|
| 1 | +--- |
| 2 | +layout: advisory |
| 3 | +title: 'CVE-2024-52796 (pwpush): Password Pusher rate limiter can be bypassed by forging |
| 4 | + proxy headers' |
| 5 | +comments: false |
| 6 | +categories: |
| 7 | +- pwpush |
| 8 | +advisory: |
| 9 | + gem: pwpush |
| 10 | + cve: 2024-52796 |
| 11 | + ghsa: ffp2-8p2h-4m5j |
| 12 | + url: https://github.com/pglombardo/PasswordPusher/security/advisories/GHSA-ffp2-8p2h-4m5j |
| 13 | + title: Password Pusher rate limiter can be bypassed by forging proxy headers |
| 14 | + date: 2024-11-20 |
| 15 | + description: | |
| 16 | + ### Impact |
| 17 | +
|
| 18 | + Password Pusher comes with a configurable rate limiter. |
| 19 | + In versions prior to [v1.49.0], the rate limiter could be bypassed by forging |
| 20 | + proxy headers allowing bad actors to send unlimited traffic to the site |
| 21 | + potentially causing a denial of service. |
| 22 | +
|
| 23 | + ### Patches |
| 24 | +
|
| 25 | + In [v1.49.0], a fix was implemented to only authorize proxies on local IPs which |
| 26 | + resolves this issue. |
| 27 | +
|
| 28 | + If you are running a remote proxy, please see |
| 29 | + [this documentation](https://docs.pwpush.com/docs/proxies/#trusted-proxies) |
| 30 | + on how to authorize the IP address of your remote proxy. |
| 31 | +
|
| 32 | + ### Workarounds |
| 33 | +
|
| 34 | + It is highly suggested to upgrade to at least [v1.49.0] to mitigate this risk. |
| 35 | +
|
| 36 | + If for some reason you cannot immediately upgrade, the alternative |
| 37 | + is that you can add rules to your proxy and/or firewall to not |
| 38 | + accept external proxy headers such as `X-Forwarded-*` from clients. |
| 39 | +
|
| 40 | + ### References |
| 41 | +
|
| 42 | + The new settings are [configurable to authorize remote proxies][1]. |
| 43 | +
|
| 44 | + [v1.49.0]: https://github.com/pglombardo/PasswordPusher/releases/tag/v1.49.0 |
| 45 | + [1]: https://docs.pwpush.com/docs/proxies/#trusted-proxies |
| 46 | + cvss_v3: 5.3 |
| 47 | + patched_versions: |
| 48 | + - ">= 1.49.0" |
| 49 | + related: |
| 50 | + url: |
| 51 | + - https://nvd.nist.gov/vuln/detail/CVE-2024-52796 |
| 52 | + - https://github.com/pglombardo/PasswordPusher/releases/tag/v1.49.0 |
| 53 | + - https://github.com/pglombardo/PasswordPusher/security/advisories/GHSA-ffp2-8p2h-4m5j |
| 54 | + - https://docs.pwpush.com/docs/proxies/#trusted-proxies |
| 55 | + - https://github.com/advisories/GHSA-ffp2-8p2h-4m5j |
| 56 | +--- |
0 commit comments