Lucene search

K
huntrNehalr777B34412CA-50C5-4615-B7E3-5D07D33ACFCE
HistoryOct 03, 2022 - 12:40 p.m.

Using application logic to create an email spam attack

2022-10-0312:40:01
nehalr777
www.huntr.dev
7
application logic
email spam attack
2fa
bruteforce
bug bounty

EPSS

0.002

Percentile

60.5%

Description

On every 3 invalid attempts the application sends a new code to the email associate with the account . An attacker can misuse this functionality of the code to create a spam attack

Proof of Concept

Pre-Requisites: 2FA must be enabled for  your account 

1) Go to https://rdiffweb-dev.ikus-soft.com/login/ and login using credentials
2) You will now have to enter MFA code
3) Bruteforce this code , its indeed an 8 digit code (~100 million combinations required) . Every third incorrect attempt will trigger a new code to the email , which will indeed result in an email spam attack


EPSS

0.002

Percentile

60.5%

Related for B34412CA-50C5-4615-B7E3-5D07D33ACFCE