53

Researchers Ian Carroll and Sam Curry discovered the vulnerability in FlyCASS, a third-party web-based service that some airlines use to manage the Known Crewmember (KCM) program and the Cockpit Access Security System (CASS). KCM is a Transportation Security Administration (TSA) initiative that allows pilots and flight attendants to skip security screening, and CASS enables authorized pilots to use jumpseats in cockpits when traveling.

Definitions:

SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.

-Wikipedia

top 8 comments
sorted by: hot top controversial new old
[-] Crackhappy@lemmy.world 25 points 2 months ago

Jesus fucking Christ. It's 2024. Sanitize your inputs people.

[-] IllNess@infosec.pub 14 points 2 months ago

Especially since backend web frameworks do all this for you.

[-] RamblingPanda@lemmynsfw.com 10 points 2 months ago

I'm curious what they are using. It's pretty hard to set up modern frameworks so bad they'll allow that stuff. I mean it's possible, but significantly harder than doing it right.

[-] wizardbeard@lemmy.dbzer0.com 6 points 2 months ago

modern frameworks

Bold assumption they're using anything remotely modern.

[-] RamblingPanda@lemmynsfw.com 3 points 2 months ago

Yeah, I know. But it would be interesting to know what they used.

[-] IllNess@infosec.pub 3 points 2 months ago
[-] RamblingPanda@lemmynsfw.com 3 points 2 months ago

The language of the gods!

[-] fubarx@lemmy.ml 17 points 2 months ago

Security theater: Shoes and belts off.

Security circus: Pilot Captain Bobby Tables.

this post was submitted on 31 Aug 2024
53 points (98.2% liked)

Security News

2279 readers
1 users here now

founded 2 years ago
MODERATORS