File tree Expand file tree Collapse file tree 1 file changed +0
-10
lines changed Expand file tree Collapse file tree 1 file changed +0
-10
lines changed Original file line number Diff line number Diff line change @@ -33,16 +33,6 @@ during the creation of thumbnails and the API becomes unresponsive.
33
33
34
34
### Scenario #2
35
35
36
- An attacker starts the password recovery workflow by issuing a POST request to
37
- ` /api/system/verification-codes ` and by providing the username in the request
38
- body. Next an SMS token with 6 digits is sent to the victim’s phone. Because the
39
- API does not implement a rate limiting policy the attacker can test all possible
40
- combinations using a multi-thread script, against the
41
- ` /api/system/verification-codes/{smsToken} ` endpoint to discover the right token
42
- within a few minutes.
43
-
44
- ### Scenario #3
45
-
46
36
We have an application that contains the users' list on a UI with a limit of
47
37
` 200 ` users per page. The users' list is retrieved from the server using the
48
38
following query: ` /api/users?page=1&size=100 ` . An attacker changes the ` size `
You can’t perform that action at this time.
0 commit comments