Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Oauth redirects the lack of airlines to expose millions of credentials in meetings
Global Security

Oauth redirects the lack of airlines to expose millions of credentials in meetings

AdminBy AdminJanuary 28, 2025No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 28, 2025Red Lakshmanan

Cybersecurity researchers have disclosed details of the vulnerability of the accounting account affecting the popular online travel and cars travel.

“Using this drawback, attackers can gain unauthorized access to any user on the system, which effectively allows them to betray themselves for the victim and perform an array of action on their behalf – including hotel reservations and rental of cars using the loyalty victim’s loyalty, canceling , canceling or editing the booking information and more, “” API “Salt Labs Salt Labs – Note In a report that shared with Hacker News.

Successful exploitation of vulnerability can be subjected to millions of airlines on the Internet by adding. The company’s name was not disclosed, but it states that the service is integrated into “dozens of commercial airlines on the Internet” and allows users to add orders to the hotel to the airline.

Cybersecurity

The disadvantage, in a nutshell, can be armed trivial by sending a specially designed link that can be distributed through standard distribution channels such as email, text messages or sites controlled by the attacker. By clicking on the link, it is enough for the actor threats to contain control of the victim’s account as soon as the entry process is complete.

Sites that combine rental reservation service have the opportunity to enter the latter using the accounting data related to the airline’s service provider, and at this point the rental platform creates a link and redirects the user back to the airline’s website to complete authentication through OAO.

Once logged in, users are heading for a web -resite that adheres to the format “..Sec, “where they can use their airline airline to book hotels and car rental.

The assault method developed by salt laboratories provides for reaction to authentication from the airline’s site, which includes the user session marker on the site under the control of the attacker by manipulating the “Tr_returnurl” parameters, which allows you to effectively access the victim’s account in unauthorized methods their personal information.

Cybersecurity

“Since the manipulated link uses a legal customer domain (with manipulations only at the parameter level rather than at a domain level), this makes the attack to detect with a standard domain inspection or block/resolution method,” said AMIT Elbirt Research.

Salt Labs described the maintenance and maintenance interaction as a profitable vector for API supplies, in which the enemy focuses on a weaker connection in the ecosystem to break the systems and steal private customer data.

“In addition to the simple impact of data, attackers can perform actions on the username, such as creating orders or changing the account details,” Elbirt added. “This critical risk emphasizes vulnerabilities in other integrations and the importance of harsh security protocols to protect users from unauthorized access and manipulation of accounts.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.