Unsafe API Consumption

circle-info

Unsafe API Consumption occurs when an application or service interacts with APIs in a way that exposes it to vulnerabilities, such as not validating inputs or failing to handle sensitive data securely.

triangle-exclamation
circle-check

The below example is based on HTB's API Attacksarrow-up-right module.

This flaw is present when an API consumes another API in an insecure manner, for instance, a 3rd party endpoint vulnerable to Excessive Data Exposure (Figure 1).

Figure 1: A vulnerable 3rd party endpoint.

Last updated

Was this helpful?