GHSA-ffp2-8p2h-4m5j
Vulnerability from github
Impact
Password Pusher comes with a configurable rate limiter. In versions prior to v1.49.0, the rate limiter could be bypassed by forging proxy headers allowing bad actors to send unlimited traffic to the site potentially causing a denial of service.
Patches
In v1.49.0, a fix was implemented to only authorize proxies on local IPs which resolves this issue.
If you are running a remote proxy, please see this documentation on how to authorize the IP address of your remote proxy.
Workarounds
It is highly suggested to upgrade to at least v1.49.0 to mitigate this risk.
If for some reason you cannot immediately upgrade, the alternative is that you can add rules to your proxy and/or firewall to not accept external proxy headers such as X-Forwarded-*
from clients.
References
The new settings are configurable to authorize remote proxies.
{ "affected": [ { "package": { "ecosystem": "RubyGems", "name": "pwpush" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.49.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2024-52796" ], "database_specific": { "cwe_ids": [ "CWE-770" ], "github_reviewed": true, "github_reviewed_at": "2024-11-20T18:24:28Z", "nvd_published_at": "2024-11-20T17:15:20Z", "severity": "MODERATE" }, "details": "### Impact\n\nPassword Pusher comes with a configurable rate limiter. In versions prior to [v1.49.0](https://github.com/pglombardo/PasswordPusher/releases/tag/v1.49.0), the rate limiter could be bypassed by forging proxy headers allowing bad actors to send unlimited traffic to the site potentially causing a denial of service.\n\n\n### Patches\n\nIn [v1.49.0](https://github.com/pglombardo/PasswordPusher/releases/tag/v1.49.0), a fix was implemented to only authorize proxies on local IPs which resolves this issue.\n\nIf you are running a remote proxy, please see [this documentation](https://docs.pwpush.com/docs/proxies/#trusted-proxies) on how to authorize the IP address of your remote proxy.\n\n### Workarounds\n\nIt is highly suggested to upgrade to at least [v1.49.0](https://github.com/pglombardo/PasswordPusher/releases/tag/v1.49.0) to mitigate this risk.\n\nIf for some reason you cannot immediately upgrade, the alternative is that you can add rules to your proxy and/or firewall to not accept external proxy headers such as `X-Forwarded-*` from clients.\n\n### References\n\nThe new settings are [configurable to authorize remote proxies](https://docs.pwpush.com/docs/proxies/#trusted-proxies).\n", "id": "GHSA-ffp2-8p2h-4m5j", "modified": "2024-11-20T19:36:11Z", "published": "2024-11-20T18:24:28Z", "references": [ { "type": "WEB", "url": "https://github.com/pglombardo/PasswordPusher/security/advisories/GHSA-ffp2-8p2h-4m5j" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52796" }, { "type": "WEB", "url": "https://docs.pwpush.com/docs/proxies/#trusted-proxies" }, { "type": "PACKAGE", "url": "https://github.com/pglombardo/PasswordPusher" }, { "type": "WEB", "url": "https://github.com/pglombardo/PasswordPusher/releases/tag/v1.49.0" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" } ], "summary": "Password Pusher rate limiter can be bypassed by forging proxy headers" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.