CVE-2024-52796
Ruby vulnerability analysis and mitigation

Overview

Password Pusher, an open source application for communicating sensitive information over the web, contains a vulnerability (CVE-2024-52796) in versions prior to v1.49.0. The vulnerability was discovered and reported by Positive Technologies, allowing attackers to bypass the application's rate limiter through forged proxy headers (GitHub Advisory).

Technical details

The vulnerability stems from the application's handling of proxy headers, specifically the X-Forwarded-* headers. In affected versions, the rate limiter implementation could be circumvented by forging these proxy headers, as the application did not properly validate their authenticity. The vulnerability has been assigned a CVSS v3.1 base score of 5.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L, indicating network accessibility with low attack complexity and no required privileges or user interaction (GitHub Advisory).

Impact

The vulnerability enables attackers to bypass rate limiting controls, potentially leading to two main impacts: 1) The ability to send unlimited traffic to the site, potentially causing a denial of service condition, and 2) Enhanced capability to execute brute force attacks due to the circumvention of rate limiting protections (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Password Pusher version 1.49.0, which implements a security control to only authorize proxies on local IPs by default. For organizations using remote proxies, specific configuration is required to authorize the IP addresses of these proxies. As a workaround for users unable to upgrade immediately, it is recommended to add rules to the proxy and/or firewall to block external proxy headers (X-Forwarded-*) from clients (GitHub Advisory, PWPush Docs).

Additional resources


SourceThis report was generated using AI

Related Ruby vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66568CRITICAL9.3
  • RubyRuby
  • ruby-saml
NoYesDec 09, 2025
CVE-2025-66567CRITICAL9.3
  • RubyRuby
  • ruby-saml
NoYesDec 09, 2025
GHSA-4249-gjr8-jpq3HIGH8.7
  • RubyRuby
  • prosemirror_to_html
NoYesNov 13, 2025
CVE-2025-64501HIGH7.6
  • RubyRuby
  • prosemirror_to_html
NoYesNov 10, 2025
CVE-2025-61594MEDIUMN/A
  • RubyRuby
  • rubygem-json
NoYesDec 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management