Skip to content

Commit 43863d4

Browse files
authored
Update 0xa9-improper-inventory-management.md
1 parent 5081633 commit 43863d4

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

editions/2023/pt-pt/0xa9-improper-inventory-management.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
# API9:2023 Improper Inventory Management
22

3-
| Threat agents/Attack vectors | Security Weakness | Impacts |
3+
| Agentes Ameaça/Vetores Ataque | Falha Segurança | Impactos |
44
| - | - | - |
5-
| API Specific : Exploitability **Easy** | Prevalence **Widespread** : Detectability **Average** | Technical **Moderate** : Business Specific |
6-
| Threat agents usually get unauthorized access through old API versions or endpoints left running unpatched and using weaker security requirements. In some cases exploits are available. Alternatively, they may get access to sensitive data through a 3rd party with whom there's no reason to share data with. | Outdated documentation makes it more difficult to find and/or fix vulnerabilities. Lack of assets inventory and retirement strategies leads to running unpatched systems, resulting in leakage of sensitive data. It's common to find unnecessarily exposed API hosts because of modern concepts like microservices, which make applications easy to deploy and independent (e.g. cloud computing, K8S). Simple Google Dorking, DNS enumeration, or using specialized search engines for various types of servers (webcams, routers, servers, etc.) connected to the internet will be enough to discover targets. | Attackers can gain access to sensitive data, or even take over the server. Sometimes different API versions/deployments are connected to the same database with real data. Threat agents may exploit deprecated endpoints available in old API versions to get access to administrative functions or exploit known vulnerabilities. |
5+
| Específico da API : Abuso **Fácil** | Prevalência **Predominante** : Deteção **Moderado** | Técnico **Moderado** : Específico Negócio |
6+
| Os agentes ameaça geralmente obtêm acesso não autorizado através de versões antigas de APIs ou _endpoints_ que permanecem em execução sem atualizações e que utilizam requisitos de segurança mais fracos. Em alguns casos, os _exploits_ estão disponíveis online. Alternativamente, podem obter acesso a dados sensíveis através de um terceiro com quem não há razão para compartilhar dados. | Documentação desatualizada torna mais difícil encontrar e/ou corrigir vulnerabilidades. A falta de inventário de recursos e estratégias de desativação leva à execução de sistemas sem atualizações, resultando em vazamentos de dados sensíveis. É comum encontrar hosts de API desnecessariamente expostos devido a conceitos modernos como microserviços, que tornam as aplicações fáceis de implantar e independentes (por exemplo, computação em nuvem, K8S). Um simples Google Dorking, enumeração de DNS ou o uso de motores de busca especializados para vários tipos de servidores (webcams, routers, servidores, etc.) conectados à internet será suficiente para descobrir alvos. | Os atacantes podem obter acesso a dados sensíveis ou até mesmo tomar o controlo do servidor. Às vezes, diferentes versões/implementações da API estão conectadas à mesma base de dados com dados reais. Agentes ameaça podem explorar _endpoints_ obsoletos disponíveis em versões antigas da API para obter acesso a funções administrativas ou explorar vulnerabilidades conhecidas. |
77

8-
## Is the API Vulnerable?
8+
## A API é vulnerável?
99

1010
The sprawled and connected nature of APIs and modern applications brings new
1111
challenges. It is important for organizations not only to have a good
@@ -40,9 +40,9 @@ An API has a "<ins>data flow blindspot</ins>" if:
4040
* There is not deep visibility of which type of sensitive data is shared
4141

4242

43-
## Example Attack Scenarios
43+
## Exemplos de Cenários de Ataque
4444

45-
### Scenario #1
45+
### Cenário #1
4646

4747
A social network implemented a rate-limiting mechanism that blocks attackers
4848
from using brute force to guess reset password tokens. This mechanism wasn't
@@ -53,7 +53,7 @@ API, including the reset password mechanism, but the rate-limiting mechanism was
5353
not in place. The researcher was able to reset the password of any user by using
5454
simple brute force to guess the 6 digit token.
5555

56-
### Scenario #2
56+
### Cenário #2
5757

5858
A social network allows developers of independent apps to integrate with it. As
5959
part of this process a consent is requested from the end user, so the social
@@ -68,7 +68,7 @@ A consulting firm builds a malicious app and manages to get the consent of
6868
to the private information of 50,000,000 users. Later, the consulting firm
6969
sells the information for malicious purposes.
7070

71-
## How To Prevent
71+
## Como Prevenir
7272

7373
* Inventory all <ins>API hosts</ins> and document important aspects of each one
7474
of them, focusing on the API environment (e.g. production, staging, test,
@@ -96,9 +96,9 @@ sells the information for malicious purposes.
9696
quickly and force all clients to move to the latest version.
9797

9898

99-
## References
99+
## Referências
100100

101-
### External
101+
### Externas
102102

103103
* [CWE-1059: Incomplete Documentation][1]
104104

0 commit comments

Comments
 (0)