This seems like a poor choice of configuration that could easily be exploited by a malicious agent to conduct a denial of service attack