Issue 98: APIs as the next frontier in cybercrime

The Latest API Security News, Vulnerabilities and Best Practices
Issue: #98
APIs as the next frontier in cybercrime
This week, we take a look at the recently reported API vulnerabilities in the COVID-19 tracing app Aura and in Kubernetes, some API security best practices, and a talk on OWASP API Top 10 from DEF CON 2020.
Vulnerability: Aura COVID-19 tracing app
 

Another mandatory COVID-19 tracing app,  was found to leak personal information and health status of users. This time it was Aura, an app that Albion College in Michigan has made mandatory for all students.

Among other issues, such as hard-coded secret keys to the backend server, the app also had an API that allowed to enumerate account numbers. For a given account, one could get the COVID status of a student, the date of testing, and the student’s full name.

Lessons to be learned from this case are familiar:

  • Never allow any sort of account enumeration in your APIs.
  • Prevent IDOR/BOLA attacks by enforcing authorization and letting each account to access their own data only.

We have previously covered API vulnerabilities in various coronavirus tracing apps in our issues 83 and 86.

Vulnerability: Kubernetes
 

Do not think that localhost calls are automatically safe. Attacks are often stacked and hackers can expand their attacks once they have passed the initial defense. If there is a vulnerable local proxy on a system that automatically trusts it, attackers can use it for their malicious activity.

Unit42 researchers found a serious vulnerability in some Kubernetes deployments: the CVE-2020-8558 in Kubernetes kube-proxy combined with the insecure-port enabled on an  api-server allowed attackers to gain full control over Kubernetes clusters:

A security issue assigned CVE-2020-8558 was recently discovered in the kube-proxy, a networking component running on Kubernetes nodes. The issue exposed internal services of Kubernetes nodes, often run without authentication. On certain Kubernetes deployments, this could have exposed the api-server, allowing an unauthenticated attacker to gain complete control over the cluster. An attacker with this sort of access could steal information, deploy crypto miners or remove existing services altogether.

The vulnerability exposed nodes’ localhost services – services meant to be accessible only from the node itself – to hosts on the local network and to pods running on the node. Localhost bound services expect that only trusted, local processes can interact with them, and thus often serve requests without authentication. If your nodes run localhost services without enforcing authentication, you are affected.

The issue details were made public on April 18, 2020, and a patch released on June 1, 2020. We worked to assess additional impact to Kubernetes clusters and found that some Kubernetes installations don’t disable the api-server insecure-port, which is normally only accessible from within the master node. Exploiting CVE-2020-8558, attackers can gain access to the insecure-port and gain full control over the cluster.

Opinion: APIs Are the Next Frontier in Cybercrime
 

Jason Kent published a write-up on why APIs are an easy target for criminals. He lists the following API vulnerability factors and the ways to mitigate them:

  1. APIs too easy to discover:
    • Only share APIs with those authorized.
    • Use certificate pinning.
    • Obfuscate and control API requests.
  2. APIs too verbose:
    • Don’t leak information in error responses, like whether or not an account exists in the system.
  3. API objects with too many parameters / properties:
    • Limit the properties that APIs return to the bare minimum needed.
  4. APIs have too much data:
    • Don’t store the data that you don’t need.
    • Don’t allow anonymous access to data.
    • Don’t expose any data related to the internal workings of applications or infrastructure.
  5. APIs not designed for security
    • Review the security architecture of your applications.
Video: API (in)Security TOP 10: Guided tour
 

DEF CON AppSec Village has published a session recording by two of the OWASP API Security Top 10 team members, David Sopas and Paulo Silva. In their presentation, they provide examples of the following attacks:

 
dmitry_apisec-1  

Dmitry Sotnikov

APIsecurity.io

 
Thanks for reading.

That's it for today. If you have any feedback or stories to share, simply reply to this email.

Please forward the newsletter to your friends and colleagues who might benefit from it.

 
42Crunch Ltd   71-75 Shelton Street  Covent Garden  London  Greater London   WC2H 9JQ   United Kingdom
You received this email because you are subscribed to API Security News from 42Crunch Ltd.

