Cheat Sheet: Addressing OWASP Top 10 Vulnerabilities in MuleSoft APIs
If you're a MuleSoft API developer, you need to check out this list of vulnerabilities and remediations to ensure what you build stays safe.
Join the DZone community and get the full member experience.
Join For FreeGenerally, when we talk about ensuring security in an IT context, it is about ensuring three essential goals - Confidentiality, Integrity, and Availability.
Quick Word on OWASP
The OWASP Foundation typically publishes a list of the top 10 security threats on an annual basis (2017 being an exception where RC1 was rejected and revised based on inputs from market experts). The goal is to make IT professionals aware of the most prominent threats out there - based on the technology choices prevalent in the industry and the kind of security attacks being encountered - and rank them based on various factors such as Exploitability, Prevalence, and Detectability.
According to OWASP, they are an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted.
OWASP Top 10 2017 - RC2
Note that the following mitigation set assumes MuleSoft runtime v3.8 and relies on a CloudHub-based API Manager as a means to apply security policies.
# |
Security Threat |
Description |
Mitigation |
A1 |
Injection flaws, such as SQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data. |
a) JSON Threat Protection b) XML Threat Protection |
|
A2 |
Application functions related to authentication and session management are often not implemented correctly, allowing attackers to compromise passwords, keys, session tokens, or to exploit other implementation flaws to assume other users’ identities. |
|
|
A3 | Many web applications do not properly protect sensitive data, such as credit cards, SSNs, and authentication credentials, with appropriate encryption or hashing. Attackers may steal or modify such weakly protected data to conduct identity theft, credit card fraud, or other crimes. |
|
|
A4 | Many older or poorly configured XML processors evaluate external entity references within XML documents. External entities can be used to disclose internal files using the file URI handler, internal SMB file shares on unpatched Windows servers, internal port scanning, remote code execution, and denial of service attacks, such as the Billion Laughs attack. |
|
|
A5 |
Virtually all web applications verify function level access rights before making that functionality visible in the UI. However, applications need to perform the same access control checks on the server when each function is accessed. If requests are not verified, attackers will be able to forge requests in order to access unauthorized functionality. |
|
|
A6 |
Good security requires having a secure configuration defined and deployed for the application, frameworks, application server, web server, database server, and platform. All these settings should be defined, implemented, and maintained as many are not shipped with secure defaults. This includes keeping all software up to date, including all code libraries used by the application. |
|
|
A7 |
XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation and escaping. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites. |
|
|
A8 |
Insecure deserialization flaws occur when an application receives hostile serialized objects. Insecure deserialization leads to remote code execution. Even if deserialization flaws do not result in remote code execution, serialized objects can be replayed, tampered or deleted to spoof users, conduct injection attacks, and elevate privileges. |
|
|
A9 |
Vulnerable components, such as libraries, frameworks, and other software modules almost always run with full privilege. So, if exploited, they can cause serious data loss or server takeover. Applications using these vulnerable components may undermine their defenses and enable a range of possible attacks and impacts. |
|
|
A10 |
Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract or destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring. |
|
Opinions expressed by DZone contributors are their own.
Comments