Issue 105: API vulnerabilities in HashiCorp, Azure App Services, and Qiui adult devices

The Latest API Security News, Vulnerabilities and Best Practices
Issue: #105
API vulnerabilities in HashiCorp, Azure App Services, and Qiui adult devices
This week, we take a look at API vulnerabilities in HashiCorp Vault, Azure App Services, and “smart” adult toys. There is also an introductory video on finding information disclosure in JSON and XML API responses, and another cheat sheet and a webinar on OWASP API Security Top 10.
Vulnerability: HashiCorp Vault
 

Felix Wilhelm from Google’s Project Zero has written a very detailed write-up on an authentication bypass he found in the Amazon Web Services (AWS) and Google Cloud Platform (GCP) integration of HashiCorp Vault. As a central storage of credentials, Vault makes an attractive target for attackers, and therefore a vulnerability in it is also very bad news. Looking for the silver linings, this attack was definitely quite advanced, and thus not easily exploitable.

In both cases, the attack effectively boiled down to forging JSON Web Tokens (JWT) that satisfied the parameters expected by Vault:

  • For AWS, attackers could set up a minimal OpenId Connect identity provider, use that to sign a specifically crafted JWT, and send the request to the authentication service in AWS. The way Go XML decoder would parse the  response from AWS would mislead Vault to consider authentication successful.
  • With GCP, attackers would have to successfully impersonates a GCE instance with right configuration.

In both cases, the end result would be the same: attackers get a valid session token, enabling them get access to secrets stored in the Vault server

As is evident from Wilhelm’s write-up, this exploit was not clear-cute, self-evident, or easy to find, so it may be unlikely that they have been exploited. According to Wilhelm:

“In the end, Hashicorp fixed the vulnerability by enforcing an allowlist of HTTP headers, restricting requests to the GetCallerIdentity action and stronger validation of the STS response.”

Positive security, allowlists, and locked-down implementations in your APIs are still the best way to minimize your attack surface. Security and especially security integrations can be riddled with pitfalls, so making sure your APIs are in good shape adds an important layer to the security.

Vulnerability: Azure App Services
 

Paul Litvak found API vulnerabilities in Azure App Services: the APIs of KuduLite, the app service administration component for Linux lacked access checks.

KuduLite is hosted on the manager node of the service, while the application is hosted on a separate application node. The application node could send requests to the KuduLite API without any access validation. Thus, anyone taking control over an app service in Azure (for example, with a Server Side Request Forgery (SSRF) attack) could get file system access via a GET call to the KuduLite VFS API:

KuduLite GET

or even remote code execution capabilities by doing a POST call to the KuduLite Command API:

KuduLite POST

This is another example on how important it is to apply correct authentication and authorization checks even to API calls within the system. Microsoft has since fixed the vulnerability.

Vulnerability: Qiui CellMate
 

This API vulnerability generated quite a lot of click-bait headlines and broke even to the mainstream media: Pen Test Partners found the APIs behind the Qiui CellMate “male chastity” devices that allow remote control to partners to be highly vulnerable.

The API allowed attackers to locate user records by supplying a 6-digit invitation code — something they could easily enumerate. This gave full access to the user records and all its details, allowed to retrieve all user information, including geographic location, and allowed taking over the devices and locking them in a way that prevented the users from unlocking them. Perfect material for further phishing or blackmail campaigns, and a full-blown nightmare for users.

Details are still scant because, although the vendor released version 2 of the API with some security fixes, they have still left the version 1 in use, continuing to expose the vulnerabilities. There is no indication that the vendor plans to fully fix the issue.

On a consumer-level this is yet another example that physical security needs to be considered any time smart devices are bought, especially from vendors lacking good security reputation.

On the vendor side, the key lessons learned would be:

  • OWASP API2 Broken Authentication can apply to a variety of APIs. Not just your main /login path but also various password reset and invitation flows.
  • Any codes need to have short expiration periods and measures need to be taken to prevent enumeration and brute-force attacks on them (longer, more complex codes, rate limiting, and so on)
  • Be careful of leaving insecure earlier versions of APIs online. This exposes you to the OWASP API9 Improper Assets Management vulnerability.
  • And be responsive to security researchers!
Video: Reading JSON and XML for Information Disclosure
 

There’s a new educational API security video from Katie Paxton-Fear.

This time she is covering the basics of finding information disclosure flaws in JSON and XML responses. Worth checking out if you are starting with APIs and API security:

Webinar and cheatsheet: OWASP API Security Top 10 and API life cycle
 

OWASP API Security Top 10 vulnerabilities can be addressed on different stages of API life cycle with different tools: static analysis during development, dynamic testing as part of the QA and release, and runtime protection during the operation.

42Crunch has posted a matrix of how their solution protects APIs against the vulnerabilities at each stage.

