-
-
Notifications
You must be signed in to change notification settings - Fork 394
Closed
Labels
enhancementNew feature or requestNew feature or request
Description
Hi, team! Thanks for the really great project. I would like to suggest the following changes to the "Lack of Resources & Rate Limiting" section:
- add information about improper query string params validation that could lead to DDoS attack against the server. I often face with a problem of absence of query string parameters validation, especially such parameters as
size
, 'page', .etc. Let's consider an example.
Scenario 1
We have a MEAN stack application that contains the users list on a UI. List of users can be retrieved from the server using a following query:
/dashboard/users?page=1&size=100
There are limitation on maximum number of users per page (on UI side) - 200 users. An attacker changes thesize
parameter in order to retrieve large number of users, for example200 000
or more and it causes performance issues.
Mentioned scenario can be also used to provoke Integer Overflow
or Buffer Overflow
errors.
One more suggestion:
- add an attack scenario example for the NoSQL injection.
But I think it can be discussed in the separate issue.
llegaz
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request