Loading HuntDB...

SMS Invite Form Abuse

W
Whisper
Submitted None
Reported by xer0dayz

Vulnerability Details

Technical details and impact analysis

Uncontrolled Resource Consumption
whisper.sh fails to protect the invite form from abuse from attackers. If a malicious individual wants to abuse this functionality, they could send repeated/automated requests to the same phone number or range of phone numbers that do no actually belong to himself. This would result in lots of arbitrary SMS messages to a single user or large range of multiple users just by launching automated POST requests to wispher.sh. POST /invite HTTP/1.1 Host: whisper.sh User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:18.0) Gecko/20100101 Firefox/18.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Referer: https://whisper.sh/search?q=INJECTX Content-Length: 24 Cookie: _ga=GA1.2.1840275725.1445267554; _cb_ls=1; _chartbeat2=DTMT5SBzHnwjDQlfSX.1445267560697.1445267560697.1; _gat=1 Connection: close Pragma: no-cache Cache-Control: no-cache phoneNumber=518-373-1319 HTTP/1.1 200 OK Date: Mon, 19 Oct 2015 15:51:43 GMT Content-Type: text/plain; charset=utf-8 cache-control: max-age=0, private, must-revalidate x-request-id: psJRqmJtkxpeW59Ms3en X-Varnish: 111290474 Age: 0 Via: 1.1 varnish-v4 Connection: close Accept-Ranges: bytes X-Frame-Options: DENY Strict-Transport-Security: max-age=31536000; X-XSS-Protection: 1; mode=block X-Content-Type-Options: nosniff Content-Length: 24 Invite sent successfully To help prevent automated attacks, the form should utilize some form of captcha system that requires user knowledge in order to send repeat attempts and should block repeat requests to the same number multiple times.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$30.00

Submitted

Weakness

Uncontrolled Resource Consumption