Introduction
API3:Excessive Data Exposure
| Threat agents/Attack vectors | Security Weakness | Impacts |
|---|---|---|
| The core of this vulnerability exists in the fact that an API should only return data to the user which is actually required. If we serve more data this could lead to an attack where a malicious actor could sniff the traffic from our API's by performing a MitM attack and abuse this data. We will go into some more examples later on in this article so it will be more clear. | This vulnerability is so prevalent (place 3 in the top 10) because it's easy to miss. Automation is near useless here because robots can not tell what data should not be served to the user without telling them exactly how the application should work. This is bad because API's are often implemented in a generic way, returning all data and expecting the front-end to filter it out. | When sensitive data is exposed as such, this could have a severe business impact depending on what data is being exposed but due to the nature of the sensitive data, it is almost always going to cause great impact by definition. |
An API is only supposed to return the required data to the front-end clients but sometimes teams will make a mistake or take the easy route and implement APIs that return all data to the client. When these API's return too much data, we can speak of Excessive Data Exposure.
A simple example we can give is an application which makes a call to grab the credit card details. The user does not see the CCV because it will be filtered out by the front-end client but the API still returns too much data.
Example:
GET /api/v1/cards?id=0
[
{
"CVV": "677",
"creditCard": "1234567901234",
"id": 0,
"user": "API",
"validUntil": "1992"
}
]

As you can see here, we made the call to grab the credit card details and while the end user might not be able to see the CVV but since the API returns it, we are speaking of Excessive Data Expsoure.
Let's add another example to make things more clear. In this scenario we have a mobile application that makes a GET request to /api/articles/{articleId}/comments/{commentId} and gets metadata about the comment as well, including the author. However when someone is sniffing the data, they can also see PII data from the author.
GET /api/v1/comments?id=0
[
{
"comment": "1234567901234",
"id": 0,
"user": "testUser",
"user adress": "testlane, testing - 340043 testing in testland",
"user email": "test@bla.com"
}
]


The deceptive simple nature of this issue type makes it very easy to overlook and our automation is not very likely to pick this issue type up either so it's very easy to slip under the radar. To help you filter your data - API security solution. We have compiled the OWASP Top 10 2021 ranking based on statistical data. It's highly recommended that you judge all data leaving API's on their sensitive nature and what data it should send off to the front-end. Front-end filtering should be avoided if at all possible.
Subscribe for the latest news