Next Wednesday, October 21, Isabelle Mauny is also doing a webinar on that same topic: practical approach of addressing each of the OWASP API Security Top 10 vulnerabilities. She will explain the steps needed for each of them during design, development, as well as testing and runtime. Click on the link and register to reserve your spot.

owasp_lifecycle_webinar

 

 
dmitry_apisec-1  

Dmitry Sotnikov

APIsecurity.io

 
Thanks for reading.

That's it for today. If you have any feedback or stories to share, simply reply to this email.

Please forward the newsletter to your friends and colleagues who might benefit from it.

 
42Crunch Ltd   71-75 Shelton Street  Covent Garden  London  Greater London   WC2H 9JQ   United Kingdom
You received this email because you are subscribed to API Security News from 42Crunch Ltd.

Update your email preferences to choose the types of emails you receive or Unsubscribe from all future emails  
 
 

Older messages

Issue 104: API vulnerabilities at Twitter and Grandstream, mTLS in AWS API Gateway, Application Security Podcast 📻

Thursday, October 8, 2020

Hi, this week we have a couple of recent API flaws, mTLS in AWS, and an AppSec Podcast APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #104 API vulnerabilities at

Issue 102: Vulnerabilities in Facebook and campaign apps, creating defensible APIs 🛡️

Thursday, September 24, 2020

Hi, today we look at a couple of recent API vulnerabilities, a new API design book, and APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #102 Vulnerabilities in

Issue 101: Vulnerabilities in Giggle, Google Cloud Platform, SonicWall, New Relic, Tesla 🚗

Thursday, September 17, 2020

Hi, today we cover 5 recent API vulnerabilities, IDOR cheatsheet & 2 upcoming events APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #101 Vulnerabilities in

API Security advice from top industry experts | Nano Leaf Giveaway! 🎆

Thursday, September 10, 2020

Hi, in our centennial edition we hear API security advice from 12 top industry experts! APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #100 API Security advice

Issue 99: API flaws in the Mercedes-Benz app and Russian inter-bank money transfer

Friday, September 4, 2020

Hi, this week we look at two recent API vulnerabilities, upcoming ACS 2020, and IIoT APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #99 API flaws in the Mercedes

You Might Also Like

New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy

Wednesday, January 1, 2025

THN Daily Updates Newsletter cover Full Stack Web Development ($54.99 Value) FREE for a Limited Time This book offers a comprehensive guide to full stack web development, covering everything from core

Detecting Parasites 🪲

Wednesday, January 1, 2025

A newsletter publisher takes on parasite SEO. Here's a version for your browser. Hunting for the end of the long tail • December 31, 2024 Detecting Parasites Our year-end award for best blog post

Final Chance to Claim Your Bonus Gift 🎁

Tuesday, December 31, 2024

Just sign up to VC+ by January 1st and we'll include a free gift. View email in browser OFFER ENDS JANUARY 1ST Last Chance to Claim Your Free Gift! The Global Forecast Series, presented by Inigo,

Top 5 of 2024, Ninja, Deploying on AWS, and More

Tuesday, December 31, 2024

\#1: Build Captivating Display Tables With Great Tables #662 – DECEMBER 31, 2024 VIEW IN BROWSER The PyCoder's Weekly Logo A lot has happened in the Python ecosystem in 2024 and with our final

Daily Coding Problem: Problem #1654 [Hard]

Tuesday, December 31, 2024

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Quora. Word sense disambiguation is the problem of determining which sense a word takes

🐶 Robot Pets Are Making a Comeback — Blu-ray Players Will Soon Be Almost Gone

Tuesday, December 31, 2024

Also: The Issue With EVs Is That They're Doing Too Much, and More! How-To Geek Logo December 31, 2024 Did You Know In Western nations, people celebrate the New Year at the start of the Gregorian

Charted | What Made the News in America in 2024 📊

Tuesday, December 31, 2024

Election-related events and crime dominated the news according to Google's yearly search data drop. View Online | Subscribe | Download Our App FEATURED STORY What Made the News in America in 2024

️🚨 New Windows security bug - what to know

Tuesday, December 31, 2024

LG's AI laptops; Free Apple TV+; Life-saving smartwatch -- ZDNET ZDNET Tech Today - US December 31, 2024 Windows 11 updates New Windows 11 24H2 bug could block future security updates - see

End of Year Sale

Tuesday, December 31, 2024

Discount for the end of the year Sébastien Dubois DeveloPassion's Newsletter End of Year Sale By Sebastien Dubois • 31 Dec 2024 View in browser View in browser I'm launching a sale for the end

Post from Syncfusion Blogs on 12/31/2024

Tuesday, December 31, 2024

New blogs from Syncfusion What's New in WPF Diagram: 2024 Volume 4 By Sarathkumar V This blog explains the new features and enhancements added in the Syncfusion WPF Diagram Library for the 2024