Headline
CVE-2022-1699: Uncontrolled Resource Consumption in organizr
Uncontrolled Resource Consumption in GitHub repository causefx/organizr prior to 2.1.2000. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.
Description
The Organizr application allows large characters to insert in the input field “Username” which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
Proof of Concept
1.Sign up to the application, capture the request in burp suites, and send it to Repeater.
2.After the &username= parameter put the payload mentioned on this link:- https://drive.google.com/file/d/1PBd3aXwKOL8uinLG7FJsn-8ldQceW4Zb/view?usp=sharing
3.Now press go and you will see the JWT token also get generated as the same size as the user input.
Video PoC
https://drive.google.com/file/d/1su5IYU3GwUBCMX6SP_Ur-u2uxXXPh6cT/view?usp=sharing
Impact
This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.
Related news
Uncontrolled Resource Consumption in GitHub repository causefx/organizr prior to 2.1.2000. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.