OWASP API Top 10 Deep Dive - Part Duex
In this follow-up post to our now viral and world-famous blog, entitled with the ever-catchy title, OWASP API Top 10 Deep Dive - Part 1, we will delve deeper into categories 3 and 4 on the list, Broken Object Property Level Authorization and Unrestricted Resource Consumption. Without further ado and a shiver of excitement up our spines...
This vulnerability is the combination of two categories from the 2019 OWASP API Top Ten, and as it was rightly determined, was the root cause of both vulnerabilities. The first was Excessive Data Exposure, which is where an API allows a user access to properties of an endpoint or object that they shouldn't have access to.
The second previous category that is covered by Broken Object Property Level Authorization is Mass Assignment, which allows a user to modify, in some way, a sensitive property they should not be able to change.
Excessive data exposure in APIs can have significant consequences, as it can potentially expose sensitive information. This can include personally identifiable information (PII), such as names, addresses and social security numbers, as well as more sensitive data, such as financial information and health records. Furthermore, such exposure may result in identity theft, financial fraud, and other malicious activities, making it crucial to ensure that proper security measures are taken to prevent such incidents.
As such, developers and organizations must take the necessary steps to secure their APIs and protect their sensitive data, such as implementing API security, API security testing, and secure SDLC and AppSec Orchestration and Correlation (ASOC). By doing so, they can safeguard their customers' sensitive information and avoid costly data breaches and potential reputational damage.
The exploitation of mass assignment in APIs can lead to various security risks, including but not limited to privilege escalation, data tampering and bypassing of security mechanisms. As a result, developers need to take extra precautions when designing and implementing APIs to prevent these types of attacks.
Some recommended measures include implementing proper input validation and sanitization, using parameterized queries and limiting the fields that can be updated through mass assignment. In addition, regular security audits and vulnerability assessments from API security testing and SAST/DAST/IAST/SCA can help identify potential weaknesses in the API and ensure that it is secure against attacks at the code level. At the same time, API security and Web Application and API Protection (WAAP) can provide runtime protection while development resolves issues in the code.
By taking these steps, companies can help ensure the security and integrity of their APIs and protect their users' sensitive data from malicious actors.
Unrestricted Resource Consumption (URC) is a type of security vulnerability that occurs when an API does not appropriately limit the amount of resources a single request can consume. This can allow an attacker to overwhelm the system by sending many requests that consume excessive resources. URC vulnerabilities can be particularly dangerous in APIs that access sensitive or critical resources.
One common cause of URC vulnerabilities is the lack of rate limiting. For example, an API may allow users to make unlimited requests without restrictions, leading to excessive resource consumption. This can be mitigated by implementing rate limiting, limiting the number of requests a user can make within a specific time frame.
Another common cause of URC vulnerabilities is the lack of input validation. If an API does not correctly validate user input, an attacker can send requests that contain malicious or unexpected data. This can cause the system to consume excessive resources while processing the information. Input validation can help prevent URC vulnerabilities by ensuring that the API processes only valid and expected input.
URC vulnerabilities in APIs can have severe consequences for both users and organizations. If an attacker can overwhelm the system with excessive requests, they can cause denial of service (DoS) or distributed denial of service (DDoS) attacks. This can result in service disruptions, financial losses, and damage to reputation. In addition, URC vulnerabilities can also be used as a means of surveillance, allowing attackers to gather information about the system and identify other vulnerabilities.
To prevent and mitigate URC vulnerabilities, organizations should implement proper input validation and rate limiting. They should also monitor API usage for signs of excessive resource consumption and implement mechanisms to detect and block malicious requests. By taking these steps, organizations can help protect their APIs from URC vulnerabilities and ensure the security and integrity of their systems.