Security flaw:Rate Limiting Bypass at reset-password-request page #2648
zhamadagithub
started this conversation in
Feature request
Replies: 3 comments
-
@zhamadagithub, thank you for opening this issue. We will triage it within the next few business days. |
Beta Was this translation helpful? Give feedback.
0 replies
-
Hello @zhamadagithub, thank you for bringing this issue to our attention. We have created an internal work item to investigate and address this. |
Beta Was this translation helpful? Give feedback.
0 replies
-
Our security team is asking for an ETA on when this vulnerability will be resolved. Thank you! |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Every bug report should have precise description and reproduction steps; console traces or source code references are appreciated.
For assistance requests, contact Azure support or submit a post on Stack Overflow. We don't provide support through GitHub Issues. Feature requests can be raised on the Azure Feedback Forum.
Bug description
A bypass of the rate limiting feature was found at the password reset page.
Bypasses of rate limiting mechanisms such as CAPTCHA can allow an attacker to automate attacks at the specific endpoint and consume unnecessary resources on the server, potentially causing service disruption and denial-of-service. This also circumvents a multitude of other factors including security, data accuracy, spam, and protection against bots.
Reproduction steps
Expected behavior
A clear and concise description of what you expected to happen.
Is your portal managed or self-hosted?
Azure Managed
Environment
Out of the box Azure APIM
Additional context
Recommended fix:
Beta Was this translation helpful? Give feedback.
All reactions