Introduction

API3:2019 Excessive Data Exposure

What is Excessive Data Exposure?

An API is only supposed to return the required data to the front-end clients but sometimes developers will make a mistake or take the easy route and implement generic API's that return all data to the client. When these API's return too much data, we can speak of Excessive Data Exposure.

Example Attack Scenarios

A simple example we can give is an application which makes a call to grab the credit card details. The user does not see the CCV because it will be filtered out by the front-end client but the API still returns too much data.

Example:

GET /api/v1/cards?id=0

[
  {
    "CVV": "677", 
    "creditCard": "1234567901234", 
    "id": 0, 
    "user": "API", 
    "validUntil": "1992"
  }
]

As you can see here, we made the call to grab the credit card details and while the end user might not be able to see the CVV but since the API returns it, we are speaking of Excessive Data Expsoure.

Let's add another example to make things more clear. In this scenario we have a mobile application that sends a request to /api/articles/{articleId}/comments/{commentId} and gets metadata about the comment as well, including the author. However when the attacker is sniffing the data, he can also see PII data from the author.

GET /api/articles/5/comments/0

[
  {
    "comment": "1234567901234", 
    "id": 0, 
    "user": "testUser", 
    "user address": "testlane, testing - 340043 testing in testland", 
    "user email": "[email protected]"
  }
]

Preventive Measures Against Excessive Data Exposure

Conclusion