Back to list

Massive Data on Response

Description

The "Massive Data on Response" vulnerability refers to a security weakness where an excessive amount of data is included in an application's response to a request. This can lead to performance issues, resource exhaustion, and potentially enable Denial of Service (DoS) attacks. Mitigation involves implementing proper pagination, data filtering, and limiting the amount of data returned in each response to prevent overwhelming the system and protect against exploitation.

Remediation

Implement server-side pagination, filtering, or chunked data retrieval methods to control the volume of data returned per request. Configure rate limits or throttling to prevent automated tools from repeatedly requesting large datasets. Monitor and log resource usage to detect spikes in response sizes that may indicate attempts at DoS. Employ a Web Application Firewall (WAF) or intrusion detection system to detect suspicious patterns related to massive data requests. Regularly review your API design to ensure endpoints do not inadvertently expose excessive or unnecessary data.

References

https://owasp.org/www-community/attacks/Denial_of_Servicehttps://owasp.org/Top10/A04_2021-Insecure_Design/

Severity

MEDIUM

Owasp

Code: A04:2021

Category: Insecure Design

Classification

CWE-400
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5.3

CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5.3