Issue 85: Vulnerability in Google Cloud Deployment Manager ⛅, a pentester’s guide to OAuth 🌩️

The Latest API Security News, Vulnerabilities and Best Practices
Issue: #85
Vulnerability in Google Cloud Deployment Manager, a pentester’s guide to OAuth
This week, we check out the recently fixed vulnerability in Google Cloud Deployment Manager, and how to penetration test OAuth 2.0. On a higher level, we have Gartner’s classification of API security technology, and a recording of a panel discussion on API security.
Vulnerability: Google Cloud Deployment Manager
 

Google Cloud Deployment Manager is an infrastructure management service that makes it simple to create, deploy, and manage Google Cloud Platform resources. Ezequiel Pereira found an API vulnerability in Google Cloud Deployment Manager and collected his $31K prize from Google as result.

Pereira found a way to make it invoke Google internal APIs that he was not supposed to invoke:

  1. He could invoke non-production versions of the GCDM API called dogfood and staging that provided him internal information on the workings of the system. A classic example of API9:2019 — Improper assets management in the OWASP classification.
  2. He used these API versions to figure out how to invoke the APIs of Google’s internal services, including Global Service Load Balancer (GSLB).
  3. He took the advantage of the authentication logic that made calls through the service account of the service if user authentication failed.

Beware of non-production versions of your APIs being accessible externally and having in turn access to production systems and data. Such non-production versions are as much “the real thing” as the production versions and require the same considerations. Also, be very careful how you design your authentication flow.

Resources: PenTester’s Guide to OAuth 2.0 Authorization Code Grant
 

Maxfield Chen has published an extremely detailed penetration testing guide for OAuth 2.0 Authorization Code Grant. This is by far the most popular way of using OAuth 2.0, which in turn is the de facto standard of web and API access control. Yet, OAuth can be extremely confusing and there are many ways how OAuth implementations can go wrong.

Chen does a good job quickly recapping the flow and its components. Most importantly, he then proceeds to the main exploit scenarios and covers testing steps for each of them:

  • Insufficient URI validation
  • Referrer header leaking code and state
  • Access token stored in browser history
  • Other access token leaks
  • Client secret leaks
  • Lack of state
  • Insecure state
  • Reused state
  • Invalid state validation
  • Reusable authorization codes
  • Access token stored in JavaScript
  • Implicit grant coercion
  • 307 redirect attack

Definitely worth a closer look, if not as a pentester then as a reminder of what could go wrong.

Analysts: Gartner’s Solution Path for Forming an API Security Strategy
 

A few months ago, Gartner published their report “Solution Path for Forming an API Security Strategy” by Michael Isbitski, Frank Catucci, and Kirk Knoernschild. This report helps identify the different elements in the puzzle of the API security tooling.

The full report requires subscription, but Michael has just posted a quick summary:

API security continues to be top of mind for security practitioners as APIs underpin modern application design, data exchange and system integration. We published a research note towards the tail end of 2019 that provides guidance around API security strategy. There is no shortage of free and paid tooling in this space, but they address specific aspects of the overall API security puzzle. Secure design, testing, discovery, classification, monitoring, mediation and threat protection require a multi-pronged approach that cannot be satisfied with one technology, nor is it one size fits all for organizations. API security is also not just use of TLS to protect data in transit or access control to restrict who can access a given API. These are controls that improve security, but they should not be where your API security strategy begins and ends.

And there is a nice diagram to make a sense of the categories in which different API security tools fall. Obviously, some tools (like the API security platform by my employer, 42Crunch) can cover multiple categories:

Podcast: API Academy’s API Security Q&A Panel
 

The latest episode of API Academy is all about API security. Bill Oaks, Aran White, and Dmitry Sotnikov answer the frequently asked questions and cover a lot of API security ground in the discussion, such as:

  • OWASP API Security Top 10
  • Upcoming OpenAPI 3.1 release and why standards matter
  • DevSecOps and API security
  • Minimal steps for API security
  • Why web application firewalls (WAFs) are failing for REST API security
  • Machine learning / Artificial Intelligence vs defined API contracts and rules
  • Schema validation
  • Rate limits and quotas
  • API responses: why they are also relevant and not just the requests
  • IoT device authentication
  •  OAuth 2.1
  •  Containers
  •  Certificate management
  •  SAML vs REST
  •  Monitoring
  •  API key distribution
  •  API gateway and API firewall location
API Academy security panel video

 

 
dmitry_apisec-1  

Dmitry Sotnikov

APIsecurity.io

 
Thanks for reading.

