Abuse of Api that causes spamming users and possible DOS due to missing rate limit on contact form
None
W
Weblate
Submitted None
Actions:
Reported by
khalidamin
Vulnerability Details
Technical details and impact analysis
##Summary:
In your sub-domain: https://demo.weblate.org/ , there's an endpoint that doesn't have any rate limit on it to prevent spamming you by filling the contact you form multiple times to bomb you with tons of emails.
##Description:
Spamming and Possible DOS is being possible due to missing rate limit on this endpoint.
**Request**
POST /contact/ HTTP/1.1
Host: demo.weblate.org
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://demo.weblate.org/
Cookie:XXX
Connection: close
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
Content-Length: 334
csrfmiddlewaretoken=XXX&subject=&name=&email=asd%40yahoo.com&message=&content=
**Suggested Fix**
Implement additional checking per API request such as a unique token or identifier that changes per request to prevent mass spamming, additional Rate limiting measures can be implemented such as IP blacklisting, or account banning if a certain amount of requests are made.
##Steps To Reproduce:
1- Visit https://demo.weblate.org/contact/?t=reg
2- Fill the form, send it and intercept the request
3- Using burp intruder mass replay the request.
Thank you.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved