Web services vulnerabilities expose APIs, communication protocols, and data to exploitation
These vulnerabilities highlight risks in web service design, data handling, and protocol implementation.
WS Information Gathering
Metadata exposure: WSDL files or API documentation leak internal endpoints, methods, or authentication details.
Service enumeration: Attackers identify exposed services (e.g., SOAP/REST) through port scanning or DNS queries.
WSDL Weakness
Insecure bindings: SOAP endpoints configured over HTTP (no encryption) allow eavesdropping.
Sensitive data disclosure: WSDL files reveal backend systems, parameter types, or deprecated methods.
Weak XML Structure
Malformed XML payloads: Invalid tags, oversized elements, or schema violations crash parsers (DoS).
Schema poisoning: Manipulating XML schemas to bypass validation checks.
XML Content-Level Vulnerabilities
XXE (XML External Entity): Malicious entities enable file retrieval, SSRF, or internal network access.
Data injection: Tampering with XML values (e.g., `admin`) to escalate privileges or bypass logic.
WS HTTP GET Parameters/REST
Sensitive data in URLs: GET requests expose credentials, tokens, or PII in logs or browser history.
Insecure REST endpoints: Unauthenticated access to resources (e.g., `/api/users`) or excessive data exposure.
WS Naughty SOAP Attachments
Malware delivery: Attachments containing malicious scripts or executables.
Resource exhaustion: Oversized files (e.g., 10GB payloads) overwhelm server memory/disk space.
WS Replay Attacks
Request reuse: Captured authenticated SOAP/REST requests are replayed to impersonate users.
Session hijacking: Valid tokens or cookies reused to bypass authentication.