Email flooding using user invitation feature in biz.yelp.com due to lack of rate limiting
Medium
Vulnerability Details
## Summary:
Hello everyone,
The feature to invite users to manage your business has no rate limiting or captcha implemented. Therefore, a malicious user can use this to mail bomb any email's inbox with invitation requests.
## Platform(s) Affected:
biz.yelp.com
## Steps To Reproduce:
This is a pretty straight forward issue, an attacker can invite users to manage the business using the following url: /settings/user_management/invite_user through a POST request. The request body consists of csrftok=TOKEN&title=PRIVELEDGE&email=EMAIL_ADDRESS&biz_selection=LOCATIONS. The attacker can intercept the request and repeat it many times, bombarding someones inbox.
1. Login into biz.yelp.com, and navigate to Account Settings > User management or go to https://biz.yelp.com/settings/user_management
2. Fire up burp
3. Click Invite user, fill email and click send invite
4. Intercept the POST request to https://biz.yelp.com/settings/user_management/invite_user, send to intruder
5. Send the request multiple times using intruder, the server sends 303 to redirect us back to invite page
## Supporting Material/References:
Attached screenshots below
PS. This is my first time bug hunting and my first report so go easy on me :-)
## Impact
Mass Email Flooding
Use up system resources for sending emails, possibly DoS or even DDoS
Actions
View on HackerOneReport Stats
- Report ID: 963368
- State: Closed
- Substate: not-applicable
- Upvotes: 1