• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

API Security Flaw Found in Booking.com Allowed Full Account Takeover

You are here: Home / Cyber Security News / API Security Flaw Found in Booking.com Allowed Full Account Takeover

A number of security flaws have been uncovered in the implementation of the Open up Authorization (OAuth) social-login function utilized by the on the web travel agency Booking.com.

The vulnerabilities uncovered by Salt Security could potentially have an impact on buyers logging into the site by means of their Fb accounts.

“The OAuth misconfigurations could have permitted for both equally large-scale account takeover (ATO) on customers’ accounts and server compromise,” wrote Salt Security security researcher Aviad Carmel.

The security pro stated that though OAuth supplies a more easy user expertise in interacting with web sites, its sophisticated technical again-conclude can make security issues with possible exploitation.

“OAuth has quickly come to be the sector typical and is presently in use by hundreds of countless numbers of companies about the earth,” reported the company’s VP of Exploration, Yaniv Balmas. “As a end result, misconfigurations of OAuth can have a substantial affect on equally corporations and prospects as they go away treasured information exposed to terrible actors.”

In unique, the researcher stated they uncovered the vulnerabilities by manipulating particular measures in the OAuth sequence on the Reserving.com web site.

“[We] observed they could hijack classes and reach account takeover (ATO), stealing consumer data and carrying out steps on behalf of buyers,” Balmas wrote.

Immediately after finding the flaws, Salt Labs disclosed them to Booking.com, and the business reportedly set them.

“On receipt of the report from Salt Security, our groups instantly investigated the findings and proven that there had been no compromise to the Booking.com platform, and the vulnerability was swiftly solved,” a enterprise spokesperson stated.

Salt Labs said they observed no proof of it possessing been exploited in the wild. The discovery arrives virtually a 12 months soon after GitHub confirmed quite a few companies were being compromised by a threat actor working with stolen OAuth tokens to obtain their personal repositories.

Far more not long ago, Microsoft revealed that threat actors mounted OAuth programs on compromised cloud tenants and applied them to regulate Exchange servers and distribute spam.

Image credit: II.studio / Shutterstock.com

Some parts of this article are sourced from:
www.infosecurity-journal.com

Previous Post: « White House Launches National Cybersecurity Strategy
Next Post: U.S. Cybersecurity Agency Raises Alarm Over Royal Ransomware’s Deadly Capabilities »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks
  • 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager
  • INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure
  • Why DNS Security Is Your First Defense Against Cyber Attacks?
  • SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords

Copyright © 2025 · AllTech.News, All Rights Reserved.