Understanding Common API Vulnerabilities
Now that we understand how APIs are constructed, we will turn our attention to the core topic of this book—API security. In this chapter, we will focus on the different types of vulnerabilities that can adversely impact API security, gaining an understanding of the underlying cause, the impact, and the recommended prevention or mitigation for each.
In this chapter, we’re going to cover the following main topics:
- The importance of vulnerability classification
- The Open Worldwide Application Security Project API Security Top 10 vulnerabilities
- Vulnerabilities versus abuse cases
- Business logic vulnerabilities