TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hacking on a plane: Leaking data of millions and taking over any account

293 pointsby serhack_over 2 years ago

15 comments

throwaway019254over 2 years ago
&gt; Monday (November 21st) the airline was made aware of the issue<p>&gt; Wednesday (November 23rd) resolution has already been tested and deployed<p>That&#x27;s a pretty nice response time - compared to some big companies that are asking security researchers to not disclose vulnerability for six months.
评论 #33918907 未加载
评论 #33912871 未加载
8jy89huiover 2 years ago
The author did not mention if they were rewarded by the bug bounty program. A vulnerability of this severity surely requires a reward of some sort.<p>Does anyone have any more information about whether or not this person was compensated for their work?
评论 #33918631 未加载
评论 #33912915 未加载
YeBanKoover 2 years ago
Not related to the content of the article, but to the presentation: that art work in the header is spot on, except maybe for what appears to be tree branches in the window. I think we are witnessing how generative are killing photo stock business.
评论 #33913510 未加载
评论 #33912914 未加载
评论 #33912836 未加载
plastiquebeechover 2 years ago
Not surprising, airplane wifi has always been ridiculously insecure.<p>Back in the day, when it was first rolling out, you could (theoretically ofc) join the plane&#x27;s network and scan for MAC addresses, then clone someone else&#x27;s for free access.<p>I think the authentication is a bit more sophisticated these days, but it&#x27;s clear that these providers treat security as an afterthought. At least the one in the article had a bug bounty program and responded quickly, I guess.<p>Unrelated, I think it&#x27;s funny that the AI artist put a little picture of a house on the airplane&#x27;s interior wall in the article&#x27;s header image. Maybe plane trips would be more bearable if the cabins didn&#x27;t look like a utopian abbatoir&#x27;s waiting room.
评论 #33915258 未加载
sys_64738over 2 years ago
I think the way that airlines handle this is to squash as many seats together as possible so it&#x27;s not possible to open your laptop to do hacking. Problem solved!
评论 #33916411 未加载
brigandishover 2 years ago
&gt; I tried customer_id … That also worked!<p><i>What</i> did you try <i>exactly</i>?<p>There&#x27;s several of these &quot;I changed X and got Y&quot; without ever showing what X is, just alluding to it. That grinds my gears in any blog post, perhaps only second to not stating which version&#x2F;system some code is running against.
jaywalkover 2 years ago
I can understand when there&#x27;s a bug that causes something like this. It doesn&#x27;t excuse it, but we all introduce bugs in code, and sometimes they&#x27;re disastrous.<p>But this? This is just straight up careless, thoughtless design with zero regard for security whatsoever. It&#x27;s inexcusable.
评论 #33912150 未加载
pcthrowawayover 2 years ago
Yet another great writeup by a security researcher who realized they could exploit a system by modifying a request in-flight.
LiamPaover 2 years ago
How is something like this not picked up in a pen test? Can only assume there never has been..
评论 #33912550 未加载
评论 #33912211 未加载
评论 #33912420 未加载
dopameanover 2 years ago
I&#x27;s kind of incredible how common this specific kind of vulnerability is. I have to assume the developers of these systems just hope that no one will notice?
评论 #33912207 未加载
评论 #33912624 未加载
评论 #33912083 未加载
评论 #33912225 未加载
评论 #33913323 未加载
noduermeover 2 years ago
Once a user is logged in, is including their username or userID routine API responses considered bad practice? I don&#x27;t see why it should be, if everything you can <i>do</i> with that username requires an active login token.<p>The fact that you could put in an email address in lieu of a username&#x2F;userID seems irrelevant; lots of systems allow email addresses as a username. What stands out about this to me is: We see in both requests the same `uxd_id` field. This looks to be a temporary login key or validation key generated by the server, that the client would probably use to validate further requests or validate a password change request from that username. It&#x27;s different in the email than in the live server response so they are generated in different sessions. So...<p>1) The email reset has two calls. What does the author mean that the first call validates the user&#x27;s auth? If this is a &quot;forgot password&quot; link for a user who&#x27;s not logged in, there should be no existing auth (unless that old uxdID functions as a permanent password, but even then, it should be specific to the user). That link should go to a page that issues a new email with a temporary validation token that&#x27;s tied to the specific user and then emailed back to that user&#x27;s email address. Unless you could intercept the named user&#x27;s email there should be no way to know the new token and reset the password.<p>2) If, on the other hand, it was a reset pass call with the user <i>already logged in</i>, why is the server not checking that uxd_id matches the active login session <i>which also matches the user whose password is to be changed?</i> What&#x27;s the point of the uxd_id field in the PUT call if not to check that calling user == authorized user == user whose password should be changed? Who would write something like that? For that reason, this looks more like a backdoor for testing password resets that was unintentionally left open.<p>Am I misunderstanding something about the way this thing is taking tokens to change passwords...? Or is what&#x27;s described really as simple as &quot;system doesn&#x27;t check if uxd_id matches user&#x27;s email on an active session&quot;?
评论 #33913416 未加载
评论 #33913705 未加载
cwkossover 2 years ago
Nice catch, and kudos to you and them for the quick resolution!
jshchnzover 2 years ago
crazy how this makes it all the way to production, I wonder how long this vulnerability was exposed...
icecap12over 2 years ago
I know the guys at the AISAC - great resource for the cyber folks working in the Aviation industry.
Cupertino95014over 2 years ago
When on any sort of public WiFi network, use a VPN.<p>If anyone has a story about how &quot;that&#x27;s not enough&quot; I&#x27;m eager to hear it. Can&#x27;t be too careful, can we?
评论 #33919381 未加载
评论 #33913278 未加载
评论 #33912138 未加载
评论 #33912814 未加载