Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1mZnAyLThwMmgtNG01as4ABBly

Password Pusher rate limiter can be bypassed by forging proxy headers

Impact

Password Pusher comes with a configurable rate limiter. In versions prior to v1.49.0, the rate limiter could be bypassed by forging proxy headers allowing bad actors to send unlimited traffic to the site potentially causing a denial of service.

Patches

In v1.49.0, a fix was implemented to only authorize proxies on local IPs which resolves this issue.

If you are running a remote proxy, please see this documentation on how to authorize the IP address of your remote proxy.

Workarounds

It is highly suggested to upgrade to at least v1.49.0 to mitigate this risk.

If for some reason you cannot immediately upgrade, the alternative is that you can add rules to your proxy and/or firewall to not accept external proxy headers such as X-Forwarded-* from clients.

References

The new settings are configurable to authorize remote proxies.

Permalink: https://github.com/advisories/GHSA-ffp2-8p2h-4m5j
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mZnAyLThwMmgtNG01as4ABBly
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 12 hours ago
Updated: about 11 hours ago


CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Identifiers: GHSA-ffp2-8p2h-4m5j, CVE-2024-52796
References: Repository: https://github.com/pglombardo/PasswordPusher
Blast Radius: 1.0

Affected Packages

rubygems:pwpush
Dependent packages: 0
Dependent repositories: 0
Downloads: 2,604 total
Affected Version Ranges: < 1.49.0
Fixed in: 1.49.0
All affected versions: 0.1.0
All unaffected versions: