0% found this document useful (0 votes)
78 views

Top API Vulnerabilities & Exploits

The document reports on API vulnerabilities and exploits in Q2-2023. It provides statistics on API attacks and bug bounty rewards, and analyzes the most impactful API vulnerabilities including the oldest exploit dating back over 39 months and SQL injection vulnerabilities in MOVEit Transfer that are still being exploited.

Uploaded by

Anonymous User
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views

Top API Vulnerabilities & Exploits

The document reports on API vulnerabilities and exploits in Q2-2023. It provides statistics on API attacks and bug bounty rewards, and analyzes the most impactful API vulnerabilities including the oldest exploit dating back over 39 months and SQL injection vulnerabilities in MOVEit Transfer that are still being exploited.

Uploaded by

Anonymous User
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

research REPORT

API ThreatStats™ Report Q2-2023

Top API Vulnerabilities


& Exploits
The Oldest, the Most Sophisticated, the Most Impactful, the Most
Viral API Exploits of Q2-2023 that you need to know about.

63%
of bug bounty rewards in
H1-2023 related to APIs
See page 4 —>

39 months
Oldest API exploit discovered
in Q2-2023
See page 7 —>
API ThreatStats™ Report Q2-2023 2

Introduction
Welcome to the latest Wallarm API ThreatStats report, which provides API builders, defenders and
breakers a comprehensive look at the API security vulnerabilities, threats, and exploits reported in
Q2-2023.
Long-time readers will notice that we’ve changed our reporting
Follow the Money. We are expanding our coverage to include, for the first time, analysis of bug
bounty rewards
API Security Razzies. We’re reducing our statistical coverage and homing in on the most
impactful vulnerabilities and exploits of the quarter.

API-Related Bug Bounties


We continue to see a steady increase in API
vulnerabilities and exploits this year. An amazing 63%
63%
of all bug bounty rewards paid so far
of all HackerOne bug bounty rewards paid so far this in 2023 are for API vulnerabilities

39 months
year were for API security problems, with a total of
$26,490 being paid out in just the last quarter. As
bounty payments typically lag by 2-3 months, we
anticipate an even greater surge in these payments the oldest API zero-day exploit
for vulnerabilities reported in Q2. found in Q2-2023

Our First API Security Razzies


Top Bug Bounty Reward
As always, we’ve analyzed all published Oldest Exploi
CVEs, security bulletins, and bug bounty Most Viral Exploi
reports to bring you the most insightful Most Dangerous Exploi
perspectives on API security. From this Most Sophisticated Exploi
analysis, we are selecting the most Top AI-related Exploi
impactful results for Q2-2023 in the Top Enterprise Exploit
following categories:

Reading this report, you'll quickly realize that API exploits are pervasive across a range of sectors,
from AI hardware to enterprise infrastructures, DevOps tools, and even major cloud providers'
management software. They are everywhere because APIs are everywhere, and their ubiquity only
amplifies their potential risk. The danger they pose is significant, primarily because APIs serve as
direct gateways to data.

Read on, for knowledge


Best regards,

is the first line of defence. Wallarm API Security Research Team


API ThreatStats™ Report Q2-2023 3

API Threat Landscape

32.1M
unique API attacks

47.5M
unique non-API attacks

[40% of all Q2-2023 attacks] [60% of all Q2-2023 attacks]

OWASP APIsec Top-10 OWASP Top 10


OWASP API Top 10 OWASP Top 10

+60%
rise in unique API attacks QoQ
+514%
rise in detected API attacks YoY
(Q2-2023 vs. Q1-2023) (Q2-2023 vs. Q2-2022)

The unique ability of Wallarm to detect both API-specific


and non-API attacks allows us to highlight API attack trends
within all web attacks. In Q2-2023 we saw a 40/60 split
40% of all web
attacks were API-
between OWASP APIsec Top-10 and OWASP Top-10 across
all web attacks. Interestingly, this correlates with API / non- related in Q2-2023,
API bug bounty rewards paid over this quarter (see page 4).

compared to

We project that next quarter we will see API attacks exceed


the number of non-API web attacks for the first time ever. 18% in Q2-2022

6x malicious
requests per API
The average number of malicious requests per API attack
sequence increased to 30 in Q2-2023 from 22 in Q1-2023,
up from 5 requests per attack in Q2-2022. This is another
indicator that APIs attacks are increasingly more consistent
attack sequence YoY and sophisticated.
API ThreatStats™ Report Q2-2023 4

Top Bug Bounty Rewards


We mined bug bounty data from HackerOne to understand where breakers are putting their efforts.
It turns out that a significant number of bug bounty payouts over the last two quarters are API-
related.

