CyberSecurity updates
2025-01-30 09:08:21 Pacfic

OAuth Flaw in Airline Travel Integration - 1d
Read more: thehackernews.com

A critical OAuth redirect flaw has been discovered in an airline travel integration service, putting millions of users at risk of account hijacking. Cybersecurity researchers disclosed the now-patched vulnerability, which could have allowed attackers to gain unauthorized access to user accounts. The flaw was identified in a popular online travel service for hotel and car rentals which integrates with numerous airline services. Attackers could have used this to impersonate victims, access their personal information, modify bookings and even book services with their loyalty points. This incident highlights the significant risk that API supply chain attacks pose, where exploiting a weaker link in an ecosystem can provide access to sensitive data.

The vulnerability involved manipulating a 'tr_returnUrl' parameter during the OAuth authentication process. By crafting a malicious link, attackers could redirect authentication tokens to servers under their control. Once a user clicked the link and logged into their airline account, the attacker would intercept the tokens and gain full access to the victim's travel account. The attack is difficult to detect as the malicious links used the legitimate domain, making it difficult for standard detection methods to identify them. The issue has since been addressed, with the service implementing a fix to prevent unauthorized access by validating the return URL parameters.