muqeetkhan20 / JuneSanity

0 stars 0 forks source link

Windows_Command_Injection on POST:/api/v1/savings-transaction #2098

Open qauser21 opened 3 years ago

qauser21 commented 3 years ago

Title: Windows_Command_Injection Vulnerability on POST:/api/v1/savings-transaction Project: Sanity 7th July Description:

Assertion Name: Windows Injection ( 1 )

Overview: Windows Injection is an attack in which the attacker is able to execute OS commands on the hosting server via vulnerable application. In this attack, the attacker-supplied operating system commands are usually executed with the privileges of the vulnerable application.

Severity: Command Injection is classified under the category of “Injection Attacks” by OWASP. “Injection Attacks” is ranked at 8th position in 2019 OWASP API Top 10 ( 2 ) and consistently rated at Top 1 Category of Attack by OWASP in years 2010, 2013 and 2017 ( 3 ). Command Injection is rated at 11th position in the CWE / SANS Top 25 ( 4 ).

Vulnerability Impact: Command injection is treated under the “Attack” category, in which the attacker extends the default functionality of the application, which executes system commands.

Exploitation: Command Injection vulnerabilities typically occur when

Remediation: Strong input validation must be performed for user supplied input ( 5 ). Also follow the input validation cheat sheet from OWASP
References:
  1. OS Command Injection - https://www.owasp.org/index.php/Command_Injection
  2. OWASP API Security Project - https://www.owasp.org/index.php/OWASP_API_Security_Project
  3. OWASP Top 10 – 2017 – A1 Injection - https://www.owasp.org/index.php/Top_10-2017_A1-Injection
  4. CWE – SANS – TOP 25 - http://cwe.mitre.org/top25/
  5. Command Injection - http://cwe.mitre.org/data/definitions/77.html
  6. REST API Security Guidelines - https://dzone.com/articles/top-5-rest-api-security-guidelines
  7. OWASP REST Security Cheat Sheet - https://cheatsheetseries.owasp.org/cheatsheets/Injection_Prevention_Cheat_Sheet.html
  8. OWASP Input Validation Cheat Sheet - https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html

Risk: Windows_Command_Injection Severity: Critical API Endpoint: http://95.217.118.53:8080/api/v1/savings-transaction Environment: Master Playbook: ApiV1SavingsTransactionPostBodyParamWindowsCommandInjection Researcher: [apisec Bot]

QUICK TIPS

Suggestion: Effort Estimate: null Hrs Wire Logs:

IMPORTANT LINKS

Vulnerability Details: https://cloud.fxlabs.io/#/app/projects/8a8093567a8012b6017a803bf31114fd/dashboard/8a8094a07b731c32017b75a083613901/details

Project: https://cloud.fxlabs.io/#/app/projects/8a8093567a8012b6017a803bf31114fd/allScans

Environment: https://cloud.fxlabs.io/#/app/projects/8a8093567a8012b6017a803bf31114fd/environments/8a8093567a8012b6017a803bf3181500/edit

Scan Dashboard: https://cloud.fxlabs.io/#/app/projects/8a8093567a8012b6017a803bf31114fd/profiles/8a8093567a8012b6017a803c070d16cb/runs/8a8094a07b731c32017b759b22d233cb

Playbook: https://cloud.fxlabs.io/#/app/projects/8a8093567a8012b6017a803bf31114fd/playbooks/ApiV1SavingsTransactionPostBodyParamWindowsCommandInjection

Coverage: https://cloud.fxlabs.io/#/app/projects/8a8093567a8012b6017a803bf31114fd/categories

Code Sample: https://cloud.fxlabs.io/#/app/projects/8a8093567a8012b6017a803bf31114fd/dashboard/8a8094a07b731c32017b75a083613901/codesamples

PS: Please contact support@apisec.ai for apisec access and login issues.

--- apisec Bot ---