Rate_Limiting
some websites may exclude these types of vulnerabilities from the scope, So read the scope well before testing!
You can find it in any submission form like (login forms, contact forms, registration forms, and other types of forms that accept user input).
Testing and Checklist
look for any submission form like (login forms, contact forms, registration forms, and other types of forms that accept user input).
Try to submit a lot of submissions using Intruder, FFUF, ZAP...etc.
If u encountered a rate limit technique try to identify how is working and how it identifies u.
Altering other request headers such as the user-agent and cookies is recommended
If the target system applies rate limits on a per-account or per-session basis, distributing the attack or test across multiple accounts or sessions can help in avoiding detection
Inserting blank bytes like
%00
,%0d%0a
,%0d
,%0a
,%09
,%0C
,%20
into code or parameters can be a useful strategy. like->code=1234%0a
Impact
it depends on the scenario, let's suppose a situation where we found it in Registration form where it sends email to verify your account the impact would be:
risk of the email address domain being added to a spam list.
reputational damage for the business as customers’ trust is impacted through receiving large amounts of unwanted and unsolicited emails.
for systems that use Software-as-a-Service (SaaS) email providers, there can be direct financial costs associated with sending large volumes of emails to unconfirmed user’s emails.
Last updated