Security vulnerabilities

  • Status Closed
  • Assigned To
    cbay
  • Private
Attached to Project: Security vulnerabilities
Opened by bugbounty - 06.09.2025
Last edited by cbay - 08.09.2025

FS#209 - Ineffective Rate Limiting on Login Endpoint Allowing Excessive Invalid Attempts

Description The login endpoint implements rate limiting to prevent abuse, but it appears ineffective . Sending 100+ requests with null/empty payloads via Burp Intruder results in consistent 200 OK responses without triggering 429 . A correct password yields 302 (redirect, indicating success).

Affected Asset:https://admin.alwaysdata.com/login

Steps to Reproduce

1.Navigate to the login page (https://admin.alwaysdata.com/login).
2.Use Burp Suite Intruder to send 100+ requests with null/empty payloads
3.Observe 200 OK responses for all, no 429.
4.Test a valid credential: Receives 302.

Impact

Allows potential brute-force on passwords without reliable blocking.
Minor resource consumption from repeated requests.

Closed by  cbay
08.09.2025 07:37
Reason for closing:  Duplicate
Additional comments about closing:  

https://security.alwaysda ta.com/task/179

Even it Gives 429 in Repeater, after sending another request it gives 200 again

Loading...

Available keyboard shortcuts

Tasklist

Task Details

Task Editing