Skip to content

Commit 207796e

Browse files
committed
chore(API4:2023): Review heading table contents
1 parent 48e412e commit 207796e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

2023/en/src/0xa4-unrestricted-resource-consumption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ API4:2023 Unrestricted Resource Consumption
44
| Threat agents/Attack vectors | Security Weakness | Impacts |
55
| - | - | - |
66
| API Specific : Exploitability **2** | Prevalence **3** : Detectability **3** | Technical **2** : Business Specific |
7-
| Exploitation requires simple API requests. Multiple concurrent requests can be performed from a single local computer or by using cloud computing resources. | It's common to find APIs that do not limit client interactions or resource consumptions. Although most of the time interactions are logged, due to the lack of monitoring, or improper monitoring, malicious activity passes unnoticed. | Exploitation can lead to DoS due to resource starvation, but it can also impact service providers' billing. |
7+
| Exploitation requires simple API requests. Multiple concurrent requests can be performed from a single local computer or by using cloud computing resources. Most of the automated tools available are designed to cause DoS via high loads of traffic, impacting APIs' service rate. | It's common to find APIs that do not limit client interactions or resource consumptions. Crafted API requests, such as those including parameters that control the number of resource to be returned and performing response status/time/length analysis should allow to identify the issue. The same is valid of batched operations. Although threat agents don't have visibility over costs impact, this can be inferred based on service providers (e.g. cloud provider) business/pricing model. | Exploitation can lead to DoS due to resource starvation, but it can also lead to operational costs increase such as those related to the infrastructure due to higher CPU demand, increasing cloud storage needs, etc. |
88

99
## Is the API Vulnerable?
1010

0 commit comments

Comments
 (0)