🕵️ Weblate: No rate limiting for Remove Account lead to huge Mass mailings
Nachrichtenbereich: 🕵️ Sicherheitslücken
🔗 Quelle: vulners.com
Name of the vulnerability:- No rate limiting for Remove Account lead to huge Mass mailings Hlw Team I am a security researcher and I found this vulnerability in your website Business Logic Errors https://hosted.weblate.org ***Description : No Rate Limit is a type of computer security vulnerability typically found in web applications. No Rate Limit enables attackers to perform actions on the web application where the attacker can do signup creation, password reset or 2FA of other users. No Rate Limit vulnerability may be used by attackers to bypass access controls such & bruteforce tokens and passwords without any limiting of any requests. There should be protection on the web application for sensitive actions. Attackers send a high number of requests to perform desirable actions to get access to the application or accounts. NO RL effects vary in range from petty nuisance to significant security risk, depending on the sensitivity of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site's owner network. ***Steps to Reproduce: Step 1-Go To This Link https://hosted.weblate.org/accounts/remove/ Step 2- Intercept This Request In Burp And Forward Till You Found Your Number In Step 3- Now Send This Request To Intruder And Repeat It 250 Time By Fixing Any Arbitrary Payload Which Doesn't No Effect Request I Choose Accept-Language: en-US,en;q=0.$5$ and payload set null 250 and start attack ***[attachment / reference] Video POC... ...
🔧 Rate limiting middleware
📈 29.39 Punkte
🔧 Programmierung
🔧 Managing Rate Limiting
📈 29.39 Punkte
🔧 Programmierung
🔧 Rate limiting in Next.js in under 2 minutes
📈 29.39 Punkte
🔧 Programmierung
🔧 The Complete Guide to API Rate Limiting
📈 29.39 Punkte
🔧 Programmierung
🔧 API Rate Limiting in Node.js
📈 29.39 Punkte
🔧 Programmierung