Unauthenticated route use expensive APIs without rate limiting

Description

Unauthenticated users are allowed to consume an API that makes use of third-party services paid for per request and does not implement any rate-limiting protection.

A malicious user could abuse this endpoint to incur significant costs, exceed your quota, and potentially disrupt your application.

Rationale

This finding works by:

Remediation

  • Set up rate-limiting using a detection rule on this API
  • Implement authentication to prevent non-intended users interaction with the API
  • Require a challenge to prevent automated traffic and slow down resource exhaustion
  • Keep track of this sensitive business flow by adding business logic information to the endpoint