First published: Thu Oct 03 2024(Updated: )
In Mastodon 4.1.6, API endpoint rate limiting can be bypassed by setting a crafted HTTP request header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mastodon |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-34535 is classified as medium due to the potential for bypassing API endpoint rate limiting.
To fix CVE-2024-34535, upgrade Mastodon to the latest version where the vulnerability has been addressed.
CVE-2024-34535 affects Mastodon version 4.1.6.
CVE-2024-34535 allows an attacker to bypass rate limiting on API endpoints through crafted HTTP request headers.
As of now, there is no public knowledge of specific exploits actively targeting CVE-2024-34535.