OWASP API #1 BOLA

OWASP API #1 BOLA


I thought about doing a breakdown of the OWASP Top 10 for beginners and then thought – ‘that’s’ been done to death’. So, I’m going to start a series on the OWASP Top 10 for Application Programming Interface – aka APIs


It's 2023, and APIs are the hot “new” attack vector for criminals. Ignore API security, and you might as well send out an engraved invitation to your data breach party. While most API threats are relatively easy to catch using vulnerability scanners, some can remain undetected for years.

?API Security: Defeating the BOLA Threat

Today, we're tackling the dastardly BOLA (Broken Object Level Authorization). No, not Ebola- BOLA Broken Object Level Authorization.? It's the Top of the OWASP API Security Top 10 list.


First some background:

A data object is a collection of one or more data points that create a single entity. In other words, “data object” is another way of saying “this group of data should be thought of as standalone.” The most common examples of data objects are data tables, arrays, pointers, records, files, sets, and scalar types.

Object-level authorization is the set of controls that dictate which users can access which objects, be it database records or files. For example, a user might be allowed to view specific values in a database, but not have permission to edit or delete them. When those controls are broken – or coded insecurely, we have issues.

BOLA vulnerabilities are usually caused by insecure coding practices: failing to properly validate user input or failing to check permissions before granting access to an object. We see this when an API allows overly permissive access controls or when API resources are not properly secured.

Think of it this way:

SOME people (never me) and their friends would go to a nightclub, and some of their friends were not of legal age to drink. They would go through the doorman, show their ID, state their name for the guest list and go inside. (Nice identification and authorization example here btw).

Many times, upon entering, nightclubs would give you a wristband or an ink stamp on your hand.? After a few minutes, some people would head outside to ‘leave their coat in your car”, or “get some fresh air’.

Then they would find the underage friend, and smush hands to pass the ink stamp to the underage person.? Then both people would wait a little while and then walk in, showing their hands as they walk in past the doorman.? The doorman would glance over, see the ink stamps, and let them both in.


BOLA vulnerabilities occur when one user can access other users' data due to insufficient authorization controls validating access to data objects.

Remember the 2018 USPS breach? ?An attacker got access and decided to open the system for anyone with a usps.com account, along with access to 60 million others’ accounts. Textbook ?BOLA attack.

How do we protect our systems from BOLA?

BOLA vulnerabilities are some of the most dangerous API threats, and organizations need to take proactive steps to prevent them:

  1. Examine your Systems and Policies: First, you need to beef up your authorization game. Strong authentication is like a locked door, but the real challenge is making sure your access policies/ bouncers are airtight and always on their toes.
  2. Say Goodbye to Predictable IDs: Auto-incrementing IDs are so passe. Say hello to UUIDs. They're 128-bit labels, that are unique, secret IDs with random letters, numbers, and symbols. No bad guys are going to easily guess these values.
  3. Become a Business Logic Detective: BOLA often hides in the shadows of your API's business logic. That's why you need to become a detective and scrutinize every nook and cranny of your code to find these vulnerabilities. Continuously test your business logic layer to identify vulnerabilities that are impossible to reliably address every time you push new code live.
  4. Zero Trust All the Way: In the world of BOLA, trust no one! The Zero-Trust Security Model is your ally. Everyone must prove their identity and permissions before getting any slice of the API pie.
  5. Unleash the APIsec: Finally, call in the cavalry! A professional security organization will scan your API for BOLA vulnerabilities. It's like having a superhero that can spot trouble before it even knocks on your digital door.

??

<Shameles splug> Seron Security has a proprietary, passive, in-depth scanner that can deliver fast, actionable results-and we are looking for some beta testers…DM me.</shameless plug>

要查看或添加评论,请登录

Aaron Birnbaum的更多文章

  • Job seekers Beware!

    Job seekers Beware!

    A friend of mine has been looking for a job and interviewing. He received this offer letter, which he realized was a…

    3 条评论
  • Funny Scammer Story

    Funny Scammer Story

    Surprise, there are scammers on LinkedIn! Most of them are annoying, and they always try to take you to another…

    2 条评论
  • "Find out for yourself." The Genius of Michael Crichton

    "Find out for yourself." The Genius of Michael Crichton

    “Right now, scientists are in exactly the same position as Renaissance painters, commissioned to make the portrait the…

    1 条评论
  • Making a change...again

    Making a change...again

    Note: I wanted to wait to write this, but the buzz is starting to build and I'm very excited about the addition to…

    10 条评论
  • My sister knew how to network better than the pros.

    My sister knew how to network better than the pros.

    When my sister got married, she and her husband chose a very nice wedding song by Genesis, 'Follow You, Follow Me. I…

  • Are Browser Plugins a Necessary? Evil?

    Are Browser Plugins a Necessary? Evil?

    This weekend, I was doing a little 'housekeeping', and went through an old machine. I was looking at my Google Chrome…

  • Diversity - wait hear me out.

    Diversity - wait hear me out.

    Here's my problem with discussions around employment diversity: Some people (like me) don't look at a person's skin…

    9 条评论
  • Dilemma of the day:

    Dilemma of the day:

    #1 - For the record I am absolutely against the exploitation of children. #2 - I am also in favor of due process and a…

  • I'm Back...

    I'm Back...

    So, as many of my devoted, wonderful, brilliant followers may have observed. I kind of disappeared for a while.

    26 条评论
  • Using LinkedIn to SPAM and annoy people is NOT a good idea.

    Using LinkedIn to SPAM and annoy people is NOT a good idea.

    I am so tired of being invited to people that have no relationship to me, offer no benefit and take up my time reading…

    4 条评论

社区洞察

其他会员也浏览了