Bug #76
closedFeature #65: Security Audit
[Security Audit ] 11- OTP Flooding
100%
Description
11- OTP Flooding
CWE : CWE-770
Description :
This attack consists of generation of large number of OTP requests to a single mobile
number and email.
Affected Path(s) :
https://earogya.satragroup.in/login *-Applicable to entire application
Impact :
The attacker could stop the availability of service or cause a performance decrease.
Recommendation :
It is recommended to send only 5 or 10 OTPs to a single mobile number for a period of
time. After one successful OTP transaction (OTP sending and verifying) this count can be
rest. Implement CAPTCHA mechanism for the request that is making OTP request.
Evidence/Proof Of Concept :
Step 1: Navigate to forgot password page and enter any Email.
Step 2: Multiple OTP's sent to Mobile as shown in below screenshot.
Step 3: It is observed that there is no rate limit for otp.
Step 4: Multiple OTP's sent to Mobile as shown in below screenshot.
Files