Issue 98: APIs as the next frontier in cybercrime

The Latest API Security News, Vulnerabilities and Best Practices
Issue: #98
APIs as the next frontier in cybercrime
This week, we take a look at the recently reported API vulnerabilities in the COVID-19 tracing app Aura and in Kubernetes, some API security best practices, and a talk on OWASP API Top 10 from DEF CON 2020.
Vulnerability: Aura COVID-19 tracing app
 

Another mandatory COVID-19 tracing app,  was found to leak personal information and health status of users. This time it was Aura, an app that Albion College in Michigan has made mandatory for all students.

Among other issues, such as hard-coded secret keys to the backend server, the app also had an API that allowed to enumerate account numbers. For a given account, one could get the COVID status of a student, the date of testing, and the student’s full name.

Lessons to be learned from this case are familiar:

  • Never allow any sort of account enumeration in your APIs.
  • Prevent IDOR/BOLA attacks by enforcing authorization and letting each account to access their own data only.

We have previously covered API vulnerabilities in various coronavirus tracing apps in our issues 83 and 86.

Vulnerability: Kubernetes
 

Do not think that localhost calls are automatically safe. Attacks are often stacked and hackers can expand their attacks once they have passed the initial defense. If there is a vulnerable local proxy on a system that automatically trusts it, attackers can use it for their malicious activity.

Unit42 researchers found a serious vulnerability in some Kubernetes deployments: the CVE-2020-8558 in Kubernetes kube-proxy combined with the insecure-port enabled on an  api-server allowed attackers to gain full control over Kubernetes clusters:

A security issue assigned CVE-2020-8558 was recently discovered in the kube-proxy, a networking component running on Kubernetes nodes. The issue exposed internal services of Kubernetes nodes, often run without authentication. On certain Kubernetes deployments, this could have exposed the api-server, allowing an unauthenticated attacker to gain complete control over the cluster. An attacker with this sort of access could steal information, deploy crypto miners or remove existing services altogether.

The vulnerability exposed nodes’ localhost services – services meant to be accessible only from the node itself – to hosts on the local network and to pods running on the node. Localhost bound services expect that only trusted, local processes can interact with them, and thus often serve requests without authentication. If your nodes run localhost services without enforcing authentication, you are affected.

The issue details were made public on April 18, 2020, and a patch released on June 1, 2020. We worked to assess additional impact to Kubernetes clusters and found that some Kubernetes installations don’t disable the api-server insecure-port, which is normally only accessible from within the master node. Exploiting CVE-2020-8558, attackers can gain access to the insecure-port and gain full control over the cluster.

Opinion: APIs Are the Next Frontier in Cybercrime
 

Jason Kent published a write-up on why APIs are an easy target for criminals. He lists the following API vulnerability factors and the ways to mitigate them:

  1. APIs too easy to discover:
    • Only share APIs with those authorized.
    • Use certificate pinning.
    • Obfuscate and control API requests.
  2. APIs too verbose:
    • Don’t leak information in error responses, like whether or not an account exists in the system.
  3. API objects with too many parameters / properties:
    • Limit the properties that APIs return to the bare minimum needed.
  4. APIs have too much data:
    • Don’t store the data that you don’t need.
    • Don’t allow anonymous access to data.
    • Don’t expose any data related to the internal workings of applications or infrastructure.
  5. APIs not designed for security
    • Review the security architecture of your applications.
Video: API (in)Security TOP 10: Guided tour
 

DEF CON AppSec Village has published a session recording by two of the OWASP API Security Top 10 team members, David Sopas and Paulo Silva. In their presentation, they provide examples of the following attacks:

 
dmitry_apisec-1  

Dmitry Sotnikov

APIsecurity.io

 
Thanks for reading.

That's it for today. If you have any feedback or stories to share, simply reply to this email.

Please forward the newsletter to your friends and colleagues who might benefit from it.

 
42Crunch Ltd   71-75 Shelton Street  Covent Garden  London  Greater London   WC2H 9JQ   United Kingdom
You received this email because you are subscribed to API Security News from 42Crunch Ltd.

