Security vulnerabilities

  • Status Closed
  • Assigned To
    cbay
  • Private
Attached to Project: Security vulnerabilities
Opened by pentester - 16.11.2025
Last edited by cbay - 17.11.2025

FS#238 - no rate limit vulnerability means service lacks controls to restrict the number of requests

vulnerability name : no rate limit vulnerability description : A little bit about Rate Limit:
A rate limiting algorithm is used to check if the user session (or IP-address) has to be limited based on the information in the session cache.
In case a client made too many requests within a given timeframe, HTTP-Servers can respond with status code 429: Too Many Requests.
## Description:-
I have identified that when Forgetting Password for account , the request has no rate limit which then can be used to loop through one request. Which can be annoying to the root users sending mass password to one email. vulnerable url : https://admin.alwaysdata.com/password/lost/ step to reproduce : step1: intercept the forget password request on burpsuite step2: send it the reques in intruder and sequencer step3: add any path in intruder and select number payload and start attack or live capture on sequencer

   bug.pdf (1.71 MiB)
Closed by  cbay
17.11.2025 08:31
Reason for closing:  Duplicate
Additional comments about closing:  

https://security.alwaysda ta.com/task/40

Loading...

Available keyboard shortcuts

Tasklist

Task Details

Task Editing