Skip to content

Security Test: Resource limiting bypass

Description

Default Severity:

Resource limiting bypass happens when an endpoint lets a client request more data than it should, usually because there's no proper check on the maximum allowed. This means that if someone deliberately requests huge amounts of data, it can overwhelm your system, slow it down, or even crash the server, leading to a denial of service. Often developers simply forget to set clear limits or rely too much on pagination without upper bounds. Without proper limits, your system becomes easy prey for attackers aiming to exhaust resources and disrupt your service.

Configuration

Identifier: resource_limitation/resource_limiting_bypass

Examples

All configuration available:

checks:
  resource_limitation/resource_limiting_bypass:
    skip: false # default

Compliance and Standards

Standard Value
OWASP API Top 10 API4:2023
OWASP LLM Top 10 LLM04:2023
PCI DSS 6.5.10
GDPR Article-32
SOC2 CC6
PSD2 Article-95
ISO 27001 A.12.6
NIST SP800-44
FedRAMP SC-5
CWE 770
CVSS Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CVSS Score 5.3