Documentation
  • 🍻Intro
    • Why API Security is Critical?
    • Pynt at a Glance
    • Who Should Use Pynt?
  • 👩‍💻API Security Testing
    • Security Testing Overview
    • Prerequisites for Running Pynt Scans
    • How to Install Pynt CLI
    • How to install Pynt Binary (Linux only)
    • Pynt CLI Modes
      • 🔵Pynt Command CLI Mode
      • 🔵Pynt Listen CLI Mode
    • Pynt Security Tests Coverage
      • Business Logic Tests
      • Injection Tests
      • Authentication Bypass Tests
      • Mass Assignment Tests
      • Server-Side Request Forgery Tests
      • Stack Trace In Response
      • Lack of Resources and Rate Limiting
      • File Path Manipulation
      • GraphQL Introspection Vulnerability
      • GraphQL Alias Overloading
      • LLM APIs Vulnerabilities
      • Insecure Transport Scheme
      • Basic Authentication
      • HTTP Desynchronization (Desync) Attack
    • Sensitive Data Exposure Detection
    • Pynt Scans Troubleshooting
      • Pynt CLI Troubleshooting
      • Pynt for Postman Troubleshooting
        • Troubleshoot Pynt Container not Running Error
        • Troubleshoot Empty API Key Error
        • Troubleshoot Unauthorized API Key Error
        • Troubleshoot Collection Not Found Error
        • Troubleshoot Non-Unique Collection Name Error
        • Troubleshoot Empty Collection Identifier Error
        • Troubleshoot Unreachable Target Error
        • Troubleshoot Target Responds with Errors Error
        • Troubleshoot Unresolved Target Domain Error
        • Troubleshoot Unresolved Variable Error
        • Troubleshoot TLS Handshake Fail Error
        • Troubleshoot Few Requests Error
        • Troubleshoot One User Only Error
        • Troubleshoot Failed Assertions Error
    • How To
      • How to Run Business Logic Tests with Pynt
      • How to associate a Pynt scan to an Application in Pynt Dashboard
      • How to tag a scan in Pynt
    • Benchmarks
      • Pynt vs OWASP crAPI
  • 🤲Security Testing Integrations
    • 🟠Pynt with API Testing Tools
      • 🔘Pynt for Postman
        • Fork Pynt Collection
        • Run Pynt Container
        • Run Pynt in Postman
        • View Scan Results in Postman
      • 🔘Pynt for Insomnia
      • 🔘Pynt for ReadyAPI
    • 🟠Pynt with API Testing CLIs
      • 🔘Pynt for Newman (Postman CLI)
      • 🔘Pynt for TestRunner (ReadyAPI CLI)
    • 🟠Pynt with Testing Frameworks
      • 🔘Pynt for .NET (xUnit)
      • 🔘Pynt for Selenium
      • 🔘Pynt for Rest Assured
      • 🔘Pynt for Jest
      • 🔘Pynt for pytest
      • 🔘Pynt for Go
      • 🔘Pynt for JMeter
    • 🟠Pynt on CI/CD
      • ❗How to get Pynt ID for CI/CD Authentication
      • 🔘Pynt for GitHub Actions
      • 🔘Pynt for Azure DevOps Pipelines
      • 🔘Pynt for GitLab
      • 🔘Pynt for Jenkins
    • 🟠Pynt with Burp Suite
    • 🟠Pynt with Browsers
      • 🔘Pynt for Firefox Browser
    • 🟠Live Traffic Connectors
      • 🔘eBPF
        • 🔘Key Components
      • 🔘Traffic Mirroring
    • 🟠Advanced Pynt Examples
      • 🔘Pynt as a Standalone Container
      • 🔘Pynt with Prerecorded Har Files
      • 🔘Pynt with cURL
  • 🈸Applications View
    • Application View Overview
    • Manage Applications
      • Add Application
      • Delete Application
      • Rename Application
    • Manage Sources for API Discovery
      • Add Source
      • Delete Source
      • View Source Info
      • Source Categories
        • API Documentation
          • Swagger
          • Postman Collection
        • API Gateways
          • AWS API Gateway
          • Azure API Gateway
          • Kong API Gateway
          • GCP API Gateway
          • Gravitee API Gateway
        • Testing (API Security Scans)
        • Live Traffic
          • Data Collection with eBPF
          • ALB Traffic Capture with AWS Traffic Mirroring
        • Code Repository
    • Application Dashboard
    • Generate Pentest Report
  • 📚API Catalog
    • API Catalog Overview
    • Navigate API Catalog
      • Filtering API Catalog by Application
      • API Catalog Customization
      • API Related Info
      • APIs at Risk
    • Manage API Source Gaps
      • New APIs
      • Untested APIs
      • Shadow APIs
      • Undocumented APIs
    • View Detailed Endpoint Info
  • ⏪Scan History
    • Scan History Overview
    • Navigate Scan History
      • Associating Scans with Specific Application
      • Filtering by Application
      • Scan Related Info
      • Scan History Customization
    • View Detailed Scan Info
    • Associate Vulnerabilities to Tickets with JIRA
  • Account Management
    • Single Sign-On (SSO)
      • Setting up Okta
      • Setting up Entra ID
Powered by GitBook
On this page
  • Introduction
  • What are the common mistakes made by developers?
  • How can I fix file path manipulation issues?
  • Test cases in this category
  1. API Security Testing
  2. Pynt Security Tests Coverage