Update your email preferences to choose the types of emails you receive or Unsubscribe from all future emails  
 
 

Older messages

Issue 97: How to not leak API keys

Thursday, August 20, 2020

Hi, today we look at 2 recent API vulnerabilities, a CTF breakdown, and a DEF CON talk APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #97 Gym apps & home

Issue 96: Vulnerabilities at Cisco and MGM Grand Resort 🏖️, tutorial on Chrome DevTools and pentesting with GraphQL

Thursday, August 13, 2020

Hi, today we look at a couple of API vulnerabilities and two pentesting video tutorials APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #96 Vulnerabilities at

Issue 95: Vulnerabilities at Zoom and OkCupid 💘, progress on OAuth 2.1, API Information Disclosure tutorial

Wednesday, August 5, 2020

Hi, today we look at a couple recent vulnerabilities, a video on locating leaky APIs & APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #95 Vulnerabilities at

Issue 94: Two-day API security training at Black Hat USA 🎩

Wednesday, July 29, 2020

Hi, today we look at the possible API exploit for Wordpress, new stats on WAFs and API APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #94 Two-day API security

Issue 93: Google Sign In flaw in Chingari 📱, a guide to OAuth Authorization Code grant

Thursday, July 23, 2020

Hi, this week we have an OAuth vulnerability, OAuth pentesting guide, Swagger-EZ Burp.. APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #93 Google Sign In flaw in

You Might Also Like

📧 Unit Testing Clean Architecture Use Cases

Saturday, January 4, 2025

​ Unit Testing Clean Architecture Use Cases Read on: m​y website / Read time: 7 minutes The .NET Weekly is brought to you by: Introducing Depot Cache, the powerful way to make incremental builds up to

iOS Dev Weekly - Issue 693

Friday, January 3, 2025

Happy New Year, and here's to a cracking 2025! 🎊 View on the Web Archives ISSUE 693 January 3rd 2025 Comment Happy New Year, everyone! 🎊 I hope you all had a restful and relaxing break if you took

JSK Daily for Jan 3, 2025

Friday, January 3, 2025

JSK Daily for Jan 3, 2025 View this email in your browser A community curated daily e-mail of JavaScript news Optimizing Productivity: Integrate Salesforce with JavaScript Scheduler Syncfusion

Daily Coding Problem: Problem #1657 [Easy]

Friday, January 3, 2025

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Airbnb. Given a linked list and a positive integer k , rotate the list to the right by k

🍎 How I Use Trackpad Gestures to Manage my Mac — Are You Wearing Your Smartwatch Correctly?

Friday, January 3, 2025

Also: I Used a Temporary eSIM While Traveling and Have Thoughts How-To Geek Logo January 3, 2025 Did You Know There might never have been a Star Wars if not for George Lucas' lead foot and diabetes

SWLW #632: On avoiding pile-ups, The Chief Architect role, and more.

Friday, January 3, 2025

Weekly articles & videos about people, culture and leadership: everything you need to design the org that makes the product. A weekly newsletter by Oren Ellenbogen with the best content I found

Ranked | The World's Top Companies by Revenue in 2024 💵

Friday, January 3, 2025

Walmart, Amazon, and China's State Grid generate over half a trillion dollars in annual revenue, driven by their vast global presence. View Online | Subscribe | Download Our App FEATURED STORY

Issue #574: Web gaming strikes back, Doom Captcha, and Phaser Box2D

Friday, January 3, 2025

View this email in your browser Issue #574 - January 3rd 2025 Weekly newsletter about Web Game Development. If you have anything you want to share with our community please let me know by replying to

Could AI make you a billionaire?

Friday, January 3, 2025

Siri's secret recordings; Is streaming still worth it?; Transform your doodles with AI -- ZDNET ZDNET Tech Today - US January 3, 2025 lm-email-verifaction-tool Could AI make you a billionaire in

⚙️ The grid can't handle AI

Friday, January 3, 2025

Plus: Anthropic's guardrails ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