Hi Team,
Summary:
As a best practice a login page should have a rate limitting just like hackerone.com
Vulnerable Request
POST /auth/post_login HTTP/1.1
Host: ctf.hacker101.com
User-Agent: <redacted>
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: https://ctf.hacker101.com/
Content-Type: application/x-www-form-urlencoded
Content-Length: 73
Cookie:<some cookie>
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1
csrf=<csrf token>&username=<target username>&password=<vulnerable parameter>
Proof Of Concept
██████
Notice the Content Length as highlited on my screenshot
An attacker can freely bruteforce any username and can takeover any account