Skip to content

Extend 'Lack of Resources & Rate Limiting' section #3

@IgorSasovets

Description

@IgorSasovets

Hi, team! Thanks for the really great project. I would like to suggest the following changes to the "Lack of Resources & Rate Limiting" section:

  • add information about improper query string params validation that could lead to DDoS attack against the server. I often face with a problem of absence of query string parameters validation, especially such parameters as size, 'page', .etc. Let's consider an example.
    Scenario 1
    We have a MEAN stack application that contains the users list on a UI. List of users can be retrieved from the server using a following query:
    /dashboard/users?page=1&size=100
    There are limitation on maximum number of users per page (on UI side) - 200 users. An attacker changes the size parameter in order to retrieve large number of users, for example 200 000 or more and it causes performance issues.

Mentioned scenario can be also used to provoke Integer Overflow or Buffer Overflow errors.
One more suggestion:

  • add an attack scenario example for the NoSQL injection.
    But I think it can be discussed in the separate issue.

Metadata

Metadata

Assignees

Labels

enhancementNew feature or request

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions