Directive Overloading in GraphQL API
Directive Overloading in GraphQL API
Description
Directive Overloading in GraphQL occurs when an attacker leverages a large number of directives in a query to overwhelm the server's processing capabilities.
Directives in GraphQL are used to modify the behavior of queries, but excessive use can lead to Denial of Service (DoS) attacks by exhausting server resources. This kind of attack can cause performance degradation or complete service outages.
Example:
query oxo {
__typename @aa @aa @aa @aa @aa @aa @aa @aa @aa @aa
}
The security impact of Directive Overloading can lead to the following issues:
- Denial of Service: By sending an excessive number of directives in a single query, attackers can overwhelm the server, causing legitimate users to experience slow responses or service outages.
- Resource Exhaustion: Servers may use significant computational resources to parse and validate the directives, which can result in memory exhaustion or CPU spikes.
- System Unavailability: If left unchecked, a Directive Overloading attack could make the GraphQL service unavailable for all users.
Recommendation
To mitigate the risk of Directive Overloading attacks, you can take the following steps:
-
Implement timeouts: Implementing timeouts to
kill
queries that take too long to resolve can be highly effective. By setting a maximum execution time, you can automatically terminate queries that exceed this limit, preventing them from consuming excessive server resources. -
Limit Directives: Implement server-side limits on the number of directives allowed in a single GraphQL query. You can configure tools like
GraphQL Armor
to limit directives and prevent overloading.
// Configuring for GraphQL Armor
GraphQLArmorConfig({
maxDirectives: {
// Toggle the plugin | default: true
enabled?: boolean,
// Directives threshold | default: 50
n?: int,
// Callbacks that are ran whenever a Query is accepted
onAccept?: GraphQLArmorAcceptCallback[],
// Callbacks that are ran whenever a Query is rejected
onReject?: GraphQLArmorRejectCallback[],
// Do you want to propagate the rejection to the client? | default: true
propagateOnRejection?: boolean,
}
})
import graphql
from graphql.language import ast
from graphql.language import parser
from settings import api
def validate_directives(query: str) -> None:
"""
This validation prevents the execution of queries containing an excessive
amount of directives to prevent abuse.
"""
class DirectivesParser(parser.Parser):
def parse_directives(self, is_const: bool) -> list[ast.DirectiveNode]:
directives = 0
while self.peek(graphql.TokenKind.AT):
directives += 1
if directives > api.API_MAX_DIRECTIVES:
raise graphql.GraphQLError("Exception - Max directives exceeded")
self.parse_directive(is_const)
return []
ast_parser = DirectivesParser(query)
ast_parser.parse_document()
Links
Standards
- CWE_TOP_25:
- CWE_400
- PCI_STANDARDS:
- REQ_6_2
- REQ_6_4
- REQ_11_3
- OWASP_MASVS_L2:
- MSTG_PLATFORM_2
- OWASP_ASVS_L3:
- V13_4_1
- SOC2_CONTROLS:
- CC_2_1
- CC_4_1
- CC_7_1
- CC_7_2
- CC_7_4
- CC_7_5
- CC_9_1