Loading HuntDB...

[www.stripo.email] You can override the speed limit by adding the X-Forwarded-For header.

Medium
S
Stripo Inc
Submitted None
Reported by what_web

Vulnerability Details

Technical details and impact analysis

Improper Authorization
###Summary In *https://stripo.email/template-order* I think you have implemented rate limiting via 429 status code for too many requests, but in reality it is not. An attacker could bypass the 429 speed limit by adding an X-Forwarded-For header. ###Steps To Reproduce 1. Go to the *https://stripo.email/template-order* page 2. fill in the random content and Click the Order Template grab the packet. 3. Automate the request by adding the X-Forwarded-For header. ###Proof of Concept The first photo bypasses the speed limit by adding an X-Forwarded-For header. {F797676} The second figure shows the 429 status code playing due to the speed limit if the X-Forwarded-For header is not added. {F797677} ###Fix Fix this bug by changing the way the server handles X-Forwarded-For headers ## Impact Override speed limit

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Improper Authorization