That's it for today. If you have any feedback or stories to share, simply reply to this email.

Please forward the newsletter to your friends and colleagues who might benefit from it.

 
42Crunch Ltd   71-75 Shelton Street  Covent Garden  London  Greater London   WC2H 9JQ   United Kingdom
You received this email because you are subscribed to API Security News from 42Crunch Ltd.

Update your to choose the types of emails you receive or   
 
 

Older messages

Issue 84: Unprotected APIs at Google Firebase, leaky Arkansas PUA portal💦

Thursday, May 21, 2020

Hi, this week we look at a couple recent API leaks, a new pentesting tool, and webinars APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #84 Unprotected APIs at

Issue 83: India’s COVID-19 tracing app 🦠, OAuth2 API attacks

Thursday, May 14, 2020

Hi, this week we look at API vulnerabilities in coronavirus tracking, OAuth2 security APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #83 India's COVID-19

Issue 82: Most common GraphQL vulnerabilities, pentesting with Insomnia

Thursday, May 7, 2020

Hi, this week we look at GraphQL security, pentesting with Insomnia, OAuth2 cheetsheets APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #82 Most common GraphQL

Issue 81: Vulnerabilities in Microsoft Teams 👥, Auth0, smart home hubs

Thursday, April 30, 2020

Hi, this week, we check out how Microsoft Teams could be breached with a single GIF APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #81 Vulnerabilities in

Issue 80: API vulnerabilities IBM DRM and Cisco USC ☎️

Thursday, April 23, 2020

Hi, this week, we look at API vulnerabilities in IBM and Cisco products, and upcoming APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #80 API vulnerabilities IBM

You Might Also Like

🎮 5 Cheap Apple AirPlay Receiver Alternatives — Your Game Controllers Need Firmware Updates Too

Tuesday, January 7, 2025

Also: The Best Free Offline Music Player Apps For Android How-To Geek Logo January 7, 2025 Did You Know It's a common practice in Japan to package toys with a single cheap piece of candy in order

Daily Coding Problem: Problem #1661 [Medium]

Tuesday, January 7, 2025

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Triplebyte. Implement a data structure which carries out the following operations

DRF, Temp Files, Dataclasses, and More

Tuesday, January 7, 2025

Building HTTP APIs With Django REST Framework #663 – JANUARY 7, 2025 VIEW IN BROWSER The PyCoder's Weekly Logo Building HTTP APIs With Django REST Framework This course will get you ready to build

Charted | The Pyramid of S&P 500 Returns (1874-2024) 💰

Tuesday, January 7, 2025

In 2024, the S&P 500 surged 23%, setting a series of record highs. We show these returns in a historical context spanning 150 years. View Online | Subscribe | Download Our App Presented by: Global

LW 164 - How to create new arrivals collection in Shopify using Shopify Flow    

Tuesday, January 7, 2025

How to create new arrivals collection in Shopify using Shopify Flow ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ Shopify Development news and

Tic-Tac-D’Oh 💻

Tuesday, January 7, 2025

The latest from the dull side of the internet. Here's a version for your browser. Hunting for the end of the long tail • January 07, 2025 Tic-Tac-D'Oh Dell decides to rebrand its machines along

Spyglass Dispatch: CaptAIn AmerIca...

Tuesday, January 7, 2025

Hulu, Fubo, Venu • NVIDIA's Cosmos • NVIDIA's DIGITS • Meta's Board Addition • Meta's Fact-Checking Subtraction • Dude, You're Getting a Dell Pro Max Premium The Spyglass Dispatch

DeveloPassion's Newsletter #183 - Knowledge Management for All

Tuesday, January 7, 2025

A newsletter discussing Knowledge Management, Knowledge Work, Zen Productivity, Personal Organization, and more! Sébastien Dubois DeveloPassion's Newsletter DeveloPassion's Newsletter #183 -

CES 2025 ICYMI: 8 top reveals so far

Tuesday, January 7, 2025

Bluesky's most-needed feature; A mulching robot mower; Linux man pages -- ZDNET ZDNET Tech Today - US January 7, 2025 ces55gettyimages-2191705850 CES 2025: ZDNET's 8 most impressive products we

Post from Syncfusion Blogs on 01/07/2025

Tuesday, January 7, 2025

New blogs from Syncfusion Introducing the New Blazor Chat UI Component By Silambarasan Ilango Enhance real-time communication with the Blazor Chat UI. Discover its features and use cases for creating