Top API Vulnerabilities & Exploits
Top API Vulnerabilities & Exploits
63%
of bug bounty rewards in
H1-2023 related to APIs
See page 4 —>
39 months
Oldest API exploit discovered
in Q2-2023
See page 7 —>
API ThreatStats™ Report Q2-2023 2
Introduction
Welcome to the latest Wallarm API ThreatStats report, which provides API builders, defenders and
breakers a comprehensive look at the API security vulnerabilities, threats, and exploits reported in
Q2-2023.
Long-time readers will notice that we’ve changed our reporting
Follow the Money. We are expanding our coverage to include, for the first time, analysis of bug
bounty rewards
API Security Razzies. We’re reducing our statistical coverage and homing in on the most
impactful vulnerabilities and exploits of the quarter.
39 months
year were for API security problems, with a total of
$26,490 being paid out in just the last quarter. As
bounty payments typically lag by 2-3 months, we
anticipate an even greater surge in these payments the oldest API zero-day exploit
for vulnerabilities reported in Q2. found in Q2-2023
Reading this report, you'll quickly realize that API exploits are pervasive across a range of sectors,
from AI hardware to enterprise infrastructures, DevOps tools, and even major cloud providers'
management software. They are everywhere because APIs are everywhere, and their ubiquity only
amplifies their potential risk. The danger they pose is significant, primarily because APIs serve as
direct gateways to data.
32.1M
unique API attacks
47.5M
unique non-API attacks
+60%
rise in unique API attacks QoQ
+514%
rise in detected API attacks YoY
(Q2-2023 vs. Q1-2023) (Q2-2023 vs. Q2-2022)
compared to
6x malicious
requests per API
The average number of malicious requests per API attack
sequence increased to 30 in Q2-2023 from 22 in Q1-2023,
up from 5 requests per attack in Q2-2022. This is another
indicator that APIs attacks are increasingly more consistent
attack sequence YoY and sophisticated.
API ThreatStats™ Report Q2-2023 4
1
Non-API
$59,720 / $193,110
$10000
API
$6000
2
Reddit SSRF
3 API
Non-API
$5000
Reddit Accounts
XSS
API ThreatStats™ Report Q2-2023 5
https:/matrix.redditspace.com/
_matrix/media/r0/preview_url/?url=*
Reference: https://hackerone.com/reports/1960765
API ThreatStats™ Report Q2-2023 6
API Time-to-Exploit
in Q2-2023
- 19 days
Average API time-to-exploit in Q2-2023
- 1182 days
Longest pre-CVE time-to-exploit
interval in Q2-2023
+164 days
Longest post-CVE time-to-exploit
interval in Q2-2023
40%
Pct of API 0-day vs. post-CVE exploits
found in Q2-2023
API ThreatStats™ Report Q2-2023 7
“mstore-api/controllers/FlutterUser.php”
script via the WP REST API. Among these are the
Most Viral
API Exploit
MOVEit Transfer SQL
Injection Vulnerabilities
CVE-2023-34362 (CVSS score: 9.8)
The cl0p ransomware gang exploited these vulnerabilities in the MOVEit file transfer tool, potentially
dating back as far as 2021, leading to the compromise of personal data for more than 15.5 million
individuals across various organizations globally, including government bodies, educational
institutions, finance, and insurance companies, to name a few. With many victims still undisclosed
and the attacks continuing, the final count of affected individuals and organizations remains
unknown.
13M
pages of coverage in Q2 on
0.5%
of all API Security content in Q2
the MOVEit vulnerabilities mentioned the MOVEit vulnerabilities
Reference: https://lab.wallarm.com/the-moveit-ransomware-attacks-now-impacting-government-
agencies-and-large-organizations/
API ThreatStats™ Report Q2-2023 9
--data '{"payload":"compromised"}' \
https://url-to-espv2.com
The malicious client successfully bypasses Using Google ID tokens to authenticate users without
specifying a JWT:
{"message":"Accessing restricted
method.","method":"POST","payload":"compro
mised"}
Reference: https://lab.wallarm.com/gcp-espv2-hit-with-critical-api-authorization-bypass-
cve-2023-30845/
API ThreatStats™ Report Q2-2023 1
0
access tokens.
This exploit, which is quite complicated but very interesting and unique, suggests what
1. First, an instance of Grafana with JWT authentication enabled is set up. This can be
done using a Docker container with the necessary environment variables set to enable
2. The user then con figures a Prometheus data source, setting the URL to a server where
3. A JWT token is obtained from the Auth0 instance using a curl request with the client ID,
5. Grafana authenticates the user and forwards the request to the data source, but
6. The catch server receives the request containing the JWT in the request parameters.
In comparison, if the JWT is passed in the header (X-JWT-Assertion), the auth header is removed
Reference: https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j
AI systems like the DGX-1 handle significant amounts of sensitive data, making security crucial. A
successful attacker could manipulate AI models by altering data, which could lead to inaccurate
results and would be very difficult to root cause. They could also leak sensitive information, disrupt
services, or gain control over the system.
Reference: https://nvidia.custhelp.com/app/answers/detail/a_id/5458
API ThreatStats™ Report Q2-2023 12
About Wallarm
At Wallarm, we understand the unique challenges and threats that come with the ever-evolving
digital landscape. That's why we're committed to developing cutting-edge API security solutions
that enable businesses to secure their digital assets effectively. As your trusted partner, we not only
protect your business but also empower it to thrive in the digital economy.
We ensure full visibility and management of your Wallarm scans for, blocks, and controls the use
API portfolio through automatic endpoint of leaked API secrets to protect your data and
discovery, schema building based on actual infrastructure.
traffic, and tracking of API changes.
Wallarm classifies API endpoints by Personally Wallarm offers comprehensive security for APIs
Identifiable Information (PII), tracks sensitive and legacy web apps covering all OWASP
data in API endpoints, and prevents the use of Top-10 risks, proactive attack prevention,
leaked API keys. protection against malicious automated tools,
and an ML-based automated tuning approach
with smart blocking from day 1.
Wallarm is a global leader in API security, headquartered in San Francisco. We proudly serve a
broad spectrum of clients, including Fortune 500 companies and hypergrowth SaaS startups across
numerous industries such as finance, healthcare, and technology.
lab.wallarm.com request@wallarm.com
(415) 940-7077
www.wallarm.com