Misconfigured rate limit at app.sign.plus/forgot_password
Low
A
Alohi
Submitted None
Team Summary
Official summary from Alohi
shamim_12__ found a weakness in our rate-limiting mechanism, allowing an attacker to bypass rate limits and spam the endpoint for requesting a password reset email. There was no effect on other API endpoints and no direct security implication, except email spamming attacks. The issue has been fixed immediately.
Actions:
Reported by
shamim_12__
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Business Logic Errors