Issue 122: API issues at Clubhouse 👋 and healthcare apps, scope-based recon, OAS v3.1.0

The Latest API Security News, Vulnerabilities and Best Practices
Issue: #122
API issues at Clubhouse and healthcare apps, scope-based recon, OAS v3.1.0
This week, we take a look at the recent data spill incident at Clubhouse, the (poor) state of API security in major healthcare mobile applications, how scope-based reconnaissance methodology works, and the latest update (v3.1.0) to the OpenAPI Specification.
Vulnerability: Clubhouse
 

Clubhouse is an audio-only social network app for iPhone. Last Sunday, it had a data spill incident in which one of the users started streaming multiple rooms from their own website. This breaks Clubhouse’s terms of service and customer expectations: conversations are only supposed to be accessible live and only to the users in that particular room.

Daniel Sinclair posted his analysis on the root cause of the incident in his Twitter thread. It turns out that APIs and tokens are at the heart of it.

Clubhouse itself is actually mostly handling just the user management part. A different platform, Agora, does the audio streaming. When users join a room, they are issued an Agora token. The Clubhouse app then uses these tokens to grant users access to the audio stream.

Attackers used their Clubhouse user token and had a bot join every room, collect the Agora tokens, and plug them into a browser client. This worked because Agora tokens are long-lived and independent of Clubhouse. Once you get an Agora token, you retain access to the room’s audio stream even if you leave the room in Clubhouse (so the state of your Clubhouse user token changes, but Agora token doesn’t) and join another one.

Tokens and APIs in Clubhouse and Agora

Lessons learned here:

  • If your service or application is popular, attackers will do their best to figure out the APIs behind your app and use them to work around any limitations you have imposed on the user interface.
  • Beware of scripted enumeration, such as room enumeration to obtain Agora tokens in this case.
  • Pay attention to token lifecycle and the connection between the service provider (here Agora) and the identity provider (Clubhouse). Long-lived tokens that cannot be recalled can bite you.

 

Research: API security in healthcare mobile apps
 

Approov has published security research by Alissa Knight on 30 popular medical healthcare apps. It is estimated that together these apps have 23 million users.

The findings of the research are pretty dismal:

  • 100% of the checked apps were vulnerable to Broken Object-Level Authorization (BOLA/IDOR) and exposing personal (PII) and health (PHI) information!
  • 50% of the APIs tested gave access to other patients’ pathology, X-rays, and clinical results.
  • 77% of applications had hard-coded API keys, tokens, or credentials.
mHealth infographics

Below are some of the recommendations from the research:

  • Address both app security and API security: recognize that synthetic traffic to the API is an issue and arises from bots and automated tools, not from genuine apps and legitimate data requests.
  • Shift left and shield right: secure the development process and harden apps, but ensure that runtime protection is also in place.
  • Protect against X-in-the-middle attacks: certificate pinning is critical but often left undone because expired certificates can block apps and impact the user experience. However, when done correctly, certificate pinning does not impact either performance or availability.
  • Improve visibility into controls: organizations and developers need to monitor the effectiveness of the controls they implement and adjust them easily – both for compliance with HIPAA mandates and to sustain data security and privacy.
  • Penetration testing, as well as static and dynamic code analysis, should be performed regularly.

See the press release for the report summary. The full report is available here.

 

Methodology: Reconnaissance guidelines
 

Reconnaissance (aka recon) is the process of discovering the attack surface of a system under penetration testing. With modern complex systems, the attack surface can be significant, and thus the discovery could include several different approaches and tools.

Harsh Bothra has done a nice job summarizing the various approaches in his Scope Based Recon Methodology:

  • The small scope would only include a single URL, or a small set of URLs, in a system (for example, staging, development, and testing environments).
  • The medium scope would include wildcards and subdomains.
  • The large scope would include all the resources that the organization has.

Here’s the handy mindmap that he came up with:

Scope-based recon mindmap w

For each area in his map, Bothra provides a quick description and links to the popular tools used for the procedure. Definitely worth checking out.

Standards: The OpenAPI Specification v3.1.0
 

The OpenAPI Specification (OAS) is the prevailing industry standard for HTTP (including REST) API contracts and documenting them.

The standard is maintained by the OpenAPI Initiative (OAI), an industry consortium under Linux Foundation that includes vendors such as 42Crunch, Google, IBM, Kong, Microsoft, MuleSoft, Oracle, Postman, SAP, SmartBear, and others.

This week, the OAI has officially released version 3.1.0 of the OAS. The major changes in the new version include:

  • Full compatibility with the JSON Schema standard
  • Support for webhooks
  • Support for identifying API licenses using the standard SPDX identifier
  • pathItems object is now optional, making it simpler to create reusable libraries of components.
  • Mutual certificate for API authentication is now supported.

