CVE-2024-34535

In Mastodon 4.1.6, API endpoint rate limiting can be bypassed by setting a crafted HTTP request header.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*
cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*

History

06 May 2025, 18:30

Type Values Removed Values Added
First Time Joinmastodon mastodon
Joinmastodon
CPE cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*
References () https://github.com/mastodon/mastodon/security/advisories/GHSA-q3rg-xx5v-4mxh - () https://github.com/mastodon/mastodon/security/advisories/GHSA-q3rg-xx5v-4mxh - Third Party Advisory
References () https://github.com/mastodon/mastodon/tags - () https://github.com/mastodon/mastodon/tags - Release Notes

25 Nov 2024, 18:15

Type Values Removed Values Added
CWE CWE-444
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9

04 Oct 2024, 13:50

Type Values Removed Values Added
Summary
  • (es) En Mastodon 4.1.6, la limitación de velocidad del endpoint de la API se puede evitar configurando un encabezado de solicitud HTTP manipulado específicamente.

03 Oct 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-03 18:15

Updated : 2025-05-06 18:30


NVD link : CVE-2024-34535

Mitre link : CVE-2024-34535

CVE.ORG link : CVE-2024-34535


JSON object : View

Products Affected

joinmastodon

  • mastodon
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')