APIs at Risk
Pynt's system automatically assigns risk score for each endpoint, the risk scoring is calculated based on the likelihood and impact of the detected vulnerabilities, using the below matrix.
Likelihood
The likelihood of occurrence is determined through a systematic evaluation of the potential that a threat actor can successfully exploit a specific vulnerability or a combination thereof.
Impact
The Impact score for a threat signifies the potential extent of harm resulting from the exploitation of a detected vulnerability. This includes unauthorized information disclosure, unauthorized information alteration, unauthorized information destruction, or the loss of both information and information system availability.
The below table shows the impact and likelihood assigned for each of the vulnerabilities category*
Category | Impact | Likelihood |
---|---|---|
Business Logic | 2 | 4 |
Injections | 4 | 4 |
Authentication bypass | 2 | 4 |
Mass Assignment | 2 | 1 |
Server-Side request forgery | 3 | 3 |
Stack trace in response | 2 | 1 |
Lack of Resources and Rate Limiting | 2 | 4 |
File path manipulation | 3 | 3 |
When the endpoint processes Personally Identifiable Information (PII), it amplifies the impact score of the vulnerabilities.
The presence of multiple vulnerabilities within a single endpoint can elevate the impact, such as when Broken Object Level Authorization (BOLA) and insufficient rate limiting co-occur, leading to the highest impact score. In other cases the maximum score in applied
Should our system lack sufficient details regarding the endpoint, such as absent documentation and tests not executed on the endpoint, the risk will be indicated as N/A.
Risk Matrix
Each finding's risk level is determined from four possible categories: Critical, High, Medium, or Low risk level. This determination was made by assessing the potential impact magnitude and the likelihood of exposure exploitation, with reference to the provided table.
![](https://cdn.statically.io/img/docs.pynt.io/~gitbook/image?url=https%3A%2F%2F3462681674-files.gitbook.io%2F%7E%2Ffiles%2Fv0%2Fb%2Fgitbook-x-prod.appspot.com%2Fo%2Fspaces%252FZKwBF6q0tAGXlIih38HL%252Fuploads%252FqFZjoeLWOljMijJuTNq5%252FRisk_Calc_Table.png%3Falt%3Dmedia%26token%3Dc35d3523-bf00-4193-a770-0de421af3f76&width=768&dpr=4&quality=100&sign=399fb725&sv=1)
Open API/Swagger based risk calculation
When risk is assessed using API documentation only, it is determined as follows:
Likelihood:
Likelihood is derived from factors such as the attack surface (e.g., parameter count), authentication methods or their absence and parameter types
The likelihood score is calculated based on the attack surface (e.g. number of parameters), the authentication method or lack there of and the type of the handled parameters
Impact: The impact score is calculated based on the endpoint's sensitivity, such as its handling of PII
Last updated