Loading HuntDB...

Rate Limit too lenient for endpoint sending emails

None
W
WakaTime
Submitted None
Reported by harshita174

Vulnerability Details

Technical details and impact analysis

Weak Password Recovery Mechanism for Forgotten Password
Rate-limiting is a process that is used to define the rate at which consumers can access APIs. Also, it determines the speed at which a consumer can access APIs. Rate limit is calculated in real time. How to reproduce? 1. Sign-up for the account for WakaTime. Domain - www.wakatime.com 2. After signing up login to the caviar account with login credentials 3. Then,press forgot password and enter your email or temporary email address i.e https://temp-mail.org 4. Open burpsuite and intercept the request from browser ,if you get the intercepted request. 5. Send the intercepted request to the intruder, In target section check the Host and Port section . In Positions section, clear all $signs and add $ sign to the anyone parameter In Payload section, add payload type to Numbers and set Numbers range. 6. After all settings done press start attack, and the attack started till it reaches the Number range that we will set in the Payload sections. 8. And you will get the mail regarding to the password reset links to your mail box. HTTP Request- POST /api/v1/users/reset_password HTTP/1.1 Host: wakatime.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Firefox/68.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://wakatime.com/ Content-Type: application/json X-CSRFToken: ad5d275dc3197936cc18040ae1882e89b04b6cf5b6d891d0dc337b38792f61b4 X-Requested-With: XMLHttpRequest Content-Length: 34 Connection: close ## Impact The user will get continuous email ragarding to password reset links till the attack stop.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Weak Password Recovery Mechanism for Forgotten Password