Security Test: Batch Limit¶
Description¶
Default Severity:
The Batch Limit vulnerability happens when a GraphQL engine lets users send many queries in one go, and attackers can exploit this to slip past safeguards like rate limits. Instead of one request per query, a malicious user can bundle many queries together, overwhelming the system, bypassing security checks, or even causing a denial-of-service scenario. Developers need to be cautious about how many queries are allowed in one request and ensure their safeguards still work even when multiple queries are combined, as the default setup can be turned into an open door for abuse.
Reference:
Configuration¶
Identifier:
resource_limitation/graphql_batch_limit
Examples¶
All configuration available:
checks:
resource_limitation/graphql_batch_limit:
skip: false # default
options:
threshold: 15 # default
Options¶
Options can be set in the options
key of the Security Test Configuration.
Property | Type | Default | Description |
---|---|---|---|
threshold | number | 15 | Maximum number of batched documents allowed to be sent |
Compliance and Standards¶
Standard | Value |
---|---|
OWASP API Top 10 | API8:2023 |
OWASP LLM Top 10 | LLM04:2023 |
PCI DSS | 6.5.10 |
GDPR | Article-32 |
SOC2 | CC1 |
PSD2 | Article-95 |
ISO 27001 | A.14.2 |
NIST | SP800-53 |
FedRAMP | AC-2 |
CWE | 770 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:H/RL:O/RC:R |
CVSS Score | 4.9 |