Skip to content

No Rate Limiting on Reset Features #2203

@PhyoWaThoneWin

Description

@PhyoWaThoneWin

I found a vulnerability on your website.

Vulnerability Domain:

www.python.org

Vulnerability Name:

python_POC(1)

Summary:

A rate limiting algorithm is used to check if the user session (or IP address) has to be limited based on the information in the session cache.

Possible scenarios:
Attacker could use this vulnerability to bomb out the email inbox of the victim.
Attacker could send Spear-Phishing to the selected mail address.
Attacker might cause denial of service to the mail servers.

Business Impact

If You Are Using Any Email Service Software API Or Some Tool Which Costs You For Your Email This Type Of Attack Can Result You In Financial Lose And It Can Also Slow Down Your Services It Can Take Bulk Of Storage In Sent Mail Although If Users Are Affected By This Vulnerability They Can Stop Using Your Services Which Can Lead To Business Risk

Steps To Reproduce:

Step 1 - Go To This Link https://python.org/accounts/login/
Enter Email Click On Password reset

Step 2- Intercept This Request In Burp And Forward Till You Found Your Number In Request Like {"email":"your email here"}

Step 3 - Send to intruder, and start Sniping attack with NULL payloads.

python_POC(2)

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions