{
"templates": [
{
"createdAt": 1751743962,
"author": "AKTO",
"id": "IPCIDRAlertFilter",
"content": "id: High4XXAlertFilter\nfilter:\n response_code:\n gte: 400\n lt: 500\n\ninfo:\n name: \"High4XXAlertFilter\"\n description: \"The High4XXAlertFilter vulnerability in API threat protection at runtime occurs when security systems generate excessive alerts for 4XX response codes, potentially leading to alert fatigue and missed critical threats. Attackers can exploit this by flooding APIs with benign 4XX errors, masking real attacks in the noise. Proper rate limiting, anomaly detection, and intelligent alert filtering can help mitigate this risk.\"\n details: \"The High4XXAlertFilter vulnerability affects API threat protection by overwhelming monitoring systems with excessive 4XX errors, making it harder to detect real threats. Attackers can abuse this by triggering numerous client-side errors (e.g., 401, 403, 404) to drown out malicious activity. Effective mitigation involves adaptive alerting, contextual analysis, and filtering noise from genuine security incidents.\"\n impact: \"The High4XXAlertFilter vulnerability can lead to alert fatigue, causing security teams to overlook real threats hidden within a flood of 4XX errors. This increases the risk of undetected attacks, such as credential stuffing, API enumeration, or token abuse. It can also degrade API performance and overwhelm logging systems, impacting overall security visibility.\"\n category:\n name: \"RL\"\n displayName: \"RL\"\n subCategory: \"RL\"\n severity: MEDIUM\n\naggregation_rules:\n - rule:\n name: \"Rule 1\"\n condition:\n matchCount: 50 \n windowThreshold: 5\n - rule:\n name: \"Rule 2\"\n condition:\n matchCount: 100 \n windowThreshold: 10\n\n",
"info": {
"severity": "HIGH",
"subCategory": "NOSQL_INJECTION",
"references": "null",
"impact": "Exploiting security misconfigurations can lead to unauthorized access, data breaches, or full system compromise. Attackers may gain access to sensitive data, escalate privileges, or disrupt operations, causing financial loss, reputational damage, or regulatory penalties.",
"description": "The High4XXAlertFilter vulnerability in API threat protection at runtime occurs when security systems generate excessive alerts for 4XX response codes, potentially leading to alert fatigue and missed critical threats. Attackers can exploit this by flooding APIs with benign 4XX errors, masking real attacks in the noise. Proper rate limiting, anomaly detection, and intelligent alert filtering can help mitigate this risk.",
"tags": "null",
"cwe": "null",
"remediation": "null",
"cve": "null",
"compliance": "null",
"name": "IPCIDRAlertFilter",
"details": "XSS in API threat protection at runtime focuses on detecting and preventing malicious script injections in API requests and responses. Attackers exploit insufficient input validation to execute scripts, leading to data leaks or account compromise. Mitigation involves sanitizing inputs, enforcing strict content security policies, and using runtime monitoring to detect anomalies and block malicious payloads.",
"category": {
"displayName": "NOSQL_INJECTION",
"name": "NOSQL_INJECTION",
"shortName": "null"
}
},
"updatedAt": 1751743962
}
],
"content": "null"
}