Skip to content

Commit 046c064

Browse files
committed
Merge branch 'section/security-misconfiguration' into release/alpha
2 parents fe3519d + 5c58473 commit 046c064

File tree

1 file changed

+19
-2
lines changed

1 file changed

+19
-2
lines changed

2019/en/0xa7-security-misconfiguration.md

Lines changed: 19 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,27 @@ A7:2019 Security Misconfiguration
88

99
## Is the API Vulnerable?
1010

11-
## How To Prevent
12-
1311
## Example Attack Scenarios
1412

13+
### Scenario #1
14+
15+
An attacker finds .bash_history file under the root of the server which has in
16+
its content commands used by DevOps to access the API:
17+
`$ curl -X GET 'https://api.server/endpoint/' -H 'authorization: Basic Zm9vOmJhcg=='`.
18+
An attacker could also find new endpoints on the API that are not documented and
19+
used only by DevOps.
20+
21+
### Scenario #2
22+
23+
To target a specific service, an attacker searches the API hostname on a popular
24+
search engine of computers directly accessible from the Internet. A popular
25+
database management system was running in such host, listening on the default
26+
port. Because the default configuration has authentication disabled by default
27+
and it was kept unchanged the attacker had access to millions of records with
28+
PII, personal preferences and authentication data.
29+
30+
## How To Prevent
31+
1532
## References
1633

1734
### OWASP

0 commit comments

Comments
 (0)