How did my quick fix expose our admin API to the public?

0
6
Asked By CuriousCat77 On

I pushed a 'quick fix' at 5 PM to update an endpoint timeout before the weekend. I changed the ingress configuration, ran my tests, and went home, feeling confident everything was fine. However, come Monday morning, I noticed our AWS bill had tripled, along with a strange spike in traffic. I discovered that my fix had inadvertently made the admin API accessible to the entire internet! Bots had been hammering various endpoints all weekend.

We had run a security scanner the previous week, but it didn't catch this issue because it only evaluated the code itself and missed my ingress change that effectively put a 'hack me' sign on our API. Now, I'm going through every service manually to check for any other potential exposures. What tools are out there that could actually identify these runtime issues rather than just scanning configuration files?

1 Answer

Answered By TechieTribe88 On

This sounds like a complex issue! Your ingress settings might have been way too open, or there could be other configuration problems like TLS issues. If you're in a secure environment, there could also be security context concerns. It's really crucial to provide more details about what exactly was changed because this is a significant problem that allowed insecure configurations to slip through.

SharpAnalyst22 -

There's definitely a lot to unpack here. If you can pinpoint the exact changes, it might help clarify how this happened.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.