AppSync introspection endpoint enabled

firetail:aws-appsync-introspection-enabled

Type:

CSPM

Rule Severity:

High

The AppSync GraphQL API has introspection enabled.

With introspection enabled, unauthorized users could gain valuable insights into the API's schema, leading to an increased risk of attacks such as unauthorized access, data exposure, or malicious API manipulation. This weakens the security of the AppSync API, potentially exposing sensitive backend services and data to exploitation.

Remediation

Disable introspection on the AppSync GraphQL API to prevent unauthorized users from accessing schema details and reduce the risk of exploitation.

Example Attack Scenario

An attacker could leverage the introspection feature to query the AppSync GraphQL schema, revealing detailed information about the API's underlying data models and relationships. Armed with this knowledge, they might craft specific queries to access unauthorized data or manipulate API operations. For instance, if sensitive user data is exposed through the API's schema, the attacker could potentially query for private information without authorization, leading to data leaks or breaches. By disabling introspection, this attack vector is eliminated, safeguarding the API and its data.

How to Identify with Example Scenario

How to Resolve with Example Scenario

How to Identify with Example Scenario

Find the text in bold to identify issues such as these in API specifications

How to Resolve with Example Scenario

Modify the text in bold to resolve issues such as these in API specifications
References:

More findings

All Findings