Slide 58
Slide 58 text
API = Always Poorly Implemented
API Call Capabilities
/api/parent-toy-interface/getToys?customerId=%s Retrieve any chosen customer’s toy details, e.g. profileID, toyID, toyName, toyType
/api/customer-get-profiles Retrieve any chosen child’s profile details, e.g. birthday, name, gender & deviceID
/api/get-parent-online-status?deviceID= Determine if any chosen toy’s owner (parent) is actively using the mobile application
/api/get-toy-online-status?token=%s&deviceID=%s Determine if any chosen toy is currently connected & active
/api/customer-edit-profile Alter any chosen child’s birthday, name, and gender
/api/parent-toy-interface/updateToys Alter any chosen toy’s assignment to any chosen child’s profile (i.e. hijack the toy)
/api/customer-create-profile Create a custom profile that is associated to any chosen customer account
/api/customer-delete-profile Delete a profile that is associated to any chosen customer account
Important API Calls Found to Be Vulnerable
✦ 12 mobile-API calls were determined to not properly authorize that
the requesting session was appropriate to create, read, update,
and/or delete aspects of customer accounts, profiles, and toys
✦ Outcome? Information leaks, toy hijacking, and account alteration