Description
Preconditions and environment
Magento version - 2.4.6-P8
Environment - Local, Staging and Production
Steps to reproduce
My client is using Akamai Nonames to scan the application for PII in the incoming Rest API calls and if there (like cusotmer email address) Akamai is flagging it as security vulnerability and reporting it as a bug for the developers to fix it.
For example, the following Rest API is called by headless to Adobe Commerce where they are fetching the all the orders for the customers based on their email address to display it in the order history page...since the customer email address is exists in the query parameter Nonames system is flagging it as security vulnerability and report it as high risk.
/rest/V1/orders?searchCriteria[filterGroups][0][filters][0][conditionType]=eq&searchCriteria[filterGroups][0][filters][0][field]=customer_email&searchCriteria[filterGroups][0][filters][0][value][=[email protected]]
Expected result
Akamai Nonames scan should not find any PII information in the Rest API calls
Actual result
Akamai Nonames scan is finding the PII information in the Rest API calls and flagging it as security vulnerability.
Additional information
No response
Release note
No response
Triage and priority
- Severity: S0 - Affects critical data or functionality and leaves users without workaround.
- Severity: S1 - Affects critical data or functionality and forces users to employ a workaround.
- Severity: S2 - Affects non-critical data or functionality and forces users to employ a workaround.
- Severity: S3 - Affects non-critical data or functionality and does not force users to employ a workaround.
- Severity: S4 - Affects aesthetics, professional look and feel, “quality” or “usability”.
Metadata
Metadata
Assignees
Labels
Type
Projects
Status
Ready for Development