this vulnerability type as I have and reported on it often. The form I prefer is SQL injections via the import feature and OS command injection from an unexpected source. Let's start with the SQLi.
I found this issue while doing bug bounties on a private program and it happened because the developers did sanitise all the direct input very well, except they did not think to include the import functionality because the base of the application was built a year prior to building the import functionality.
Upload.csv looked like this:
name,address,email,phone
',',','
And while uploading i selected the comma as field separator, this displayed a SQL error and from there on i dug in deeper.
The error was:
Expects parameter 1 to be string, null given in /var/www/html/import.php
This made me close the query and start a new one of my own
name,address,email,phone
';select * from users;--,',','
This made the application dump the entire users table in an error message, that was enough for me to report this issue and collect my bounty.
The second example i have is a little bit less complicated, i noticed a parameter literally called "osParam" which seemed to have some flags in it, i rushed to start up burp suite intruder with a list of command injections i had prepared before and had a hit on the 9th request that burp suite made. The command separate was a newline character '\n' and my ping command delayed the response.
index.php?osParam=\\nping -c 10 127.0.0.1
So I quickly tried a whoami, reported the result and awaited approval which cames 2 days later.
Preventive measures against Injection vulnerabilities?
We need to treat any input as being compromised and we should filter, validate and verify every input to our API through all ways, this includes third party inputs or non-direct inputs such as importing files.
We have to make sure to create 1 system that will be able to perform these steps and that we implement and use that same system across all of our endpoints.
Preferably use a well known library that has been tested instead of creating your own.
We have to take care in filtering special characters, often the language we use has a specific syntax and way to handle these special characters and it's advised to implement that syntax.
Whener multiple records are being selected, limit the number of records per query to avoid mass disclosure.
Preferably use a specification that specifies how the API works such as OpenAPI and that you only allow requests that match the filters, verification and validation rules.
Define what the API can expect for all the string endpoints and in terms of variable types.
An example in php which is badly implemented and leaves the app open for things such as XSS
This issue type is diverse and not always easy to automatically test, we have to keep a good overview of every endpoint, including the ones that are less obvious. Manual testing is still advised to complement the automated tests in areas where an automated test is falling short.
Taking every endpoint into account can be quite confusing as it includes finding all the hidden parameters as well. New API endpoints should already be added to the documentation and old endpoints should be indexed whenever possible. This problem can be solved by API Security Company.
According to statistics, we think that this vulnerability will be in the first place in the OWASP Top 10 in 2021.
Watch the video:
FAQ
What is injection in relation to APIs?
Injection refers to the malicious input of commands or data into an API, with the intent of accessing, compromising or manipulating confidential data.
How can I prevent injection attacks on my APIs?
To prevent injection attacks you can input validation, parameterized queries, output encoding and use secure coding practices as recommended by OWASP guidelines.
What are the consequences of successful injection attacks on my APIs?
Successful injection attacks can lead to data loss, data manipulation, unauthorized access to sensitive data, and additional compromises in the API.
How can I detect injection attacks on my APIs?
To detect injection attacks, you can use log and audit trail analysis techniques, input validation, output encoding and other automated tools.
Which is the most common type of injection attack hackers are using today?
The most common type of injection attack in 2021 is the SQLi or SQL Injection. According to the latest article published on cybersecurity-insiders.com "SQL Injection Attack Challenges and Myths in 2021" by Swaraj Sikdar, SQL injection accounts for 47% of total injection attacks worldwide.
Stepan is a cybersecurity expert proficient in Python, Java, and C++. With a deep understanding of security frameworks, technologies, and product management, they ensure robust information security programs. Their expertise extends to CI/CD, API, and application security, leveraging Machine Learning and Data Science for innovative solutions. Strategic acumen in sales and business development, coupled with compliance knowledge, shapes Wallarm's success in the dynamic cybersecurity landscape.
With over a decade of experience in cybersecurity, well-versed in system engineering, security analysis, and solutions architecture. Ivan possesses a comprehensive understanding of various operating systems, programming languages, and database management. His expertise extends to scripting, DevOps, and web development, making them a versatile and highly skilled individual in the field. Bughunter, working with top tech companies such as Google, Facebook, and Twitter. Blackhat speaker.