Member-only story

Learning and Testing for GraphQL Vulnerabilities — Part 2

Gupta Bless
5 min readAug 19, 2023

--

Introduction

In previous articles, we have discussed the significance of GraphQL in contemporary architecture. Therefore, we cannot deny that attackers are targeted it excessively to obtain the information. Consequently, I will discuss a few potential GraphQL hazards in this article. If you have not read my previous blog post on GraphQL, kindly click on the link provided and read the information there.

https://gupta-bless.medium.com/learning-and-testing-for-graphql-vulnerabilities-3efa9b5064f9

Data exposure or continual data leaks

Source

If our Graph QL queries are not properly secured or inadequately configured, then any unauthorized user or attacker can access sensitive or confidential data; this is known as data exposure or data leakage. There is a possibility that the user has normal user access rights, but if he has access to administrative data, this is also a data exposure vulnerability. By utilizing GraphQL APIs, clients can specify how much data they wish to extract in a single query; however, if these APIs are not properly controlled, this functionality can lead to…

--

--

Gupta Bless
Gupta Bless

Written by Gupta Bless

Security enthusiast working to secure web for others.

No responses yet