In Mastodon 4.1.6, API endpoint rate limiting can be bypassed by setting a crafted HTTP request header.
References
Link | Resource |
---|---|
https://github.com/mastodon/mastodon/security/advisories/GHSA-q3rg-xx5v-4mxh | Third Party Advisory |
https://github.com/mastodon/mastodon/tags | Release Notes |
Configurations
Configuration 1 (hide)
|
History
06 May 2025, 18:30
Type | Values Removed | Values Added |
---|---|---|
First Time |
Joinmastodon mastodon
Joinmastodon |
|
CPE | cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:* | |
References | () https://github.com/mastodon/mastodon/security/advisories/GHSA-q3rg-xx5v-4mxh - Third Party Advisory | |
References | () https://github.com/mastodon/mastodon/tags - Release Notes |
25 Nov 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-444 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
04 Oct 2024, 13:50
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
03 Oct 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-03 18:15
Updated : 2025-05-06 18:30
NVD link : CVE-2024-34535
Mitre link : CVE-2024-34535
CVE.ORG link : CVE-2024-34535
JSON object : View
Products Affected
joinmastodon
- mastodon
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')