This vulnerability exists in Shilpi Client Dashboard due to lack of rate limiting and Captcha protection for OTP requests in certain API endpoint. An unauthenticated remote attacker could exploit this vulnerability by sending multiple OTP request through vulnerable API endpoints, which could lead to the OTP bombing on the targeted system.
The product does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Client_dashboard | Shilpisoft | * | 9.7.0 (excluding) |