Skip to content

Commit 21122a6

Browse files
authored
Move example to A2
1 parent 2391697 commit 21122a6

File tree

1 file changed

+0
-10
lines changed

1 file changed

+0
-10
lines changed

2019/en/src/0xa4-lack-of-resources-and-rate-limiting.md

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -33,16 +33,6 @@ during the creation of thumbnails and the API becomes unresponsive.
3333

3434
### Scenario #2
3535

36-
An attacker starts the password recovery workflow by issuing a POST request to
37-
`/api/system/verification-codes` and by providing the username in the request
38-
body. Next an SMS token with 6 digits is sent to the victim’s phone. Because the
39-
API does not implement a rate limiting policy the attacker can test all possible
40-
combinations using a multi-thread script, against the
41-
`/api/system/verification-codes/{smsToken}` endpoint to discover the right token
42-
within a few minutes.
43-
44-
### Scenario #3
45-
4636
We have an application that contains the users' list on a UI with a limit of
4737
`200` users per page. The users' list is retrieved from the server using the
4838
following query: `/api/users?page=1&size=100`. An attacker changes the `size`

0 commit comments

Comments
 (0)