Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New Scenario for a7-security-misconfiguration #68

Open
wants to merge 1 commit into
base: develop
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
30 changes: 30 additions & 0 deletions 2023/en/src/0xa7-security-misconfiguration.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,6 +61,36 @@ header, private conversations end-up cached by the web browser, allowing
malicious actors to retrieve them from the browser cache files in the
filesystem.

### Scenario #3

An e-commerce application does not restrict access to its `dev` node on firewall resulting in verbose response from API. Attacker might be able to get access to sensitive information on the product through the verbose response received from the `dev` node.

```
GET /api/product?id=1234
Host: e-commerce.com

Response:
{
"product_id":1234,
"product_price":"$100",
"product_seller":"ABC"
}
```

```
GET /api/product?id=1234
Host: dev.e-commerce.com

Response:

{
"product_id":1234,
"product_price":"$100",
"product_discount":"$50",
"product_next_discount_date":"01/04/2023",
"product_seller":"ABC"
}
```
## How To Prevent

The API life cycle should include
Expand Down