TSU-05 concerns security issues that arise when microflows invoke external systems (APIs), such as via SOAP, REST, or OData. In Mendix, such external services are often used to process user data or data about users. This data is then transmitted either in the URL or in the body of the HTTP request.
Vulnerabilities arise when user input is used in an insecure way to construct such a URL or request. This can lead to:
When a microflow invokes an external web service, you must properly secure both the construction of the URL and the content of the request. Ensure that the involved microflow or the back-end system verifies whether the user is authorized to use the selected web service.
These best practices help with that:
The following vulnerabilities commonly occur within this category:
Recognize and prevent vulnerabilities in Mendix at an early stage?
Explore our updated Mendix security trainings based on The S-Unit Top 10.
Want to know how your Mendix application scores against The S-Unit Top 10? In collaboration with Omnext, we have developed a Mendix-specific SAST solution that continuously and automatically scans for vulnerabilities. By integrating The S-Unit Top 10 into the CI/CD pipeline, risks are identified early and made immediately visible. Learn more about our collaboration with Omnext and the Mendix-specific SAST module.