Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijacking

The Hacker News by The Hacker News
January 28, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Jan 28, 2025Ravie Lakshmanan

Cybersecurity researchers have disclosed details of a now-patched account takeover vulnerability affecting a popular online travel service for hotel and car rentals.

“By exploiting this flaw, attackers can gain unauthorized access to any user’s account within the system, effectively allowing them to impersonate the victim and perform an array of actions on their behalf – including booking hotels and car rentals using the victim’s airline loyalty points, canceling or editing booking information, and more,” API security firm Salt Labs said in a report shared with The Hacker News.

Successful exploitation of the vulnerability could have put millions of online airline users at risk, it added. The name of the company was not disclosed, but it said the service is integrated into “dozens of commercial airline online services” and enables users to add hotel bookings to their airline itinerary.

Cybersecurity

The shortcoming, in a nutshell, can be weaponized trivially by sending a specially crafted link that can be propagated via standard distribution channels such as email, text messages, or attacker-controlled websites. Clicking on the link is enough for the threat actor to hijack control of the victim’s account as soon as the login process is complete.

Sites that integrate the rental booking service have the option to login to the latter using the credentials associated with the airline service provider, at which point the rental platform generates a link and redirects the user back to the airline’s website to complete authentication via OAuth.

Once the sign in is successful, the users are directed to a website that adheres to the format “<rental-service>.<airlineprovider>.sec,” from where they can use their airline loyalty points to book hotels and car rentals.

The attack method devised by Salt Labs involves redirecting the authentication response from the airline site, which includes the user’s session token, to a site under the attacker’s control by manipulating a “tr_returnUrl” parameter, effectively allowing them to access the victim’s account in an unauthorized manner, including their personal information.

Cybersecurity

“Since the manipulated link uses a legitimate customer domain (with manipulation occurring only at the parameter level rather than the domain level), this makes the attack difficult to detect through standard domain inspection or blocklist/allowlist methods,” security researcher Amit Elbirt said.

Salt Labs has described service-to-service interactions as a lucrative vector for API supply chain attacks, wherein an adversary targets the weaker link in the ecosystem to break into systems and steal private customer data.

“Beyond mere data exposure, attackers can perform actions on behalf of the user, such as creating orders or modifying account details,” Elbirt added. “This critical risk highlights the vulnerabilities in third-party integrations and the importance of stringent security protocols to protect users from unauthorized account access and manipulation.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
From First Dates to Double Dates: OpenTable Declares That Valentine’s Day 2025 Will Break All The Rules

From First Dates to Double Dates: OpenTable Declares That Valentine's Day 2025 Will Break All The Rules

Recommended.

Huawei James Chen: Mit drei Schritten zu KI-UBB und inspirierendem Wachstum für neue Geschäftsbereiche

Huawei James Chen: Mit drei Schritten zu KI-UBB und inspirierendem Wachstum für neue Geschäftsbereiche

October 15, 2025
Pronoia Emerges as a Leading Arabic AI Model, Outperforming Global Competitors

Pronoia Emerges as a Leading Arabic AI Model, Outperforming Global Competitors

April 8, 2025

Trending.

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices

July 18, 2025
Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

Stocks making the biggest moves premarket: Salesforce, American Eagle, Hewlett Packard Enterprise and more

September 4, 2025
Wesco Declares Quarterly Dividend on Common Stock

Wesco Declares Quarterly Dividend on Common Stock

December 1, 2025
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

March 10, 2025
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

February 9, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio