Exploiting an API with Structured Format Injection

Even today, we continue to see abuse of tainted data taking out the apps and infrastructure we use daily.
While input validation is improving in frontend web apps, it's not uncommon to bypass this altogether and go straight to attacking the APIs.
When structured data is being relied on, such as within API contracts, Structured Format Injection becomes a thing.
SFI allows an attacker to manipulate the structure of the data being transferred between systems in order to exploit vulnerabilities and gain unauthorized access.
To exploit an API with SFI, you first need to identify the data format being used.
Even better, the API spec docs should showcase what object models it may be expecting.
Of course, if you don't have access to detailed documentation, you can generate your own rogue docs from the traffic you record while using the API. Once the data format is identified, you can manipulate its structure to carry out your attack.
You could add additional fields or values to bypass authentication checks, inject malicious code, or modify existing data to change the behavior of the application.
In this article, I want to focus on injecting malicious input that may cause the API on the server to behave differently by polluting parameters.
It isn't uncommon to find API endpoints that are used to do partial updates to a data record.
You may be able to manipulate parameters to exploit vulnerabilities in the server's structured data processing.
To test for this, inject unexpected structured data into user inputs and see how the server responds.
Now imagine that the server processes this data to call the backend server API that you don't have direct access to.
While we could not directly update the user, we still exploited a Broken Object Property Level Authorization vulnerability to give ourselves the admin role by using SFI. When software frameworks automatically bind request parameters to fields on an internal object, it can lead to hidden parameters in an API that developers didn't even intend to allow to be read or written.
You already know I am a big fan of tainting data in weird places.
One great place is to manipulate the Content-Type and see if the API might act differently.
Depending on how the server processes the request and creates the JSON object going to the backend API, it may inject the role property and ultimately give you admin access.
YMMV. Every API is going to act differently but you get the general approach now.
Through Server Side Parameter Pollution, it may be possible to abuse an API and find Broken Object Property Level Authorization vulnerabilities.
The post Exploiting an API with Structured Format Injection appeared first on Dana Epp's Blog.


This Cyber News was published on securityboulevard.com. Publication date: Tue, 02 Jan 2024 18:13:04 +0000


Cyber News related to Exploiting an API with Structured Format Injection

Exploiting an API with Structured Format Injection - Even today, we continue to see abuse of tainted data taking out the apps and infrastructure we use daily. While input validation is improving in frontend web apps, it's not uncommon to bypass this altogether and go straight to attacking the APIs. ...
10 months ago Securityboulevard.com
Defining Good: A Strategic Approach to API Risk Reduction - A good API security strategy starts with a well thought out API security posture governance program that spans from design to deployment. That standard, if communicated and enforced effectively, will not only positively affect how a developer designs ...
10 months ago Securityboulevard.com
That time I broke into an API and became a billionaire - This included an internal API with a dependency on a third-party banking API. We'll get to the banking API later in this story. That's all thanks to developers embracing agile development, microservices, and API gateway redirection that exposed ...
11 months ago Securityboulevard.com
Salt Security Delivers API Posture Governance Engine - PRESS RELEASE. PALO ALTO, Calif., Jan. 17, 2024 /PRNewswire/ - Salt Security, the leading API security company, today announced multiple advancements in discovery, posture management and AI-based threat protection to the industry leading Salt ...
10 months ago Darkreading.com
Imperva Named an Overall Leader in the KuppingerCole Leadership Compass: API Security and Management Report - We're thrilled to share that Imperva has achieved the prestigious status of Overall Leader in the KuppingerCole Leadership Compass: API Security and Management report. A notable achievement is being recognized as one of the few non-gateway-first ...
11 months ago Imperva.com
Unified API Protection - A massive segment of organizations' digital footprint today is built around internal and external APIs. As more IT leaders realize and acknowledge the size of APIs' influence, it's become clear that new methods are needed to secure those APIs. While ...
1 year ago Cequence.ai
What do CISOs need to know about API security in 2024? - According to Postman's 2023 State of the API Report, roughly 66% of participants indicated that their APIs contribute to generating revenue. A recent ESG survey on API security showed that 92% of organisations using APIs have experienced a breach in ...
10 months ago Cybersecurity-insiders.com
API Gateways and API Protection: What’s the Difference? - Security Boulevard - At the security level, API security tools and gateways provide different controls to protect APIs from various threats. API protection – or API security – refers to a comprehensive set of security capabilities designed to protect APIs from a wide ...
1 month ago Securityboulevard.com
The Limitations of Google Play Integrity API - This overview outlines the history and use of Google Play Integrity API and highlights some limitations. We also compare and contrast Google Play Integrity API with the comprehensive mobile security offered by Approov. Google provides app attestation ...
11 months ago Securityboulevard.com
7 Essential Practices for Secure API Development - The necessity for API security cannot be overstated. Authentication and Authorization Authentication and authorization form the cornerstone of secure API interactions. In the world of API security, managing identities accurately ensures that only ...
8 months ago Feeds.dzone.com
API Security: The Big Picture - Given this, it is no surprise that API security is a top priority for many security teams in the coming year. Here are 10 strategic things to look for in an API security offering. Multiple Environment Capability API security isn't very helpful if it ...
11 months ago Darkreading.com
API security in 2024: Predictions and trends - As technology continues to advance at an unprecedented pace, so does the complexity of API security. With the proliferation of APIs in modern applications and services, organizations will need to develop a better understanding of their API ...
10 months ago Helpnetsecurity.com
API Security in 2024: Navigating New Threats and Trends - As we step into 2024, the landscape of API security is at a critical juncture. The previous year witnessed a significant escalation in API-related breaches, impacting diverse organizations and bringing to light the critical vulnerabilities in API ...
9 months ago Cybersecurity-insiders.com
The 9 Most Essential API Security Tools to Protect Against Cyber Threats - Understanding the importance of API security is crucial as technological advancements across various industries continue to make our lives easier. Through APIs connecting different systems and services together, automation is becoming increasingly ...
1 year ago Csoonline.com
Optimizing API Lifecycles - In this article, we will delve into the intricacies of optimizing API lifecycles-an essential aspect for product managers navigating the dynamic landscape of digital integration. From conceptualization to retirement, understanding and implementing ...
11 months ago Feeds.dzone.com
API Analytics - Managing APIs effectively is no longer just about designing and deploying them-it's also about harnessing the power of data-driven insights through API analytics. In this article, we'll explore the transformative role of API analytics in enhancing ...
11 months ago Feeds.dzone.com
How Does Automated API Testing Differ from Manual API Testing: Unveiling the Advantages - Delve into automated versus manual API testing for efficient software delivery. See how automation speeds validation while manual testing provides human insight, ensuring comprehensive coverage for robust development. In the domain of software ...
9 months ago Hackread.com
How AI is revolutionizing "shift left" testing in API security - Catching coding errors in API preproduction, before they are spun up and go live is critical in preventing exploitable vulnerabilities. For developers who are not security experts, fixing code or knowing business logic abuse possibilities can be ...
11 months ago Helpnetsecurity.com
Navigating API Governance: Best Practices for Product Managers - As the complexity of API ecosystems grows, the need for robust governance becomes paramount. In this article, we will explore in-depth the best practices for product managers in navigating API governance, ensuring secure, scalable, and compliant ...
11 months ago Feeds.dzone.com
Safeguarding Data Exchange: A Comprehensive Overview of API Gateways and Their Imperative Role in Ensuring Robust Security - In today's interconnected digital landscape, the proliferation of Application Programming Interfaces has revolutionized the way systems communicate and exchange data. This underscores the pivotal role of API Gateways as the guardians of digital ...
11 months ago Feeds.dzone.com
Most API security strategies are underdeveloped. Let's unpack that. - Adaptation to Change: Strategies are not static; they evolve over time. Applying these concepts to information security and cyber security in general, we can easily see that having a strategy is a) nothing novel and b) applicable to all. Filter down ...
11 months ago Itsecurityguru.org
What We Learned from These 3 API Security Breaches - If we look closely, there are lessons to be learned from these five fateful API attacks that can help any organisation secure its APIs better. The scenario: The helpdesk ticketing platform Zendesk was exposed to attackers thanks to a SQL injection ...
8 months ago Itsecurityguru.org
Managing API Contracts and OpenAPI Documents at Scale - This global event for API practitioners gets bigger. This year the event was held in the newly renovated CNIT Forest - a central and easy to join location in the Paris La Defense business area. Many of us were amazed by the number of talks and ...
11 months ago Feedpress.me
Have I Been Pwned adds 71 million emails from Naz.API stolen account list - Have I Been Pwned has added almost 71 million email addresses associated with stolen accounts in the Naz.API dataset to its data breach notification service. The Naz.API dataset is a massive collection of 1 billion credentials compiled using ...
10 months ago Bleepingcomputer.com
'Operation Triangulation' Spyware Attackers Bypass iPhone Memory Protections - The Operation Triangulation attacks are abusing undocumented functions in Apple chips to circumvent hardware-based security measures. A previously undocumented hardware feature within Apple's iPhone System on a Chip allows for exploitation of ...
10 months ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)