What is GraphQL?

GraphQL is a data query language developed by Facebook. It acts as an alternative to the REST API.

REST API GraphQL
• Require the client to send multiple requests to different endpoints on the API to query data from the database. • you only need to send one request to query the backend.
• You need to know the URL of each resource, the HTTP methods used on each resource, and the schema of each resource. • you need to know only the URL of the API and the schema.

REST API call:
• Regiter a user: send request to [/api/v1/register].
• sign-in: send a request to [/api/v1/login].
• Reset the password: send another request to [/api/v1/reset-password].
Every resource has its own schema and own method.

GraphQL call:
• There is only one endpoint that you can send all requests to it! (/graphql?q=)

Components of the GraphQL:

server-side client-side
it resolves the operations and provides the requested data/operation. application that wants to interact with the GraphQL API

GraphQL has 3 main operations:
• Query: fetching data using specifically defined query operations.
• Mutations: for modifying any data (creating, updating, or deleting) in a database using operations.
• Subscriptions: for receiving real-time messages from the back-end.


GraphQL Pentesting

Endpoint of the GraphQL:
[
“/graphql”, “/graphiql”, “/graphql/console”, “/graphql.php”, “/graphiql.php”, “/explorer”, “/altair”, “/playground”, “/graphql-explorer”, “/graphiql/”
]

Introspection

• allows to query all information related to the supported schema and queries on a GraphQL server instance like: fields, types, sub-fields and more.
•The introspection system is enabled by default, but it can be disabled.
Simple examples:
• {__schema{types{name,fields{name}}}} #getting fields and subfields
• { __schema{types{name,fields{name,args{name,description,type{name,kind,ofType{name,kind}}}}}}} #extracting all the types, it’s fields, and it’s arguments

At this point, there is no vulnerability!
• After knowing the fields and subfields we need to query them to get the data :D
EX: /graphql?q={Users{id,name,nickname}}

• If the introspection is off!
• So we try to get information about the schema from the resulted errors, such as the following:
query: query={users}
So now we got 2 fields :D
query: query={imUsers{ids}}
we got a subfield of imUsers field
query: query={imUsers{id,username}}
got another 2 subfiles and so on, reaching to the dumping.

Possible attacks on GraphQL
There are many vulnerabilities that can be raised from GraphQL mis-configuration, such as the following:
• Information Disclosure.
• IDOR.
• SQL Injection.
• CUD “creating, updating, and deleting” data via abusing mutations.
• Authorization bypass.
• Broken access control.

Some attacks senarios
SSRF from GraphQL with enabled Introspection


Refrences: