Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Threatstream API Authentication Deprecation #125

Closed
ed4wg opened this issue Jun 19, 2024 · 4 comments
Closed

Threatstream API Authentication Deprecation #125

ed4wg opened this issue Jun 19, 2024 · 4 comments
Assignees

Comments

@ed4wg
Copy link

ed4wg commented Jun 19, 2024

Name of the app
Threatstream

Describe the bug
The Threatstream connector is using a deprecated form for authenticating to the Threatstream API. It is passing the creds in the URL instead of in the headers.

Anomali Threatstream will no longer support auth through URL params as of July 15 2024. This will break the use of this connector without a fix.

See: https://github.com/splunk-soar-connectors/threatstream/blob/next/threatstream_connector.py#L408

Expected behavior
Use headers to auth instead of passing the creds in the URL.

Splunk SOAR Version (please complete the following information):

  • Latest version - 3.5.3
@alexa-phantom
Copy link
Contributor

Hi @ed4wg , thank you for letting us know. We will look into it.

@ishans-crest
Copy link
Contributor

Hi @ed4wg

Thanks for helping us with this, do you have any link to deprecation note from Anomali?

@ed4wg
Copy link
Author

ed4wg commented Jun 21, 2024

Hi @ishans-crest

Here is what they shared.

As part of our ongoing commitment to maintaining the highest standards of security and privacy, we are writing to inform you of an important upcoming change that may affect your API integrations to the Anomali APIs. Effective July 15th, 2024, we will be removing support for passing API keys in the URL. This has been deprecated since February 2023, and will now no longer be supported.

Why Are We Making This Change?
Passing API keys in URLs is generally considered a bad practice for several critical reasons:

  1. LessSecure: URLs can be logged in various places such as server logs, browser history, and intermediary proxies, potentially exposing the API key.
  2. Easier to Accidentally Expose: URLs can be shared accidentally, for example, in screenshots or by copying and pasting.
  3. Caching Risks: If the URL is cached by a browser or proxy, the API key can be inadvertently stored in the cache.

Best Practices for API Key Security
To mitigate these risks, we will now only support passing API keys in the header, because:
● More Secure: Headers are less likely to be logged and are not exposed in browser history or server logs.
● Better Practices: Many security best practices and frameworks recommend using headers for authentication tokens because they are designed to be used for secure data transmission.
● Controlled Access: Headers can be managed more precisely, ensuring that the key is only sent where necessary and not exposed in client-side code.
By adhering to these practices, you can significantly enhance the security of your API keys and protect your applications from unauthorized access and potential breaches.

What Do You Need to Do?

Please ensure that all your applications are updated to stop including API keys in URLs and start using HTTP headers or other secure methods by July 15th, 2024.
...

@ishans-crest
Copy link
Contributor

Hi @ed4wg We have released new version of Threatstream and it's available on Splunkbase.

Thank you once again for informing us about the deprecation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants