Resource limiting bypass
Description
Resource limiting bypass occurs when a pagination or another limiting method has no upper limit and can create large responses or crash the server, causing a Denial Of Service.
Remediation
To remediate a resource limiting bypass vulnerability, follow these steps:
- Implement strict resource usage quotas and limits for users and processes.
- Regularly review and adjust the limits based on usage patterns and requirements.
- Use monitoring tools to detect unusual activity that could indicate an attempt to bypass resource limits.
- Apply rate limiting to prevent abuse of services and APIs.
- Ensure that all input validation checks are in place to prevent malicious input from triggering a bypass.
- Update the application and system software to the latest versions to patch known vulnerabilities.
- Conduct regular security audits and penetration testing to identify and fix potential bypass methods.
- Enforce the principle of least privilege by granting minimal access rights necessary for users and services.
- Use security mechanisms like Web Application Firewalls (WAFs) to detect and block exploit attempts.
- Educate users and administrators about the importance of adhering to resource usage policies.
GraphQL Specific
Apollo
Yoga
Awsappsync
Graphqlgo
Graphqlruby
Hasura
REST Specific
Asp_net
Ruby_on_rails
Next_js
Laravel
Express_js
Django
Symfony
Spring_boot
Flask
Nuxt
Fastapi
Configuration
Identifier:
resource_limitation/resource_limiting_bypass
Examples
Ignore this check
checks:
resource_limitation/resource_limiting_bypass:
skip: true
Score
- Escape Severity: HIGH
Compliance
OWASP: API4:2023
pci: 6.5.10
gdpr: Article-32
soc2: CC6
psd2: Article-95
iso27001: A.12.6
nist: SP800-44
fedramp: SC-5
Classification
- CWE: 770
Score
- CVSS_VECTOR: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
- CVSS_SCORE: 5.3