“Day 12: The Rate Limit Paradox — How I Weaponized API Protections for a $500 DoS Bug”
测试金融科技API时发现其速率限制系统存在致命缺陷:本为防止暴力破解设计的功能被滥用为拒绝服务攻击工具,导致用户账户被锁定24小时。该漏洞使作者获得500美元赏金。 2025-8-25 05:50:3 Author: infosecwriteups.com(查看原文) 阅读量:12 收藏

Turning Security Features Into Attack Vectors Through Creative Abuse

Aman Sharma

While testing a fintech API last month, I discovered their “robust” rate limiting system had a fatal flaw — it could be tricked into locking every user account for 24 hours. What the developers intended as brute-force protection became a denial-of-service weapon, earning me a $500 bounty. Here’s how API safeguards can backfire spectacularly.

free link

Press enter or click to view image in full size

Modern APIs implement protections like:

  • IP-based throttling (100 requests/minute)
  • Account lockouts (5 failed logins → 15min freeze)
  • CAPTCHAs after suspicious activity

The Irony:

68% of these controls introduce new vulnerabilities when misconfigured (2024 Cloud Security Report)

Phase 1: Normal Testing Hit a Wall

curl -X POST https://api.bank.com/login -d '{"user":"test"}'  
# Response: 429 Too Many Requests

文章来源: https://infosecwriteups.com/day-12-the-rate-limit-paradox-how-i-weaponized-api-protections-for-a-500-dos-bug-497fa5f8fe45?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh