Application Security – Use NPM Request Package for APIs Access

This blog represents code sample and related details that can be used to hack into the system through unprotected APIs. The security vulnerability such as following can be exploited using the code sample given later in this article. Note that the security vulnerabilities mentioned below forms part of OWASP 2017 Top 10 security vulnerabilities.

The code below has made use of NPM request package to send the request to the API hosted ast Paytm Catalog Site. The API below displays electronics items listed on PayTMMall.com.

var request = require('request');

var url = "https://catalog.paytm.com/v2/h/electronics?channel=web&child_site_id=6&site_id=2&version=2&platform_version=S2(New)";
var method = "POST";
var headers = {
"content-type": "application/json",
"accept": "*/*"
};

var data = {"tracking":{"current_page":"https://paytmmall.com/shop/h/electronics","prev_page":""},"context":{"device":{"os":"Linux x86_64","device_type":"PC","browser_uuid":"GA1.2.35123967.1498556341","ua":"Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:55.0) Gecko/20100101 Firefox/55.0","connection_type":"Unknown"},"channel":"WEB","user":{"ga_id":"GA1.2.35123967.1498556341","user_id":null}}}
var isJSON = true;

request({
url: url,
method: method,
body: data,
json: isJSON,
headers: headers,
},
function (error, response, body) {
if (!error && response.statusCode == 200) {
console.log(body);
}
console.log("Response: " + JSON.stringify(response));
console.log("Error: " + error);
});

Put the code shown above in a file, say, test.js and execute the file using command such as node test.js. The output would display data retrieved from the website.

Ajitesh Kumar

I have been recently working in the area of Data analytics including Data Science and Machine Learning / Deep Learning. I am also passionate about different technologies including programming languages such as Java/JEE, Javascript, Python, R, Julia, etc, and technologies such as Blockchain, mobile computing, cloud-native technologies, application security, cloud computing platforms, big data, etc. I would love to connect with you on Linkedin. Check out my latest book titled as First Principles Thinking: Building winning products using first principles thinking.

Recent Posts

Agentic Reasoning Design Patterns in AI: Examples

In recent years, artificial intelligence (AI) has evolved to include more sophisticated and capable agents,…

2 months ago

LLMs for Adaptive Learning & Personalized Education

Adaptive learning helps in tailoring learning experiences to fit the unique needs of each student.…

2 months ago

Sparse Mixture of Experts (MoE) Models: Examples

With the increasing demand for more powerful machine learning (ML) systems that can handle diverse…

3 months ago

Anxiety Disorder Detection & Machine Learning Techniques

Anxiety is a common mental health condition that affects millions of people around the world.…

3 months ago

Confounder Features & Machine Learning Models: Examples

In machine learning, confounder features or variables can significantly affect the accuracy and validity of…

3 months ago

Credit Card Fraud Detection & Machine Learning

Last updated: 26 Sept, 2024 Credit card fraud detection is a major concern for credit…

3 months ago