Insecure Transport Scheme

Explore Pynt's documentation on insecure transport scheme vulnerabilities! Understand how Pynt safeguards against unsecured communication protocols, ensuring robust security for your APIs.

At a Glance: 🔓 Insecure Transport Scheme vulnerabilities occur when an API or service communicates over unsecured protocols like HTTP instead of enforcing secure alternatives like HTTPS. This vulnerability allows sensitive data to be transmitted in an unencrypted format, making it susceptible to interception, tampering, and eavesdropping. To prevent this, always enforce secure protocols for all communications to protect data integrity and confidentiality.


Introduction

An insecure scheme vulnerability arises when a cloud application, web application or API uses unsecured communication protocols, such as HTTP, which do not encrypt data transmitted between the client and the server. This lack of encryption means that any data sent over the network—including sensitive information like authentication tokens, personal data, and API keys—can be intercepted and read by malicious actors.

Insecure schemes not only compromise confidentiality but also the integrity of the data. Attackers can perform man-in-the-middle attacks, intercepting communications between the client and server to modify or inject malicious content. This can lead to unauthorized access, data breaches, and other security incidents.

What are the common mistakes made by developers?

  1. Not Enforcing HTTPS:

    Failing to enforce the use of HTTPS, allowing clients to connect over unsecured HTTP by default.

  2. Mixed Content:

    Including resources (like scripts, images, or stylesheets) over HTTP in an HTTPS page, leading to mixed content vulnerabilities.

  3. Lack of HTTP Strict Transport Security (HSTS):

    Not implementing HSTS headers to enforce HTTPS connections, allowing attackers to downgrade connections to HTTP.

  4. Using Outdated Protocols and Cipher Suites:

    Employing outdated encryption protocols like SSLv2, SSLv3, or weak cipher suites that are vulnerable to attacks.

How can I fix file path manipulation issues?

Enforce HTTPS:

  • Redirect HTTP to HTTPS:

    • Configure your server to automatically redirect all HTTP requests to HTTPS.

Secure Resource Loading:

  • Use HTTPS for All Resources:

    • Ensure that all resources (images, scripts, stylesheets) are loaded over HTTPS to prevent mixed content warnings and vulnerabilities.

  • Avoid Protocol-Relative URLs:

    • Use absolute HTTPS URLs instead of //example.com/resource.js.

Implement HSTS (HTTP Strict Transport Security):

  • Add HSTS Headers:

    • Include the Strict-Transport-Security header in your server responses to enforce HTTPS connections for all future requests.

  • Preload HSTS:

    • Submit your domain to HSTS preload lists used by browsers for added security.

Proper Certificate Management:

  • Use Valid SSL/TLS Certificates:

    • Obtain certificates from trusted Certificate Authorities (CAs).

  • Regular Renewal:

    • Monitor certificate expiration dates and renew them timely.

Disable Insecure Protocols and Cipher Suites:

  • Update Server Configuration:

    • Disable outdated protocols like SSLv2, SSLv3, and TLS 1.0.

  • Enable Strong Cipher Suites:

    • Use modern cipher suites that support forward secrecy.

Test cases in this category

This test case queries excessive number of elements:

Test case
OWASP
CWE

[TLS001] Insecure transport scheme

PreviousLLM APIs VulnerabilitiesNextBasic Authentication

Last updated 7 months ago

, , ,

👩‍💻
A02 Cryptographic Failures
CWE-319
CWE-523
CWE-720
CWE-818