Site icon API Security Blog

Dapr API Token Exposure

Summary A vulnerability has been found in Dapr that causes a leak of the application token of the invoker app to the invoked app when using Dapr as a gRPC proxy for remote service invocation. This issue arises because Dapr sends the app token of the invoker app instead of the app token of the invoked app. Users who leverage Dapr for gRPC proxy service invocation and are using the app API token feature are encouraged to upgrade Dapr to version 1.13.3. Impact This vulnerability impacts Dapr users who use Dapr as a gRPC proxy for remote service invocation as well as the Dapr App API token functionality. An attacker could exploit this vulnerability to gain access to the app token of the invoker app, potentially compromising security and authentication mechanisms. Patches The issue has been fixed in Dapr version 1.13.3. Details Dapr uses two types of tokens for authentication: APP_API_TOKEN: Used by Dapr to authenticate to the app. DAPR_API_TOKEN: Used by the app to authenticate to Dapr. Dapr uses the dapr-api-token metadata in gRPC calls (or header, for HTTP calls) for authentication. In communication from dapr to the app, the dapr-api-token metadata field will carry the APP_API_TOKEN. In communication from the app to daprd, the dapr-api-token metadata field will carry the DAPR_API_TOKEN. Before version 1.13.0, the APP_API_TOKEN was not being sent to the invoked app for authentication, as reported in this issue. Instead, Dapr was incorrectly using the same DAPR_API_TOKEN…Read More

Exit mobile version