DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
  1. DZone
  2. Data Engineering
  3. Databases
  4. API Security Weekly: Issue #29

API Security Weekly: Issue #29

See the latest API vulnerabilities in cars, Nagios, and Portainer, as well as different OAuth 2.0 attack scenarios.

Dmitry Sotnikov user avatar by
Dmitry Sotnikov
CORE ·
May. 02, 19 · News
Like (2)
Save
Tweet
Share
11.54K Views

Join the DZone community and get the full member experience.

Join For Free

This week, we look into the latest API vulnerabilities in cars, Nagios, and Portainer, as well as different OAuth 2.0 attack scenarios, and the time it takes for attackers to find new API endpoints.

Image title

Vulnerabilities and Breaches

Some car owners install hardware GPS tracking devices in their vehicles. These are accessed and managed through mobile apps. Two such apps called iTrack and ProTrack got hacked with about 7,000 and 20,000 users affected respectively. Both of these apps had cloud APIs behind them, had the default password set to 123456, and the API allowed brute force ID enumeration. Attackers could get information on both the car and its owner, such as location, owner name, phone number, address, model, make, IMEI number, etc. With some tracker models, the attackers could have even sent commands to the vehicle, for example, to kill the engine.

A popular system and network monitoring solution, Nagios XI, had a SQL injection vulnerability in its APIs. The API did not sufficiently validate input that users supplied, and attackers could exploit this by making an API call using fusekeys and a malicious user ID. A successful SQL injection can serve as the starting point for further attacks. If you are using Nagios:

  • Upgrade to Nagios XI 5.5.11 or later
  • Limit API access to trusted users, trusted networks, and trusted hosts

A popular Docker management tool, Portainer, had an unauthenticated /api/settings API. The system was storing LDAP credentials in cleartext and leaking them out through this endpoint. An unauthenticated remote attacker could have used the API to get the password to the LDAP directory and obtain sensitive information.

Technology 101: OAuth 2.0

For an entertaining introduction to OAuth 2.0, watch this brilliant video by Jim Manico.

After that, check out these common OAuth 2.0 attack scenarios:

  • Authorization code reuse
  • Unvalidated redirect URI
  • Cross-site request forgery with OAuth Client
  • Access token as part of the URI

See also OAuth 2.0 threat catalog and IETF best practices recommendations in our earlier issue.

Threat Landscape

How long does it take for attackers to find your API and try to exploit it?

Sophos set up honeypots in multiple cloud environments and data centers, collected data on them, and published their results.

In one of the cases, it only took 52 seconds for the honeypot to be tried with credentials combinations like admin/admin!

The moral of the story?

  • Security by obscurity simply does not work.
  • Don’t use easy or default user names and passwords.
  • Disable the interfaces you don’t need.
  • Use key-/certificate-/device-based authentication whenever possible.

You can subscribe to this newsletter at apisecurity.io.

API security

Published at DZone with permission of Dmitry Sotnikov, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Public Key and Private Key Pairs: Know the Technical Difference
  • How Chat GPT-3 Changed the Life of Young DevOps Engineers
  • Master Spring Boot 3 With GraalVM Native Image
  • 10 Easy Steps To Start Using Git and GitHub

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: