one's proxy and/or firewall to not accept external proxy headers such as `X-Forwarded-*` from clients.
References
Configurations
No configuration.
History
21 Nov 2024, 13:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
20 Nov 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-20 17:15
Updated : 2024-11-21 13:57
NVD link : CVE-2024-52796
Mitre link : CVE-2024-52796
CVE.ORG link : CVE-2024-52796
JSON object : View
Products Affected
No product.
CWE
CWE-770
Allocation of Resources Without Limits or Throttling