API Vulnerabilities and Exploits Q2-2022
API Vulnerabilities and Exploits Q2-2022
API Vulnerabilities
and Exploits Q2-2022
2
64
High risk 72
Medium risk
41
Critical risk
5
Low risk
Earlier this year, Gartner wrote that “by 2022, API abuses will move from an infrequent to the most
frequent attack vector, resulting in data breaches for enterprise web applications." 1 Midway through the
year, is this being proved true by the facts on the ground? Is the threat real?
To address this, Wallarm examined API vulnerabilities and exploits that were publicly disclosed in
Q2-2022, and what types of software from which vendors are involved.
We also analyzed publicly disclosed exploit POCs to determine where the risk lies.
In addition, we map these issues across industry standards, including both OWASP Top-10 (2021) for
web apps and OWASP API Security Top-10 (2019), CVSS scores, and CWEs.
Use this data both to assess your exposure and to reduce the risk in your API portfolio.
u mp
HugeepJorted
in r bilities!
era
Vulnerabilities
Vendors
Critical & High rated
vulnerabilities
Injections (OWASP A03 / API8) are now the largest API threat vector, ahead of BOLA by all metrics
(number of issues discovered, exploitability and severity), and represent the highest risk to your API
portfolio.
OWASP Top-10 (2021) for Web Apps OWASP API Security Top-10 (2019)
A03: Injection 62
API4: Lack of Resources
14 & Rate Limiting
n/c 1 0 n/c
Are CWEs Better Indicators of Risk?
Software Weaknesses Result in More Risk
72
184
Q2: 7.3 Total
Medium risk:
64
6.9 - 4.0
Q1: 7.6 High risk:
8.9 - 7.0
Published Exploit
Unexploited POCs
Vulnerabilities But It’s Not Just the Risky Ones
In Q2, we find ⅓ of API vulnerabilities are
almost immediately exploited, with POCs
published within a median of 16~17 days
(2-½ weeks).
Exploited
Vulnerabilities Unsurprisingly, exploited vulnerabilities
had higher median CVSS scores (8.8 vs.
7.3), with many more rated as Critical.
Vulnerability Sources
Evenly Distributed
We see that 43 commercial vendors were impacted by 69 vulnerabilities,
while 64 OSS vendors were impacted by 103 vulnerabilities – essentially an
equal distribution. Interestingly, 12 vulnerabilities analyzed came from
vendors offering both commercial and OSS products.
69
43 Commercial
Vendors
73
Commercial
Products
184 12
Total
Vulnerabilities 4 Mixed
Vendors
111
Open Source
Software 103
64 OSS
Vendors
Impacted by 4 or
more vulnerabilities
Impacted by 3
What’s In Your
vulnerabilities
9 API Portfolio?
10 More Vulnerabilities Impacting More Vendors
CVE-2022-29165 Argo CD will trust invalid JWT claims if anonymous access is enabled API2
OWASP API Security Top-10
CWE-287 Improper Authentication, CWE-290 Authentication Bypass by Spoofing, CWE-200
Be On The Lookout for These Too
What to address first? Triaging vulnerabilities for mitigation can be based on a variety of criteria,
including:
Form.io 1 9.8
Top-5 based on frequency (count)
Gatsby 1 9.8
Vendor count CVSS avg
git-pull-or-clone 1 9.8
Robustel 9 9.1
Halo 1 9.8
Wordpress 7 6.8
Illumina 1 9.8
Ruijie Networks 6 9.0
IObit 1 9.8
Argo Project 6 8.2
MediaWiki 1 9.8
Gitlab 5 4.4
Open Automation 1 9.8
Zyxel 1 9.8
3 See https://cwe.mitre.org/top25/archive/2022/2022_cwe_top25_supplemental.html#methodDetails
Assessing Your API Security
Injections (OWASP A03 / API8) are 33% of the reported API vulnerabilities
now the highest risk for APIs, ahead of are almost immediately exploited, with
BOLA by all metrics (number of POCs published within a median of 2-
discovered issues, exploitability and ½ weeks – since these are probably
severity) – which points to the need underreported, this illustrates the
for more pre-release testing. need for run-time protection.
Expanding your vulnerability management program to cover APIs will require visibility across your entire
API portfolio, assessing and triaging vulnerabilities as they arise, and ensuring mitigations are
implemented – both in the code and at run-time. Refer to the API Security Tutorial for more information.
and exploits?
group at lab.wallarm.com
Download the Q1-2022 API Vulnerability Contact us via the web at https://
Report www.wallarm.com/request-demo or via email
at [email protected] to set up a personal
demo with one of our security experts.
(415) 940-7077
Book a Wallarm demo
188 King St. Unit 508, San Francisco, CA 94107
or start your free trial now www.wallarm.com