Loading HuntDB...

No Rate limit on Password Reset Function

Medium
I
Infogram
Submitted None

Vulnerability Details

Technical details and impact analysis

Improper Authentication - Generic
Hello Infogram Security Team *************************** ###Description:- I have identified that when resetting the password, the request has no rate limit which then can be used to brute force through one request. Which can be annoying to the infogram users. ###Steps to reproduce:- * Request for password reset link. * Catch the above request in burp suit send it to the repeater * Now send continuous request to the server. **NOTE:** *Every time you will receive the same response which is {"status":"ok"}* >HTTP/1.1 200 OK Date: Thu, 19 Oct 2017 10:39:31 GMT Content-Type: application/json; charset=utf-8 Content-Length: 15 Connection: close Server: nginx X-DNS-Prefetch-Control: off Strict-Transport-Security: max-age=10886400 X-Download-Options: noopen X-Content-Type-Options: nosniff X-XSS-Protection: 1; mode=block Referrer-Policy: no-referrer X-Frame-Options: SAMEORIGIN ETag: W/"f-VaSQ4oDUiZblZNAEkkN+sX+q3Sg" X-Infogram-Server: b302 {"status":"ok"} * I tried sending 25 request which was success. (It can be more..) {F230753} ###Solution:- You should limit the rate for password reset links to avoid such kind of issues. ************************* Best Regards *Akaash Sharma :)*

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Authentication - Generic