Unprotected Api EndPoints

Disclosed: 2019-03-21 17:38:02 By kaushalag29 To semmle
Medium
Vulnerability Details
## Summary: I am able to automate the get/post requests of the following api end-points with a python script which can lead to heavy load to server resulting in dos attack or buffer overflow. /internal_api/v0.2/getSuggestedProjects /internal_api/v0.2/getLanguages /internal_api/v0.2/getLoggedInUser /internal_api/v0.2/getSecuritySettings /internal_api/v0.2/getActiveOAuthGrants /internal_api/v0.2/getAccountEmails /internal_api/v0.2/getExternalAccounts /internal_api/v0.2/getAuthenticationProviders /internal_api/v0.2/getActivePRIntegrations /internal_api/v0.2/getProjectLatestStateStats /internal_api/v0.2/getBlogPosts /internal_api/v0.2/setUsername /internal_api/v0.2/savePublicInformation ## Steps To Reproduce: [add details for how we can reproduce the issue] 1. Create an account lgtm-com.pentesting.semmle.net. 2. Get The cookie and nonce value of your logged in session by intercepting post/get requests with burpsuite. 3. Use the cookie and nonce value in dos.py script(attached) inorder to execute endless api calls. 4.Watch Video Attached as POC. ## Supporting Material/References: [list any additional material (e.g. screenshots, logs, etc.)] Video and Script is attached. * [attachment / reference] ## Impact Leading to heavy load on server that can lead to dos attack or buffer overflow using post requests with no rate limit restriction.
Actions
View on HackerOne
Report Stats
  • Report ID: 511536
  • State: Closed
  • Substate: not-applicable
  • Upvotes: 3
Share this report