No rate limit on send report functionality results in an email spam in ikus060/rdiffweb

Valid

Reported on

May 4th 2023


Description

There is no rate limit on the send report feature on the https://rdiffweb-dev.ikus-soft.com/prefs/notification endpoint , which allows an attacker to spam the victims mailbox

Proof of Concept

1) Go to https://rdiffweb-dev.ikus-soft.com/prefs/notification 
2) Click on daily frequency for Send me a backup status report 
3) Turn on your intercept and capture the request while you Click the Save and send report button . 
4) Send this report to the repeater and send the same request 100 times .
5) You will see that the mailbox has been spammed

Impact

Due to lack of rate limit this may create an email spam attack or may put immense load on the mail server being used causing additional expenses for the organisation

We are processing your report and will contact the ikus060/rdiffweb team within 24 hours. 5 months ago
We have contacted a member of the ikus060/rdiffweb team and are waiting to hear back 5 months ago
Patrik Dufresne validated this vulnerability 5 months ago

Thanks for the report. Will get it fixed

Nehal Pillai has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
Nehal Pillai
3 months ago

Researcher


Any updates on this sir?

Nehal Pillai
2 months ago

Researcher


Any updates on this?

Patrik Dufresne marked this as fixed in 2.8.0 with commit feef0d 2 months ago
Patrik Dufresne has been awarded the fix bounty
This vulnerability has been assigned a CVE
Patrik Dufresne published this vulnerability 2 months ago
to join this conversation