[www.stripo.email] You can override the speed limit by adding the X-Forwarded-For header.
Medium
Vulnerability Details
###Summary
In *https://stripo.email/template-order* I think you have implemented rate limiting via 429 status code for too many requests, but in reality it is not. An attacker could bypass the 429 speed limit by adding an X-Forwarded-For header.
###Steps To Reproduce
1. Go to the *https://stripo.email/template-order* page
2. fill in the random content and Click the Order Template grab the packet.
3. Automate the request by adding the X-Forwarded-For header.
###Proof of Concept
The first photo bypasses the speed limit by adding an X-Forwarded-For header.
{F797676}
The second figure shows the 429 status code playing due to the speed limit if the X-Forwarded-For header is not added.
{F797677}
###Fix
Fix this bug by changing the way the server handles X-Forwarded-For headers
## Impact
Override speed limit
Actions
View on HackerOneReport Stats
- Report ID: 855013
- State: Closed
- Substate: resolved
- Upvotes: 34