GraphQL field suggestions provide auto-complete suggestions for available fields, enabling attackers to gain insights into data structures, potentially leading to data exposure and targeted attacks on the API.
Security Misconfiguration (SM)
How this template works
APIs Selection
The template uses a regular expression filter to select APIs with URLs containing the word "graphql". This ensures that only relevant APIs are targeted for the security test.
Execute request
The template executes a single request by modifying the URL to include "graphql" and replaces the request body with a GraphQL introspection query. This query retrieves schema details from the API.
Validation
The template validates the response payload to check if it contains either the phrases "Did you mean" or "Expected value of type". If either of these phrases is present, it indicates a potential security misconfiguration in the GraphQL implementation.
Frequently asked questions
Explore other tests
eSMTP - Config Discovery
Nginx - Git Configuration Exposure
Laravel - Sensitive Information Disclosure
Docker Container - Misconfiguration Exposure
Msmtp - Config Exposure
Parameters.yml - File Discovery
Mongo Express - Unauthenticated Access
Apache Airflow Configuration Exposure
Dockerrun AWS Configuration Exposure
Apache Config file disclosure
Appspec Yml Disclosure
CGI script environment variable