Password Pusher, an open source application to communicate sensitive information over the web, comes with a configurable rate limiter.  In versions prior to v1.49.0, the rate limiter could be bypassed by forging proxy headers allowing bad actors to send unlimited traffic to the site potentially causing a denial of service. In v1.49.0, a fix was implemented to only authorize proxies on local IPs which resolves this issue. As a workaround, one may add rules to one's proxy and/or firewall to not accept external proxy headers such as `X-Forwarded-*` from clients.
                
            References
                    Configurations
                    No configuration.
History
                    21 Nov 2024, 13:57
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
20 Nov 2024, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-20 17:15
Updated : 2024-11-21 13:57
NVD link : CVE-2024-52796
Mitre link : CVE-2024-52796
CVE.ORG link : CVE-2024-52796
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-770
                        
            Allocation of Resources Without Limits or Throttling
