CVE-2021-33831
MEDIUMTh-wildau Covid-19 Contact Tracing < 2021-09-01 - Resource Allocation Without Limits
Title source: ruleExploitation Summary
EIP tracks 1 public exploit for CVE-2021-33831. PoCs published by lanmarc77.
AI-analyzed exploit summary The repository contains a functional Perl script that automates the creation of fake users and check-ins in a COVID-19 contact tracing application, exploiting the lack of CAPTCHA or rate-limiting protections. The exploit demonstrates a denial-of-service (DoS) attack by flooding the system with fake user registrations and check-ins.
Description
api/account/register in the TH Wildau COVID-19 Contact Tracing application through 2021-09-01 has Incorrect Access Control. An attacker can interfere with tracing of infection chains by creating 500 random users within 2500 seconds.
Exploits (1)
The repository contains a functional Perl script that automates the creation of fake users and check-ins in a COVID-19 contact tracing application, exploiting the lack of CAPTCHA or rate-limiting protections. The exploit demonstrates a denial-of-service (DoS) attack by flooding the system with fake user registrations and check-ins.
References (2)
Scores
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H