name | severity | cvss-score | cvss-vector | cwe-id | cwe-name | compliance | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GraphQL Introspection enabled |
low |
5.3 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
200 |
Information Exposure |
|
GraphQL is an alternative to REST APIs, providing a query and manipulation language to the application dataset. GraphQL Introspection is a feature that allows querying all the details of the supported API schema. An attacker can use it to obtain all the API's queries, types, fields, and directives, which in turn, can be abused to retrieve potentially sensitive information or to deliver injection attacks on the API endpoints. The more attack surface an attacker has access to, the more likely it is to find a vulnerability.
{% tabs graphql-introspection-enabled %} {% tab graphql-introspection-enabled generic %} The safest solution is to disable GraphQL Introspection. However, you can also leave Introspection enabled based on context information such as the environment or the requesting user or role. Please consult your GraphQL framework documentation for the correct way to disable it, or restrict access. {% endtab %}
{% endtabs %}