File tree Expand file tree Collapse file tree 1 file changed +19
-2
lines changed Expand file tree Collapse file tree 1 file changed +19
-2
lines changed Original file line number Diff line number Diff line change @@ -8,10 +8,27 @@ A7:2019 Security Misconfiguration
8
8
9
9
## Is the API Vulnerable?
10
10
11
- ## How To Prevent
12
-
13
11
## Example Attack Scenarios
14
12
13
+ ### Scenario #1
14
+
15
+ An attacker finds .bash_history file under the root of the server which has in
16
+ its content commands used by DevOps to access the API:
17
+ ` $ curl -X GET 'https://api.server/endpoint/' -H 'authorization: Basic Zm9vOmJhcg==' ` .
18
+ An attacker could also find new endpoints on the API that are not documented and
19
+ used only by DevOps.
20
+
21
+ ### Scenario #2
22
+
23
+ To target a specific service, an attacker searches the API hostname on a popular
24
+ search engine of computers directly accessible from the Internet. A popular
25
+ database management system was running in such host, listening on the default
26
+ port. Because the default configuration has authentication disabled by default
27
+ and it was kept unchanged the attacker had access to millions of records with
28
+ PII, personal preferences and authentication data.
29
+
30
+ ## How To Prevent
31
+
15
32
## References
16
33
17
34
### OWASP
You can’t perform that action at this time.
0 commit comments