44% / 63% $26,490 / $121,150


Q2-2023 / 2023 YTD
Q2-2023 / 2023 YTD

pct of API bug bounties value (USD) of API bug bounty


vs. all payouts payouts

1
Non-API
$59,720 / $193,110
$10000

GitHub bypass Q2-2023 / 2023 YTD

via SSH cert value (USD) of all bug bounty


payouts

API

$6000

2
Reddit SSRF

3 API

$5000 Reddit Rich


Text XSS

Non-API

$5000

Reddit Accounts

XSS
API ThreatStats™ Report Q2-2023 5

Biggest API Bug Bounty


of Q2-2023
$6000 for Reddit SSRF, and

the 2nd biggest payment of Q2’23


Matrix Chat endpoint at

https:/matrix.redditspace.com/
_matrix/media/r0/preview_url/?url=*

allowed partially blind SSRF to internal


services. The data that could be exfiltrated was
limited only to the service names and their IPs
before a fix was implemented.
This endpoint should not be able to query internal services, but
external IPs, domains, and services are fine for this to query.
Bug hunter @revolte was attempting to escalate this SSRF to
RCE but Reddit fixed it before it happened.

Reference: https://hackerone.com/reports/1960765
API ThreatStats™ Report Q2-2023 6

API Time-to-Exploit
in Q2-2023

- 19 days
Average API time-to-exploit in Q2-2023

- 1182 days
Longest pre-CVE time-to-exploit
interval in Q2-2023

WordPress MStore API plugin

+164 days
Longest post-CVE time-to-exploit
interval in Q2-2023

Livebox Collaboration vDesk

40%
Pct of API 0-day vs. post-CVE exploits
found in Q2-2023
API ThreatStats™ Report Q2-2023 7

Oldest API Exploit CVSS 9.8


in Q2-2023
1132 days (over 39 months!)

elapsed between exploit POC and CVE


being published
An Authentication Bypass vulnerability was discovered in certain versions of the MStore API
plugin for WordPress which could allow unauthenticated users to create or edit administrator
accounts. First reported publicly in Mar-2020, this vulnerability was finally published as
CVE-2020-36713 in Jun-2023.

The plugin registers several custom endpoints in the

“mstore-api/controllers/FlutterUser.php”
script via the WP REST API. Among these are the

register and update_user_profile routes, which are


accessible to any user regardless of authentication status. In
addition, the MStore API registers several custom endpoints
via the WP JSON API plugin, deprecated in Aug-2019, which
should not be activated because of critical security issues.

Although this vulnerability was responsibly


reported and patched in Feb-2020, vulnerability
management programs which rely solely on
published CVEs would have been exposed for
over 3 years. This points to the need for a multi-
faceted security approach including automating
updates, scouring vendor reports, and
implementing solid NG-WAF protection.
API ThreatStats™ Report Q2-2023 8

Most Viral
API Exploit
MOVEit Transfer SQL
Injection Vulnerabilities
CVE-2023-34362 (CVSS score: 9.8)

CVE-2023-35036 (CVSS score: 9.1)

CVE-2023-35708 (CVSS score: 9.8)


Several serious security vulnerabilities in the MOVEit Transfer application were identified in
Q2-2023. These are SQL injections in some of the API calls that can lead to remote code execution
(RCE). This exploit attack surface is still expanding, with additional vulnerabilities being found as we
move into Q3.

The cl0p ransomware gang exploited these vulnerabilities in the MOVEit file transfer tool, potentially
dating back as far as 2021, leading to the compromise of personal data for more than 15.5 million
individuals across various organizations globally, including government bodies, educational
institutions, finance, and insurance companies, to name a few. With many victims still undisclosed
and the attacks continuing, the final count of affected individuals and organizations remains
unknown.

13M
pages of coverage in Q2 on
0.5%
of all API Security content in Q2
the MOVEit vulnerabilities mentioned the MOVEit vulnerabilities

Reference: https://lab.wallarm.com/the-moveit-ransomware-attacks-now-impacting-government-
agencies-and-large-organizations/
API ThreatStats™ Report Q2-2023 9

Most Dangerous API CVSS 9.8


Exploit of Q2-2023
This ESPv2 vulnerability (CVE-2023-30845) impacting the
Google Cloud Platform (GCP) should serve as an important
reminder to update your cybersecurity policies and risk
management strategies to include open-source API infrastructure
tools. This L7 service proxy for managing JSON/REST and gRPC
API services was exposed to an authentication bypass
vulnerability that had serious potential security implications.
The loophole enabled API clients to create a malicious X-HTTP-Method-Override header value,
thereby circumventing JWT authentication under certain conditions. Unauthorized actors could
potentially gain access to restricted data or services if the HTTP method requested was not present
in the API service definition and if the given X-HTTP-Method-Override was a valid HTTP method
according to the service definition:

curl --request PUT \

--header "X-HTTP-Method-Override: POST" \

--header "Content-Type: application/json" \

--data '{"payload":"compromised"}' \

https://url-to-espv2.com

The malicious client successfully bypasses Using Google ID tokens to authenticate users without
specifying a JWT:

{"message":"Accessing restricted
method.","method":"POST","payload":"compro
mised"}

Reference: https://lab.wallarm.com/gcp-espv2-hit-with-critical-api-authorization-bypass-
cve-2023-30845/
API ThreatStats™ Report Q2-2023 1
0

Most Sophisticated CVSS 7.5


CVSS 7.5
API Exploit in Q2-2023

Grafana JWT URL-login flow leaks

access tokens.

