Unrestriced Resource Consumption

Unrestricted Resource Consumption occurs when an application allows users to consume excessive amounts of system resources (e.g., CPU, memory, bandwidth) without proper limits or controls.

The below example is based on HTB's API Attacks module.

Lack of limiting user-initiated requests that consume resources can lead to DoS attacks (Figure 1) as well as BF attacks (Figure 2).

Figure 1: A potentlally-vulnerable to Uncontrolled Resource Consumption endpoint.
# Creating a 30 megabytes PDF file
$ dd if=/dev/urandom of=certificateOfIncorporation.pdf bs=1M count=30
30+0 records in
30+0 records out
31457280 bytes (31 MB, 30 MiB) copied, 0.0632942 s, 497 MB/s

$ ls -l
-rw-r--r-- 1 x7331 x7331 31457280 Jul 11 09:18 certificateOfIncorporation.pdf
Figure 2: Uploading the PDF file.
Figure 3: Performing a BFA for the user's email due to lack of rate-limiting measures.

Last updated

Was this helpful?