Description
Tuist is a virtual platform team for Swift app devs. Prior to 1.180.10, the forgot password flow allows an unauthenticated attacker to repeatedly trigger password reset emails for a known account without server-side throttling. In self-hosted deployments, this can be abused to send large volumes of unwanted email and consume downstream email delivery resources. This vulnerability is fixed in 1.180.10.
Problem types
CWE-770: Allocation of Resources Without Limits or Throttling
Product status
References
github.com/.../tuist/security/advisories/GHSA-v7gr-7ww5-w4cx