API Security Weekly: Issue 160

This week, we have a vulnerability in the AWS API gateway that allows a potential cache-poisoning attack, disclosed at the recent BlackHat Europe conference, a guide on how to harden Kubernetes API access, a report from Forbes on the need to take API security more seriously, and predictions on what's possible on the next OWASP API security Top 10.

Vulnerability: AWS API Gateway Vulnerable to HTTP Header-Smuggling Attack

At the recent BlackHat Europe security conference, web security researcher Daniel Thatcher disclosed vulnerabilities relating to the AWS API gateway that allowed HTTP header smuggling. Currently, AWS has not responded to this research nor offered a comment regarding the potential vulnerabilities in their API gateway.

Main Features and Benefits of Google Kubernetes Engine

In the modern technology world,  the technical domain is inclining towards cloud computing as it solves various problems such as accessibility and scalability. Most of the time, people use the same resources for running multiple software or programs on various operating systems, which creates inconsistencies. But this issue eradicates with Google Kubernetes Engine or GKE as it includes containers that make programs independent of OS and speeds up the app development process using solutions created with the cloud ecosystem.

GKE is the simplest way for deploying, scaling, and managing apps through Google infrastructure. In this blog, you will understand Kubernetes in detail, GKE’s salient features, and the advantages you can get by implementing it.

How Microservices Enable Multi-Cloud at the Expense of Developers

This article was originally posted on the Kelda.io blog by CEO and Founder, Ethan J. Jackson. Kelda is Docker compose for Kubernetes. It allows you to quickly test your code changes in a remote environment that matches production, without the complexity of interacting with Kubernetes directly.

escape 19 graphic
Learn more about multi-cloud!

I recently had the pleasure of speaking about at — the multi-cloud conference, in New York City. It was a fantastic event packed full of sharp folks with interesting perspectives.

How to Remediate Kubernetes Security Vulnerability: CVE-2019-11247

If you haven't upgraded your Kubernetes CDRs recently, now might be the time.

A new Kubernetes security vulnerability was recently announced, along with patch releases for the issue for Kubernetes versions 1.13, 1.14, and 1.15. CVE-2019-11247 discloses a serious vulnerability in the K8s API that could allow users to read, modify or delete cluster-wide custom resources, even if they only have RBAC permissions for namespaced resources.

If your clusters aren’t using , you aren’t affected. But CRDs have become a critical component of many Kubernetes-native projects like Istio, so many users are impacted. This vulnerability also doesn’t affect you if your clusters run without Kubernetes RBAC, but that puts you at an even greater risk than this vulnerability does. We still strongly recommend enabling and using Kubernetes RBAC.