3
Understanding Common API Vulnerabilities
Now that we understand how APIs are constructed, we will turn our attention to the core topic of this book—API security. In this chapter, we will focus on the different types of vulnerabilities that can adversely impact API security, gaining an understanding of the underlying cause, the impact, and the recommended prevention or mitigation for each.
In this chapter, we’re going to cover the following main topics:
- The importance of vulnerability classification
- The Open Worldwide Application Security Project API Security Top 10 vulnerabilities
- Vulnerabilities versus abuse cases
- Business logic vulnerabilities
The importance of vulnerability classification
Security researchers have long understood the ...
Get Defending APIs now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.