Lucene search

K
huntrNehalr7779369681B-8BFC-4146-A54C-C5108442D92C
HistoryDec 21, 2022 - 3:38 p.m.

No rate limit on "resend email feature" while enable or disable 2FA from /prefs/mfa endpoint

2022-12-2115:38:03
nehalr777
www.huntr.dev
10
email triggering vulnerability
mail server expenses
2fa verification code

EPSS

0.001

Percentile

32.3%

Description

When a user is setting up 2FA , a verification code will be sent to the registered email . There is no rate limit on email triggering that will result in an email flood / does attack or will also increase the expenses on your mail server as an attacker can send 1 million emails through this vulnerability which will add up to your cost as well

Proof of Concept

1) Go to https://rdiffweb-dev.ikus-soft.com/prefs/mfa 
2) Click on enable 2FA  . A verification link will be sent to your email
3) You will see a "Resend code to my email button" click on it and capture the request using the burpsuite proxy
4) Send this request to your burpsuite intuder and fire the same payload 1000 times
5) The registered email will receive 1000 email with verification codes

EPSS

0.001

Percentile

32.3%

Related for 9369681B-8BFC-4146-A54C-C5108442D92C