Grafana is a widely adopted open-source DevOps platform for

monitoring and observability. An issue (CVE-2023-1387)

reported in Q2-2023 concerns leakage of an auth token in the

JWT URL-login flow. The problem occurs when Grafana proxies

requests without removing the auth_token parameter, leading to

potential unauthorized access to Grafana as the victim user.

This exploit, which is quite complicated but very interesting and unique, suggests what

sophisticated attacks against your APIs might look like.

1. First, an instance of Grafana with JWT authentication enabled is set up. This can be

done using a Docker container with the necessary environment variables set to enable

JWT authentication and URL login .

2. The user then con figures a Prometheus data source, setting the URL to a server where

intercepted requests can be viewed .

3. A JWT token is obtained from the Auth0 instance using a curl request with the client ID,

client secret, subdomain, username, and password .

4. The obtained id_token is used to make a request to the Grafana instance .

5. Grafana authenticates the user and forwards the request to the data source, but

leaves the JWT in place.

6. The catch server receives the request containing the JWT in the request parameters.

In comparison, if the JWT is passed in the header (X-JWT-Assertion), the auth header is removed

from the proxy request, and no leakage occurs.

Reference: https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j 

API ThreatStats™ Report Q2-2023 11

Top AI-related API CVSS 8.8


Exploit of Q2-2023
NVIDIA DGX-1 BMC Arbitrary
Command Injection in SPX REST API
A critical API vulnerability, labelled CVE-2023-25507, was
discovered in the NVIDIA DGX-1 AI supercomputer system. This
vulnerability lies in the DGX-1's Baseboard Management
Controller (BMC) SPX REST API, enabling an authorized attacker
to inject arbitrary shell commands. Exploitation of this
vulnerability could lead to malicious code execution, denial of
service, information disclosure, and data tampering.

AI systems like the DGX-1 handle significant amounts of sensitive data, making security crucial. A
successful attacker could manipulate AI models by altering data, which could lead to inaccurate
results and would be very difficult to root cause. They could also leak sensitive information, disrupt
services, or gain control over the system.

This vulnerability emphasizes the importance of


robust API security measures in AI applications.
To mitigate such risks, it's essential to implement
regular updates & strong access controls, and
conduct penetration testing. NVIDIA has
released patches to fix this vulnerability and
users are urged to update their systems promptly.
As use of AI systems grow, so does the
importance of maintaining robust security
practices, especially around APIs.

Reference: https://nvidia.custhelp.com/app/answers/detail/a_id/5458
API ThreatStats™ Report Q2-2023 12

Top Enterprise API CVSS 8.8


Exploit of Q2-2023
Juniper JunOS gRPC Arbitrary
Command Injection
A significant OS Command Injection vulnerability has been
identified in the gRPC Network Operations Interface (gNOI)
server module of Junos OS Evolved, a key component of Juniper
Network security devices often incorporated in enterprise
networks. This vulnerability (CVE-2023-28983) could allow
authenticated, low-privileged, network-based attackers to
inject shell commands and execute code.

In the context of enterprise networks, where Juniper devices are


a common presence, this vulnerability underscores the
paramount importance of API security.

Juniper Networks has addressed this High severity issue with


updates in version 22.2R1-EVO and later. As always, timely
firmware updates are vital in maintaining robust network
protection.

To further mitigate exploitation risks, companies should


implement and periodically review & update measures to limit
access to trusted administrative networks, hosts, and users.
API ThreatStats™ Report Q2-2023 13

About Wallarm
At Wallarm, we understand the unique challenges and threats that come with the ever-evolving
digital landscape. That's why we're committed to developing cutting-edge API security solutions
that enable businesses to secure their digital assets effectively. As your trusted partner, we not only
protect your business but also empower it to thrive in the digital economy.

API Discovery Controls API Leak Management

We ensure full visibility and management of your Wallarm scans for, blocks, and controls the use
API portfolio through automatic endpoint of leaked API secrets to protect your data and
discovery, schema building based on actual infrastructure.
traffic, and tracking of API changes.

Sensitive API Data Classification API Threat Prevention

Wallarm classifies API endpoints by Personally Wallarm offers comprehensive security for APIs
Identifiable Information (PII), tracks sensitive and legacy web apps covering all OWASP
data in API endpoints, and prevents the use of Top-10 risks, proactive attack prevention,
leaked API keys. protection against malicious automated tools,
and an ML-based automated tuning approach
with smart blocking from day 1.

Wallarm is a global leader in API security, headquartered in San Francisco. We proudly serve a
broad spectrum of clients, including Fortune 500 companies and hypergrowth SaaS startups across
numerous industries such as finance, healthcare, and technology.

Follow us on LinkedIn to stay in touch with the latest API www.linkedin.com/


security threats discoveries and risk analysis. company/wallarm
Wallarm Research Team Book a demo at

lab.wallarm.com request@wallarm.com

(415) 940-7077

188 King St. Unit 508

San Francisco, CA 94107

www.wallarm.com

You might also like