March has arrived and is roaring like a very confused lion, at least in the northern hemisphere. And much like in the wild, brood production is increasing. We’ve already seen some fruits of that labor, such as the Q4-2022 and 2022 Year-End ThreatStats⢠Report, and some very tasty product upgrades. Read on for this month’s bit o’ honey.
![](https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2023/02/Note-from-Ivan.png?resize=260%2C90&ssl=1)
Greetings everyone!
We’ve been keeping an eye on the API threat landscape, and some notable API vulnerabilities that you should be aware of. But don’t worry, we’re here to help with our latest threat research and product updates.
Our recent API vulnerability, exploit and attack data analysis has yielded both [Q4-focused results]() and a [2022 year-end review](), with predictions for 2023 including continued rise in API vulnerabilities, growth in API attacks, and worsening time-to-exploit window.
As you’ll also learn from the report, OWASP API Security Top-10 does not perfectly cover real API exploits; therefore, weâre hoping the new one will be much better. To learn more about the recently released first draft and what to expect of OWASP API Top-10 2023, join us on March 16th for what promises to be [a lively webinar]().
On the product front, we’re continuing to release improvements to ensure users are getting the best end-to-end security for their APIs. We’ve recently dropped enhancements in API Discovery (which is really all about security posture), and SSRF protection. Find the details below.
As a spoiler, this month you will also find my API security predictions for 2023 in an upcoming Forbes article. I’m expecting that API token leaks will be part of kill-chains which will result in different types of attacks in 2023. I also expect to see an increase in API abuse attacks due to authentication and authorization issues, as well as a rise in data decoding attacks targeting APIs. My thoughts are based on vulnerability, exploit & attack data analyzed in our [2022 Year-End ThreatStats⢠Report](), and the many data breaches which happened last year.
â Ivan, CEO & Co-Founder, Wallarm
PS â Stay up-to-the-minute on all the latest news about [#apisecurity]() exploits and updates by following our new [**API ThreatStats LinkedIn page**]().
![](https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2023/02/Wallarm-News-header.png?resize=768%2C116&ssl=1)
**Wallarm news**
The 2022 API vulnerability, exploit and attack data have been crunched and the latest **API ThreatStats⢠Report** season is complete. The team provided both Q4-focused results and, perhaps more importantly, a 2022 year-end review. Lots to explore, including:
* Q4-2022 [blog post]() and [infographic]()
* YE-2022 [blog post](), [report]() and [on-demand webinar]()
Too much to recap here, but be sure to read check out our predictions for 2023, including:
* Continued rise in API vulnerabilities, in numbers and severity.
* Unceasing growth in API attacks, which will lead to even more breaches.
* Worsening time-to-exploit window, which will put even more pressure on security and DevOps teams.
![](https://lh5.googleusercontent.com/GCSq7XayB8A-s41hDf-6XbJ1OY-jdYm0YGt6nsozzGB2pzwIar9ga6v4AKT3ppFyPjJ9HdQcWFgoyX89SfMuAaUHX0dOzMh_poqHnuU-mDBNjTYhOGMxvB9CJXNgTTT8B2R0aGbV3-lMI7nYgfCgj_A)
Read the 2022 year-end collection to know what to prepare for, and look at the Q4-2022 collection to learn how we got here. Dig In!
![](https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2023/02/Product-News-header.png?resize=768%2C116&ssl=1)
The hive has served up some sweet ambrosia for Wallarm users in the past month.
![](https://lh4.googleusercontent.com/0pZnqkSuEmML5zjJDqrJNd6JFRDpG16vI3DDzZO_eWRCKqmRnHaESaJxoxyH8SJj9z_MNKaNZOAczysuxR92Vgg5vsOZDbzMZ27thiNGtlKyXhJFWzJJjv8uRV4NzV5cjpMEoNOQadqN455HqdijhZk)
**API Discovery Dashboard Upgrades**
With this update, you can now more easily monitor sensitive data (to maintain compliance), track API changes (to monitor drift), identify risky endpoints (to reduce your API attack surface), and more. Read more in [this changelog entry]().
**SSRF Attack Mitigation**
Server-Side Request Forgery (SSRF) attacks can allow malicious actors to read server configurations, connect to internal services, perform unintended post requests, or circumvent input validation. With this update, which requires Node v 4.4.3, you can now more easily protect against this attack vector. Read more in [this changelog entry]().
