Email flooding using user invitation feature in biz.yelp.com due to lack of rate limiting

Disclosed: 2020-09-29 20:00:45 By oxecho To yelp
Medium
Vulnerability Details
## Summary: Hello everyone, The feature to invite users to manage your business has no rate limiting or captcha implemented. Therefore, a malicious user can use this to mail bomb any email's inbox with invitation requests. ## Platform(s) Affected: biz.yelp.com ## Steps To Reproduce: This is a pretty straight forward issue, an attacker can invite users to manage the business using the following url: /settings/user_management/invite_user through a POST request. The request body consists of csrftok=TOKEN&title=PRIVELEDGE&email=EMAIL_ADDRESS&biz_selection=LOCATIONS. The attacker can intercept the request and repeat it many times, bombarding someones inbox. 1. Login into biz.yelp.com, and navigate to Account Settings > User management or go to https://biz.yelp.com/settings/user_management 2. Fire up burp 3. Click Invite user, fill email and click send invite 4. Intercept the POST request to https://biz.yelp.com/settings/user_management/invite_user, send to intruder 5. Send the request multiple times using intruder, the server sends 303 to redirect us back to invite page ## Supporting Material/References: Attached screenshots below PS. This is my first time bug hunting and my first report so go easy on me :-) ## Impact Mass Email Flooding Use up system resources for sending emails, possibly DoS or even DDoS
Actions
View on HackerOne
Report Stats
  • Report ID: 963368
  • State: Closed
  • Substate: not-applicable
  • Upvotes: 1
Share this report