Unprotected Api EndPoints
Medium
Vulnerability Details
## Summary:
I am able to automate the get/post requests of the following api end-points with a python script which can lead to heavy load to server resulting in dos attack or buffer overflow.
/internal_api/v0.2/getSuggestedProjects
/internal_api/v0.2/getLanguages
/internal_api/v0.2/getLoggedInUser
/internal_api/v0.2/getSecuritySettings
/internal_api/v0.2/getActiveOAuthGrants
/internal_api/v0.2/getAccountEmails
/internal_api/v0.2/getExternalAccounts
/internal_api/v0.2/getAuthenticationProviders
/internal_api/v0.2/getActivePRIntegrations
/internal_api/v0.2/getProjectLatestStateStats
/internal_api/v0.2/getBlogPosts
/internal_api/v0.2/setUsername
/internal_api/v0.2/savePublicInformation
## Steps To Reproduce:
[add details for how we can reproduce the issue]
1. Create an account lgtm-com.pentesting.semmle.net.
2. Get The cookie and nonce value of your logged in session by intercepting post/get requests with burpsuite.
3. Use the cookie and nonce value in dos.py script(attached) inorder to execute endless api calls.
4.Watch Video Attached as POC.
## Supporting Material/References:
[list any additional material (e.g. screenshots, logs, etc.)]
Video and Script is attached.
* [attachment / reference]
## Impact
Leading to heavy load on server that can lead to dos attack or buffer overflow using post requests with no rate limit restriction.
Actions
View on HackerOneReport Stats
- Report ID: 511536
- State: Closed
- Substate: not-applicable
- Upvotes: 3