Anyone with basic knowledge of SQL injection could login to this site and add anyone they wanted to KCM and CASS, allowing themselves to both skip security screening and then access the cockpits of commercial airliners.

  • cron
    link
    fedilink
    English
    arrow-up
    6
    ·
    4 months ago

    We ended up finding several more serious issues but began the disclosure process immediately after finding the first issue.

    How many vulnerabilities can there be in such a safety-critical application?

    • 0x0@programming.devOP
      link
      fedilink
      English
      arrow-up
      8
      ·
      edit-2
      4 months ago

      No for-profit will bother with security unless forced to, as it’s seen as an expense and shareholders don’t like that.

      Edit: also:

      We had difficulty identifying the right disclosure contact for this issue. We did not want to contact FlyCASS first as it appeared to be operated only by one person and we did not want to alarm them.

      Emphasis mine.

      • cron
        link
        fedilink
        English
        arrow-up
        6
        ·
        4 months ago

        Oh, the old “this is so obscure, nobody will find this out”-excuse