Update your email preferences to choose the types of emails you receive or Unsubscribe from all future emails  
 
 

Older messages

Issue 97: How to not leak API keys

Thursday, August 20, 2020

Hi, today we look at 2 recent API vulnerabilities, a CTF breakdown, and a DEF CON talk APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #97 Gym apps & home

Issue 96: Vulnerabilities at Cisco and MGM Grand Resort 🏖️, tutorial on Chrome DevTools and pentesting with GraphQL

Thursday, August 13, 2020

Hi, today we look at a couple of API vulnerabilities and two pentesting video tutorials APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #96 Vulnerabilities at

Issue 95: Vulnerabilities at Zoom and OkCupid 💘, progress on OAuth 2.1, API Information Disclosure tutorial

Wednesday, August 5, 2020

Hi, today we look at a couple recent vulnerabilities, a video on locating leaky APIs & APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #95 Vulnerabilities at

Issue 94: Two-day API security training at Black Hat USA 🎩

Wednesday, July 29, 2020

Hi, today we look at the possible API exploit for Wordpress, new stats on WAFs and API APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #94 Two-day API security

Issue 93: Google Sign In flaw in Chingari 📱, a guide to OAuth Authorization Code grant

Thursday, July 23, 2020

Hi, this week we have an OAuth vulnerability, OAuth pentesting guide, Swagger-EZ Burp.. APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #93 Google Sign In flaw in

You Might Also Like

Tuesday Triage #200 and giveaway

Tuesday, May 14, 2024

Your weekly crème de la crème of the Internet is here! The 200th edition featuring annual subscriptions giveaway, thoughts on nearly four years of ... ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

🎮 How AI Tools Are Changing Game Development — Grab a Pixel 8a Instead of Waiting for Pixel 9

Tuesday, May 14, 2024

Also: Sharing Your Google Maps Trip Progress, and More! How-To Geek Logo May 14, 2024 Did You Know In a bid to keep the ingredients secret, WD-40 was never patented. 🤖 The New GPT It's Tuesday!

Meta shuts down Workplace

Tuesday, May 14, 2024

Plus: Everything that happened at Google I/O and AWS CEO steps down View this email online in your browser By Christine Hall Tuesday, May 14, 2024 Hello, and welcome back to TechCrunch PM. The team

Flattening Lists of Lists, Python 3.13, Sets, and More

Tuesday, May 14, 2024

Flattening a List of Lists in Python #629 – MAY 14, 2024 VIEW IN BROWSER The PyCoder's Weekly Logo Flattening a List of Lists in Python In this video course, you'll learn how to flatten a list

Daily Coding Problem: Problem #1441 [Easy]

Tuesday, May 14, 2024

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Google. UTF-8 is a character encoding that maps each symbol to one, two, three, or four

Noonification: 3 Quick Ways to Optimize RecyclerView

Tuesday, May 14, 2024

Top Tech Content sent at Noon! Get Algolia: AI Search that understands How are you, @newsletterest1? 🪐 What's happening in tech today, May 14, 2024? The HackerNoon Newsletter brings the HackerNoon

Using 97 fewer cores thanks to PGO

Tuesday, May 14, 2024

Plus an HNSW indexed vector store library, a new Go game hits the Steam store, and is 'ok' ok?. | #​507 — May 14, 2024 Unsub | Web Version Together with Stytch logo Go Weekly Reclaiming CPU for

Ranked | The Top 6 Economies by Share of Global GDP (1980-2024) 📈

Tuesday, May 14, 2024

Gain a unique perspective on the world's economic order from this graphic showing percentage share of global GDP over time. View Online | Subscribe Presented by: Data that drives the

Free online event this Thursday: Getting ahead with time series data

Tuesday, May 14, 2024

Free Online Event Do you know how your competitors use time series data to get ahead? Join us on Thursday, May 16 at 10am PT/1pm ET for a free, hour-long online fireside chat called “Unleash the Full

Here's the deal

Tuesday, May 14, 2024

We wanted you to be among the first to know about our plans to relaunch the Gigantic training courses that Product Collective now powers! Here's the deal: From May 20th - May 31st, anybody that