**Did You Know?** You can subscribe to our [**update announcements**]() to keep up-to-date with the latest product news.
![](https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2023/02/Events-header.png?resize=768%2C116&ssl=1)
**Upcoming:**
**_Webinar_** [_Mar 16, 2023_] â [A CISOs Guide To The New 2023 OWASP API Security Update]()
Join our upcoming webinar as we explore the new Top-10 API risks Release Candidate (RC) for 2023, and the implications of these updates to your API security posture.
[![](https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2023/02/text-1.png?resize=256%2C45&ssl=1)]()
**Past:**
**_Webinar_** [_on-demand_] â [API ThreatStats⢠Report: 2022 Year-in-Review & Q4 Results]()
The Wallarm Research team looked through all published API vulnerabilities and exploits for 2022 and aggregated these into our year-end report. Watch our recording of our recap of the highlights and trends we saw in 2022, and hear our predictions for whatâs to come in 2023.
![](https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2023/02/Notable-vulns-header.png?resize=768%2C116&ssl=1)
[**VMware NSX Manager Vulnerabilities Being Actively Exploited in the Wild**]()
Read this write-up from the Wallarm Detect team regarding exploit attempts in the wild of [CVE-2022-31678]() (CVSS score: 9.1) and [CVE-2021-39144]() (CVSS score: 8.5) impacting [VMware NSX Manager](). If successfully exploited, the impact of these vulnerabilities could be catastrophic, allowing attackers to execute arbitrary code, steal data, and/or take control of the network infrastructure.
[**Octopus Strike! Three Argo CD API Exploits In Two Weeks**]()
Read this write-up from the Wallarm Detect team regarding three (3) vulnerabilities impacting [Argo CD](), a popular open-source CD tool used by many DevOps teams to manage their apps. These include:
* [CVE-2023-22736]() â an authorization bypass vulnerability (CVSS score: 8.5)
* [CVE-2023-22482]() â an improper authorization vulnerability (CVSS score: 8.8)
* [CVE-2023-25163]() â results in leakage of repository access credentials in error messages (CVSS score: 6.5)
[**Yet More ImageMagick Vulnerabilities**]()
Read this write-up from the Wallarm Detect team regarding [CVE-2022-44267]() (CVSS score: 6.5) and [CVE-2022-44268]() (CVSS score: 6.5) which allow attackers to arbitrarily read files in [ImageMagick](), a popular open-source image editing suite, and to cause denial-of-service (DoS) disruptions.
[**React-admin XSS Attack on RichTextField**]() (CVSS score: 5.4)
All React applications built with react-admin and using the <RichTextField> are affected. If the data isn’t sanitized server-side, this opens a possible Cross-Site-Scripting (XSS) attack. An exploit POC has been published. ([CVE-2023-25572]())
[**Directus SSRF Attack on File Import**]() (CVSS score: 5.0)
Some versions of Directus are vulnerable to Server-Side Request Forgery (SSRF) when importing a file from a remote web server (POST to `/files/import`). An exploit POC has been published. ([CVE-2023-26492]())
[**ZoneMinder SQL Injection Attack via Malicious JWT**]() (CVSS score: 8.1)
Some versions of Zoneminder are susceptible to SQL Injection via malicious JSON web token (JWT). A patch has been released. ([CVE-2023-26032]())
[**Apache Kafka Connect Unrestricted Deserialization of Untrusted Data**]() (CVSS score: 8.8)
Some versions of Apache Kafka Connect might be subject to possible Remote Code Execution (RCE) or Denial of Service (DoS) attacks via SASL JAAS configs which allow JNDI requests to be performed. An upgrade is available. ([CVE-2023-25194]())
[**TinaCMS Sensitive Information Leak via Script File**]() (CVSS score: 7.5)
Some versions of TinaCMS which store sensitive credentials such as environment variables (e.g., Algolia API keys) are impacted. Users are advised to rotate exposed keys. An upgrade is available. ([CVE-2023-25164]())
[**Gitpod Cross-Site WebSocket Hijacking Vulnerability**]() (CVSS score: 8.2)
Some versions of Gitpod are vulnerable to a takeover of shared workspaces due to a a Cross-Site WebSocket Hijacking (CSWSH) vulnerability. An upgrade is available. ([CVE-2023-0957]())
We recommend that you assess your portfolio for exposure to these vulnerabilities, apply updates where possible, and monitor for further incidents. For more on notable API vulns, make sure to subscribe to our new [**API ThreatStats LinkedIn page**]().
![](https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2023/02/Industry-News-header.png?resize=768%2C116&ssl=1)
[**Sumo Logic Keeps API Credentials on Endpoints**]()
(SecLists) _Get access to the entire API using accessid and accesskey, found in log file_.
[**High-severity Vulnerability in F5 BIG-IP Let Attackers Execute Arbitrary Code**]()
(GBHackers) _A high-severity format string vulnerability in F5 BIG-IP that could result in a denial-of-service (DoS) issue and possibly execute arbitrary code_.
[**E-Commerce Shops: 12% Are Publicly Exposing Private Backup**]()
(Data Breach Today) _A study of 2,037 e-commerce shops found that 250 of them had backups that contained private information and that were stored in publicly accessible folders with no access restrictions_.
[**Bypassing Akamaiâs WAF Using an Injected Content-Encoding Header**]()
(Praetorian blog) _An interesting method to bypass the cross-site scripting (XSS) filtering functionality within the Akamai Web Application Firewall (WAF) solution_.
[**Analyzing Your Existing API Testing Through a Security Lens**]()
(Dana Eppâs blog) _APIs are a prime target for exploitation and need to be protected, so developers must also introduce security testing into their existing QA strategy to protect applications from malicious attacks and vulnerabilities_.
[**How Application Mapping Can Boost Application Security**]()
(GBHackers) _Application mapping helps identify potential vulnerabilities and areas of risk, and supports security testing, incident response, and overall application security planning_.
[**ChatGPT for Offensive Security: Five Attacks**]()
(The CISO Perspective) _Attackers are finding ways are using ChatGPT for nefarious purposes on underground hacking forums_.
[**An API Security Testing Checklist⦠with a twist**]()
(Dana Eppâs blog) _This red team checklist enumerates how to approach the API target, how to attack it, and how to leave little to no trace_.
[**Most web API flaws are missed by standard security tests**]()
(The Daily Swig) _APIs can become less of a liability by including security-focused team members during design, encouraging secure coding, conducting regular security tests, and monitoring programming calls for attacks and misuse_.
[**When It Comes To Zero Trust, Nobody Puts Appsec In A Corner**]()
(Forrester blog) _Forresterâs Security Survey, 2022, shows that 83% of global large enterprises are reporting that senior leadership has committed their organizations to the adoption of Zero Trust_.
[**Top Takeaways From CloudNativeSecurityCon 2023**]()
(Dark Reading) _One notable trend is “shift right,” which is gaining equal importance in understanding what is going on in the runtime environment_.
[**How to address growing API security vulnerabilities in 2023**]()
(IT Security Guru) _In many ways, considered the ânew battleground for cybersecurityâ in 2023, APIs can make â or break â a business in the coming year_.
![](https://i0.wp.com/lab.wallarm.com/wp-content/uploads/2023/02/Poll-header.png?resize=768%2C116&ssl=1)
Last month we asked about leaked API keys and other secrets. It looks like only a few are truly confident, while about 50% are somewhat or completely blind to this issue:
![](https://lh5.googleusercontent.com/_mVcZDFnnxLknLqoDlC0JFqitI52guqi4m4iOSZMgpewsV_P1KxPHs6ZorjSmmgAPPIWJjZwc3lRxZxQqxn4IZxdV3sDE6tP6Vv_JDLtsECWMS0OJsBQPEMSfFaFeFWCZaYqA_oyyvb8TULlkwA4hBw)
And weâd love to have you weigh in on our next **LinkedIn poll** we’re conducting: **[How mature is your API vulnerability assessment / management process]()**? Please let us know where you stand on this â [connect with Ivan]() or [follow us at Wallarm]() to register your vote.
## **Where APIs Meet Apis**
And now for something completely different. Since the theme of The APIary newsletter is based on hardworking & industrious bees, we like to finish with an uplifting image. Since itâs March, the flowers are beginning to bloom and our namesakes are preparing for flight, as you can see. Enjoy!
![](https://lh6.googleusercontent.com/V7bZ-KItWFqytXevoWipWikAB9JfLD4dvnNmmGkoPvyiT3pCzQsvewTJrbs079d2hYP4300wbDcSA5COmBySTbuQ-5F7P99TvfGOVrHVG4vD9j0dfiEjFWulPMg5OYPCCVSzxnYgea-Y5OEsXuw19xY)
Source: Cyan-Biologist Tumblr | [First Bee GIF of the Year]()
The post [Predictions for 2023 from Latest API Threat Research | API Security Newsletter]() appeared first on [Wallarm]().Read More