You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|API Specific : Exploitability **3**| Prevalence **2** : Detectability **3**| Technical **3** : Business Specific|
7
+
|Attackers will feed the API with hostile data through whatever injection vectors are available (e.g. direct input, parameters, integrated services, etc.) expecting it to e sent to an interpreter. | Injection flaws are very common and often found in SQL, LDAP or NoSQL queries, OS commands, XML parsers and ORM. These flaws are easy to discover when reviewing the source code. Attackers can use scanners and fuzzers. | Injection can lead to information disclosure and data loss. It may also lead to DoS or complete host takeover.|
8
8
9
9
## Is the API Vulnerable?
10
10
11
+
The API is vulnerable to injection flaws if:
12
+
13
+
* Client-supplied data is not validated, filtered or sanitized by the API.
14
+
* Client-supplied data is directly used or concatenated to SQL/NoSQL/LDAP
15
+
queries, OS commands, XML parsers. and Object Relational Mapping (ORM)/Object
16
+
Document Mapper (ODM).
17
+
* Data coming from external systems (e.g. integrated systems) is not validated,
18
+
filtered or sanitized by the API.
19
+
11
20
## Example Attack Scenarios
12
21
13
22
### Scenario #1
14
23
24
+
Inspecting the web browser network traffic an attacker identifies the following
25
+
API request responsible to start the recovery password workflow:
0 commit comments