No rate limit in email subscription
Medium
S
Stripo Inc
Submitted None
Actions:
Reported by
splint3rsec
Vulnerability Details
Technical details and impact analysis
I managed to bypass the following report #1029723 please follow the steps below:
##Description:
No rate limit in Email Subscription, you just have to add a fixed throttle in Burp Suite to avoid the `429` response.
**Note:** I will use tempmail in the screenshots PoC
##Steps:
1. Go to https://stripo.email/ and scroll down to the subscribe field
2. Put an email
3. Click on `Subscribe` and intercept the following request
```
POST /fr/subscribe/ HTTP/1.1
Host: stripo.email
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0
Accept: */*
Accept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-CSRF-TOKEN: OC5q3gnsKxUZRrGIN3ke5ZdqEbmneEuknaNmnQUe
X-Requested-With: XMLHttpRequest
Content-Length: 129
Origin: https://stripo.email
Connection: close
Referer: https://stripo.email/
_token=&source=LANDING&subscribe-email=kakema3700%40tdcryo.com&g-recaptcha-response=
```
4.Send the request to Burp intruder, go to the `Positions` tab and clear the `§`
5.Add `§` in the last number of the `Accept-Language` header like this`Accept-Language: fr,fr-FR;q=0.8,en-US;q=0.5,en;q=0.§3§`
6.Go to `Payloads` tab and choose `Null payloads` in the `Payload type`
7.You can set how much email you want to send.. `50` for example in the `Generate` field
8.Go to `Options` tab and change the `Throttle (milliseconds)` Fixed value to **1500** or more..
9.Click on `Start attack`
You will start receiving emails.
##Suggested Mitigation:
Add a number of requests limit
## Impact
An attacker can send bulk emails to the victim
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Business Logic Errors