Links
Comment on page

Test roles

If you have role-based access control in your APIs and application, you would want to test for privilege escalation vulnerabilities. This typically involves checking access of all the higher-privilege APIs by a lower-privilege user. If any such API exists, then it's privilege should be fixed by the development team.
Akto enables you to do automate privilege escalation security tests. You can also use the information while creating Test YAML templates if you want to develop custom tests.

Testing for Privilege Escalation using Akto

  1. 1.
    Set up all your application roles in Akto along with the auth token for each role (hardcoded or automated). Explained here
  2. 2.
    For each role, find all the APIs that are accessible by that role. Explained here
  3. 3.
    Setup automated test to check if any API exclusive to a higher-privilege role can be accessed by a lower-privilege role. Explained here
The instructions here cover the above 3 steps in detail.

Configure application roles

You should create as many roles as are in your application. For example, if you are a B2B Saas app, you might have ADMIN, BILLING, MEMBER, GUEST etc. roles. Role creation is a one-time configuration.

Create role

  1. 1.
    In the left navigation menu, go to Testing and then click on Roles tab.
  2. 2.
    Click on the plus-icon to add a new role.
  3. 3.
    Give a suitable name to your role eg. ADMIN. Select the APIs that belong to the application. If you want to select from an existing API Collection, use belongs to operator.
  4. 4.
    Select API Collection from the dropdown menu.
  5. 5.
    Select endpoints you'd want to evaluate. You can simply select all. And click on Save button.

Add hard-coded auth token for the role

During API testing, Akto will add these headers to the sample API calls to check if the role has access to the API. You can provide a hardcoded auth header or you can also automate fetching auth token automatically (next section) for the role.
  1. 1.
    Click on the Add auth button to add auth-token for your role. Then click on the plus icon to add auth headers for the role
  2. 2.
    Add your auth header key and its value as shown.
  3. 3.
    You can add multiple headers too. Click on the plus icon to add more headers for this role. Click on Save when you are done.

Automate auth token for the role

If you configure automated auth token generation, Akto will run the Login-request sequence before the test starts and fetch the auth token. You should know which API (or sequence of APIs) can give you the auth token in the response. For this example, we will configure a Login-request sequence of 2 APIs. The response of the 2nd API contains the auth token.
  1. 1.
    If you want to automate auth token generation you can select Login-request radio button. And click on Create button.
  2. 2.
    You will see a dialog box where you can configure the sequence to fetch auth token automatically.
  3. 3.
    You can set URL, Query params, Method, Headers and Body for your request. Click on the edit button on each field to set it. Once you enter the required value, click on the check icon at the end of the line to save the field.
  4. 4.
    Here, we have configured the first API call to create a user with a given email and password. You can choose to skip this api call in your case if you already have a user created with this role.
  5. 5.
    Click on the Test button to see the result of this API call.
  6. 6.
    If you have configured the API call correctly, you should see the desired response. In this case, we see the API responds with success.
  7. 7.
    To add another API call to the login sequence, click on the Add step button. You can multiple steps for the login sequence. If you want to remove a step, click on Remove step button on the top-right.
  8. 8.
    Let's configure the 2nd API call in the login sequence. Note that the email and password field should be the same as previous API call. In the sequence, you can substitute values from requests & responses of previous API calls. You can refer to the first API call as x1. You can access request or response. In request, you can access url, method, body, headers fields. For response, you can access body and headers field. Remember to use ${} while referring to any of API variables. For example, to get email from the request body of the first API call, we can say ${x1.request.body.email}. Similarly we can access password field using ${x1.request.body.password}
  9. 9.
    Click on the Test button to check for the response. Here, we successfully get the auth token in the response body. Click on Extract button to start extracting token from this API response.
  1. 10.
    Under "Header value" mention how to extract the auth token from the API response. In this example we can say ${x2.response.body.authentication.token}. Mention the "Header key" under which Auth token will be attached as part of the API request while testing. eg. Authorization. Click on Done button.
  2. 11.
    If the auth token is supposed to be attached in the request body, you can select Body in the step above.
  3. 12.
    Don't forget to Save the automated login sequence in the role.

If your sample requests come from diff accounts

Akto will replay the API requests which it recorded in your application server traffic. In your setup, it might be possible that there are multiple accounts being used on your staging app, hence Akto will record API calls from multiple accounts. In these cases, just 1 auth token per role might not suffice. You might want to configure 1 auth token for each account. When Akto tries to replay the recorded sample API call, it can pick up the auth token meant for the same account as the API request to check for role-access.
  1. 1.
    If account id comes as a simple header field, you can click on the Analyze tab to find out possible values of any header that Akto has captured.
  2. 2.
    For example, we can find out how many diff values has Akto recorded with CompanyId header. We see only 3 "CompanyId" values. Note that the analysis comes from saved requests only. Akto doesn't save all API traffic it processes. It saves only a few requests.
  3. 3.
    We should configure an "auth" token for each such company. We can use Api Header conditions for this. Mention "CompanyId" as header key and "1234567" as header value. Akto will use this token while testing for sample API requests whose CompanyId in the headers equals "1234567". We should configure 2 more auths for remaining 2 companies for complete coverage.

Create access matrix

Once tokens are set up, the next step is to hit all the recorded APIs with tokens from each role. This way, Akto maintains a table for each role for each API - if the role can access that API. We call this Access matrix.
  1. 1.
    Click on the Access tab
  2. 2.
    Click on Create access matrix button
  3. 3.
    Currently, access-matrix job runs once per hour. You might have to wait for an hour to see the results. You don't have to click on "Create access matrix" button for other roles one-by-one. Akto will create access matrix for all roles together. In this example of Juiceshop, ADMIN can access 52 APIs, but MEMBER can access 43. There are 9 APIs exclusive to Admin.
  4. 4.
    Akto will run this task daily.
You should periodically review the access matrix. Specially when any associations change.

Create test template

You can use this information in test YAML templates too. You can filter APIs exclusive to the ADMIN role (9 APIs in this example). You can also get the auth token for any role in the template.
Say we want to create a custom YAML test that should run on the Admin-exclusive APIs using Member token. If any API returns 2XX response, we will send an alert.

Filter Admin-exclusive APIs

This is a combination of 2 conditions - The API should accessible by ADMIN, and, the API should NOT be accessible by MEMBER.
  • include_roles_access - You can use this filter to include all the APIs accessible by a particular role. eg. here we can use it as -
include_roles_access:
param: ADMIN
  • exclude_roles_access - You can use this filter to exclude all the APIs accessible by a particular role. eg. here we can use it as -
exclude_roles_access:
param: MEMBER
You api_selection_filters section can then look like the following -
api_selection_filters:
response_code:
gte: 200
lt: 300
include_roles_access:
param: ADMIN
exclude_roles_access:
param: MEMBER

Use auth token from the role

You can use the auth token from any role in your test template. In our example, we would want to get the token of the MEMBER role. We can use modify_header rule. We can pass ${roles_access_context.MEMBER}: 1 as its value which will obtain an auth token of MEMBER role and replace in the API call while testing.
Your execute section will then look like -
execute:
type: single
requests:
- req:
- modify_header:
${roles_access_context.MEMBER}: 1
You can save this test template with name & id as "PRIVILEGE_ESCALATION_TEST" and have it part of your CI/CD pipeline. Now no API goes without being tested for privilege escalation!