Note that v3.1.0 is incompatible with v3.0.x — there are breaking changes in the standard. Thus, it will take some time for the tooling to catch up with the new version.

For more details, see:

 
 
Thanks for reading.

That's it for today. If you have any feedback or stories to share, simply reply to this email.

Please forward the newsletter to your friends and colleagues who might benefit from it.

 
42Crunch, Inc.   95 Third Street  2nd Floor  San Francisco  CA   94103   United States
You received this email because you are subscribed to API Security News from 42Crunch, Inc..

Update your email preferences to choose the types of emails you receive or Unsubscribe from all future emails  
 
 

Older messages

Issue 121: Vulnerability at chess.com, GraphQL security playground and checklist 📝

Thursday, February 18, 2021

Hi, today we look at the recent chess.com API flaw and useful security resources for APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #121 Vulnerability at chess.

Issue 120: Video doorbells security flaws, intro to JWT attacks, security zines

Saturday, February 13, 2021

Hi, this week (besides security flaws) we have tutorials on JWT, AuthZ & AuthN, K8S APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #120 Video doorbells

Issue 119: NoxPlayer supply-chain attack through a hacked API 📲

Thursday, February 4, 2021

Hi , today we look at NoxPlayer API attack, Radware state of web sec report, Azure API m APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #119 NoxPlayer supply-

Issue 118: Spring Framework ALPS, OAuth 2.0 attack mindmap, securing JWTs 📜

Thursday, January 28, 2021

Hi, today we look at potential API exposure via Spring ALPS, OAuth 2.0 attacks, JWT and APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #118 Spring Framework ALPS

Issue 116: Facebook and Parler API vulnerabilities, clairvoyance 🔭

Friday, January 15, 2021

Hi , this week we look at a recent Facebook vulnerability, Parler breach, GraphQL recon APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #116 Facebook and Parler

You Might Also Like

Charted | How U.S. Household Incomes Have Changed (1967-2023) 💰

Friday, December 27, 2024

When looking at inflation adjusted data, US households have definitely gotten a whole lot richer since 1967. View Online | Subscribe | Download Our App FEATURED STORY How US Household Incomes Have

Can Pirates Save Democracy?

Friday, December 27, 2024

Top Tech Content sent at Noon! Boost Your Article on HackerNoon for $159.99! Read this email in your browser How are you, @newsletterest1? 🪐 What's happening in tech today, December 27, 2024? The

The 2025 Predictions You Can't Afford to Miss 🔮

Friday, December 27, 2024

Get a head start on what's to come in the New Year. Join VC+ to gain access to our 2025 Global Forecast Series and other exclusive insights! View email in browser HOW LEADERS STAY AHEAD IN 2025 The

DeveloPassion's Newsletter #182 - 2024 Retrospective

Friday, December 27, 2024

A newsletter discussing Knowledge Management, Knowledge Work, Zen Productivity, Personal Organization, and more! Sébastien Dubois DeveloPassion's Newsletter DeveloPassion's Newsletter #182 -

End 2024 on a High Note: The Top Writing Tips and Templates You Need

Friday, December 27, 2024

What's good, @newsletterest1! As we welcome 2025, let's take a moment to celebrate the incredible stories that fueled our hacker minds in 2024! We've compiled a roundup of the most-used

Private AI data + AI in Hollywood

Friday, December 27, 2024

my 2024 favorites ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

🐧 The best Linux distro of 2024

Friday, December 27, 2024

Extension cord don'ts; AI's biggest challenge; Wired network hack -- ZDNET ZDNET Tech Today - US December 27, 2024 The default elementary OS 8 desktop. The best Linux distribution of 2024 is

Issue #573: Ray browser, focus shift, and Nimrods

Friday, December 27, 2024

View this email in your browser Issue #573 - December 27th 2024 Weekly newsletter about Web Game Development. If you have anything you want to share with our community please let me know by replying to

Palo Alto Releases Patch for PAN-OS DoS Flaw — Update Immediately

Friday, December 27, 2024

THN Daily Updates Newsletter cover Backups: The Key to Cybersecurity How Much Cybersecurity is Enough? Recovery + Resistance = Resilience Download Now Sponsored LATEST NEWS Dec 27, 2024 Cloud Atlas

SWLW #631: You can’t measure productivity, Ask uncommonly clear questions, and more.

Friday, December 27, 2024

Weekly articles & videos about people, culture and leadership: everything you need to design the org that makes the product. A weekly newsletter by Oren Ellenbogen with the best content I found