9 comments

  • didgetmaster 1 minute ago
    The lack of needing the last name might have allowed a hacker to brute force the whole list; but it seems that even with a last name, it could expose a lot of PII. Just pass codes along with popular last names (Smith, Jones, Nelson, etc.) and it seems like it could spit out a bunch of reservations.
  • jbergler 1 hour ago
    The 6 hour claim is interesting, but I highly doubt Avelo (or any airline) would handle 100k requests/sec

    If we consider that the real major's move about 400k-500k passengers/day, let's be really optimistic and say that they check their booking 6 times a day for the week before they fly. That's around 250 requests/sec.

    Anyone know about the consumer facing tech stacks at airlines these days? Seems unlikely that they'd have databases that would auto scale 400x...

    • kiklion 8 minutes ago
      I doubt their API would handle 100k requests per second. That math was roughly indictive of what the cost to send 100k requests per second would look like. He did mention that that was assuming the target didn't have rate limiting, either intentional or just pure limits of the hardware.
  • commandlinefan 52 minutes ago
    > They were responsive, professional, and took the findings seriously, patching the issues promptly.

    The "issue" is that they're returning the entire PNR dataset to the front-end in the first place. He doesn't detail how they fixed it, but there's no reason in the world that this entire dataset should be dumped into Javascript. I got into pretty heated arguments with folks about this at Travelocity and this shit is exactly why I was so adamant.

  • mtlynch 1 hour ago
    >The Avelo team was responsive, professional, and took the findings seriously throughout the disclosure process. They acknowledged the severity, worked quickly to remediate the issues, and maintained clear communication. This is a model example of how organizations should handle security disclosures.

    Sounds like no bug bounty?

    It's great if OP is happy with the outcome, but it's so infuriating that companies are allowed to leak everyone's data with zero accountability and rely on the kindness of security researchers to do free work to notify them.

    I wish there was a law that assigned a dollar value to different types of PII leaks and fined the organization that amount with some percentage going to the whistleblower. So a security researcher could approach a vendor and say, "Hi! I discovered vulnerabilities in your system that would result in a $500k fine for you. For $400k, I'll disclose it to you privately, or you can turn me down and I'll receive $250k from your fines."

    • bossyTeacher 8 minutes ago
      > it's so infuriating that companies are allowed to leak everyone's data with zero accountability and rely on the kindness of security researchers to do free work to notify them.

      This is a matter for lawmakers and law enforcement. Campaign for it. Nothing will change otherwise

    • edent 1 hour ago
      > I wish there was a law that assigned a dollar value to different types of PII leaks

      There is. It is called GDPR.

      Plenty of companies have been fined for leaks like this.

      Some countries also have whistleblower bounties but, as you might expect, there are some perverse incentives there.

      • mtlynch 1 hour ago
        Yeah, as an American, I'm jealous of many aspects of GDPR. I really appreciate you blogging / tooting about experiences protecting your rights under GDPR. I wish we had 1/10th of the consumer privacy protections you have.

        How does security research like this work out in practice, in the EU?

        I read a lot of vulnerability writeups like this and don't recall seeing any where the author is European and gets a better outcome. Are security researchers actually compensated for this type of work in the EU?

      • billy99k 7 minutes ago
        The GPDR makes it so small companies need to hire expensive lawyers to be compliant (and you still don't know for sure, based on the laws)

        How about fining individual developers with poor coding practices?

  • CtrlAltNerd 1 hour ago
    Great work, very impressive find.
  • mattmaroon 2 hours ago
    Major? Avelo?
  • klysm 2 hours ago
    Annoying sensationalist writing, but good find!
  • Nextgrid 2 hours ago
    This is about a non-rate-limited endpoint providing ticket data given a booking code only (and not last name as it's usually the case), which makes it feasible to bruteforce the entire search space.

    (unfortunately, I feel like AI was overused in authoring the writeup)

    • filearts 1 hour ago
      Is it really AI slop if someone leverages AI to improve / transform their novel experiences and ideas into a rendition that they prefer?

      I'm not suggesting whether or not the article is AI assisted. I'm wondering if the ease of calling someone's work "AI slop" is a step along the slippery slope towards trivializing this sort of drive-by hostility that can be toxic in a community.

      • Nextgrid 1 hour ago
        You are right about the toxicity, I will edit my comment.

        There's a difference between leveraging AI to proofread or improve parts of their writing and this - I feel like AI was overused here; gave the whole article that distinctive smell and significantly reduced its information density.

    • dado3212 2 hours ago
      What makes you say that? This didn't read like AI slop to me.
      • Nextgrid 2 hours ago
        Overuse of bulleted lists, unnecessary sensationalism, sentences like "The requests flew. There was no WAF, no IP blocking, no CAPTCHA." and so on. It reeks of someone pasting some notes into a chat prompt and asking it to spruce it up for publication.
      • PKop 2 hours ago
        Pattern recognition skill issue then. It did to me.

        "The fallout"

        This flaw was critical.

        And other vibes. You know it when you see it, though it may be hard to define.

        • mmooss 1 hour ago
          > You know it when you see it

          How do you know your perception is accurate? One of humanity's biggest weaknesses is trusting that kind of response.

          • PKop 51 minutes ago
            Maybe just try having confidence in yourself. Trust your instincts. I'm not going to impugn my own abilities based on some purported flaw in an abstract amorphous blog called "humanity", whatever that is. A lot of individuals of distinction have many characteristics better than the average, why wouldn't I trust myself more than other people?

            Pattern recognition is a many millions of years evolved ability best exemplified in the "human" species by the way, so I basically disagree with your whole premise anyways.

        • sallveburrpi 1 hour ago
          What is the AI slop version of “This looks shopped. I can tell from some of the pixels and from seeing quite a few shops in my time.”

          ?

      • tverbeure 1 hour ago
        > This incident is a stark reminder

        A stark reminder is a stark reminder about the existence of AI slop. You see the phrase a lot in social media comment spam.

      • delfinom 2 hours ago
        There's an emdash, no human being uses emdashes.