Security vulnerability with United's ticketing system (0-day)

By William Entriken

1 minutes

Nature of bug

It is possible to extract personally identifiable information and modify passengers’ flight reservations without their permission.

Potential bug eligibility categories:

Potential bug severity categories:

Steps required

  1. Call the customer support number, talk to computer
  2. “Find flight details”
  3. From any Asian city (example: PVG)
  4. Typical Asian last name (example: LIU)
  5. First name: pick a letter (example: A)

Repeat step #5 for 26 times using each different letter of the alphabet.

Now you have a random passenger’s confirmation number and can cancel their ticket. Or you can can pull up their flight details and ticket confirmation which includes their full name and other information.

Tools used to discover bug

iPhone 7, Rose Gold color

Test date

Approximately August 24th.

Discoluser schedule

The vendor did not request an extension of the 3-week disclosure schedule. Nor did the vendor deploy a fix or provide any information about a forthcoming fix. This vulnerability is live and exploitable today.

Comments

There are no comments yet.

Please discuss this topic anywhere and let me know any great comments or media coverage I should link here.