Skip to content

Commit 03f8faa

Browse files
authored
New Scenario for a7-security-misconfiguration
I have added new Scenario based on the description of the A7. Please disregard the closed PR initially made to master branch
1 parent a80ff27 commit 03f8faa

File tree

1 file changed

+30
-0
lines changed

1 file changed

+30
-0
lines changed

2023/en/src/0xa7-security-misconfiguration.md

+30
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,36 @@ header, private conversations end-up cached by the web browser, allowing
6161
malicious actors to retrieve them from the browser cache files in the
6262
filesystem.
6363

64+
### Scenario #3
65+
66+
An e-commerce application does not restrict access to its `dev` node on firewall resulting in verbose response from API. Attacker might be able to get access to sensitive information on the product through the verbose response received from the `dev` node.
67+
68+
```
69+
GET /api/product?id=1234
70+
Host: e-commerce.com
71+
72+
Response:
73+
{
74+
"product_id":1234,
75+
"product_price":"$100",
76+
"product_seller":"ABC"
77+
}
78+
```
79+
80+
```
81+
GET /api/product?id=1234
82+
Host: dev.e-commerce.com
83+
84+
Response:
85+
86+
{
87+
"product_id":1234,
88+
"product_price":"$100",
89+
"product_discount":"$50",
90+
"product_next_discount_date":"01/04/2023",
91+
"product_seller":"ABC"
92+
}
93+
```
6494
## How To Prevent
6595

6696
The API life cycle should include

0 commit comments

Comments
 (0)