OpenAPI Security Exploits

OpenAPI Security Exploits

In the past two days, yet another OpenApi exploit was found that elevates privileges on python. Why is this significant?

Only because I have been talking about these issues as early as 2013 and as late as July 27th when I submitted this as an OpenApi exploit to Github (see below):

No alt text provided for this image

In the last 3 years, the number of exploits for OpenAPI has continued to climb without people fixing the issues. The issues affect every underlying implementation but OpenApi continues to push itself as a solution:

No alt text provided for this image

This issue affects ALL implementations of OpenAPI due to the fact that it cannot synchronize the state on the fly (due to using an archaic API pattern).


What is Synchronization: OpenAPI Users Don't Know

OpenAPI users don't even understand basic principles like 'shared state' and when talking to them about 'synchronized state' they get confused and do not understand:

No alt text provided for this image


For developers who don't understand the backend, they think duplicate 'doc generation' is 'synchronization' and a duplicate file is the same as synchronized state without even understanding what synchronization is.

If I wanted to synchronize between two databases, one database copies over the state between to the other LIVE so that they are always in SYNC; It does not create a duplicate file wherein those systems could get out of sync. It duplicates its state continuously on the fly so that the distributed systems always stay in SYNC.

How To Fix Issue: Abstraction of Communication Layer

To fix this issue, you have to abstract the communication logic from the controller so that it can be shared like in this video where I show how to dynamically reload the state:

The OpenAPI exploit only exists due to the fact that the OpenAPI file is a duplicate/unsynchronized file of the actual state in the application and as such, will at times be out of synch with the endpoints and security. This leads to wide open holes for exploitation in the OpenApi spec.

要查看或添加评论,请登录

Owen Rubel - API EXPERT的更多文章

  • API Hiring Checklist (Part 2)

    API Hiring Checklist (Part 2)

    In part 1, we discussed things that people should know and what to ask when hiring for an api developer. In this part…

  • API Hiring Checklist (Part 1)

    API Hiring Checklist (Part 1)

    When hiring an api architect or developer, there is a certain amount of knowledge they should have walking into a…

  • Why API Call Flow is HARD

    Why API Call Flow is HARD

    The other day I was talking about api call flow and the person I was chatting with had a very difficult time…

  • Software Coding Styles

    Software Coding Styles

    Even though we all use good coding standards, the way we all develop software shines through based upon what we are…

  • The OpenAPI Incident

    The OpenAPI Incident

    The discourse surrounding internal redirects has emerged as a significant point of contention in the API development…

  • OpenApi Doesnt Understand Redirection

    OpenApi Doesnt Understand Redirection

    Recently, Openapi maintainers insisted there was no such thing as 'internal redirects'..

  • APIs: Internal vs External Redirect

    APIs: Internal vs External Redirect

    Recently it came to light that the OpenAPI project maintainers were completely ignorant of 'internal redirects' to the…

  • Why Are My Apis Slow??

    Why Are My Apis Slow??

    When building apis these days, nearly everyone leans on two services: nodejs and/or AWS Lambdas. And as a result of…

  • OpenAPI Arazzo : Non-functional Call Flows

    OpenAPI Arazzo : Non-functional Call Flows

    So you by now have seen the drama. I opened an issue with Openapi Arazzo project talking about how they didn't address…

  • OpenAPI says Roy Fielding is WRONG!

    OpenAPI says Roy Fielding is WRONG!

    So as you all know, #OpenAPI maintainers love when I point out the issues with their 'standard' ..

社区洞察

其他会员也浏览了