The document describes several vulnerabilities found in APIs, including an undocumented Amplify API that could leak AWS account IDs, bypassing email verification by manipulating API parameters, and unauthenticated GraphQL introspection and API calls exposing sensitive data. Other API issues discussed include hardcoded API keys, lack of authorization validation on GraphQL tokens, and bypassing payment restrictions through flawed logic.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
219 views21 pages
BBH API Dataset
The document describes several vulnerabilities found in APIs, including an undocumented Amplify API that could leak AWS account IDs, bypassing email verification by manipulating API parameters, and unauthenticated GraphQL introspection and API calls exposing sensitive data. Other API issues discussed include hardcoded API keys, lack of authorization validation on GraphQL tokens, and bypassing payment restrictions through flawed logic.