No rate limiting for confirmation email lead to email flooding
Medium
Y
Yelp
Submitted None
Actions:
Reported by
muhammaddaffa
Vulnerability Details
Technical details and impact analysis
### Description:
There is no rate limiting implemented in sending the confirmation email. Thus, attacker can use this vulnerability to bomb out the email inbox of the victim.
### Affected URL:
```
https://biz.yelp.com/welcome/resend_confirmation
```
with POST method
### Details:
1. Login to biz.yelp.com
2. Go to https://biz.yelp.com/messaging/xxxxxxxxxxxxxxx/inbox, it should look like this {F683815}
3. Press Re-send email then capture the request, it should like this
```
POST /welcome/resend_confirmation HTTP/1.1
Host: biz.yelp.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:72.0) Gecko/20100101 Firefox/72.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: https://biz.yelp.com/messaging/xxxxxxxxxxxxxxxxxxxxxxxxxxx/inbox
Content-Type: application/x-www-form-urlencoded
Content-Length: 129
Origin: https://biz.yelp.com
Connection: close
Cookie: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Upgrade-Insecure-Requests: 1
csrftok=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx&return_url=%2Fmessaging%2Foj517fznD2Gw2v5CUUIw_Q%2Finbox
```
4. Send the captured request to Intruder and repeat the request in loop
5. Check the email, your email will be flooded by yelp confirmation email {F683818}
### How to fix:
Rate limiting should be implemented
## Impact
Email Flooding
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Violation of Secure Design Principles