Introspection is enabled

firetail:graphql-introspection

Type:

Observation

Rule Severity:

High

The GraphQL endpoint is configured to allow introspection queries.

This enables clients to explore the API's schema, including its types, fields, and relationships.

While this is useful during development, it poses a security risk in production environments as it exposes sensitive schema details to potential attackers.

Remediation

Ensure that the GraphQL API does not allow introspection.

Example Attack Scenario

An attacker sends an introspection query to the production GraphQL API to retrieve the full schema. By analyzing the schema, the attacker can identify sensitive fields, types, and queries they might not have known about otherwise. This information can be used to craft targeted attacks, such as accessing unauthorized data or exploiting weaknesses in the API.

How to Identify with Example Scenario

How to Resolve with Example Scenario

How to Identify with Example Scenario

Find the text in bold to identify issues such as these in API specifications

How to Resolve with Example Scenario

Modify the text in bold to resolve issues such as these in API specifications
References:

More findings

All Findings