Back to Squawk list
  • 20

Security Researchers find SQL injection in Cockpit Access Security System

Submitted
Ian Carroll and Sam Curry discover that anyone with basic knowledge of SQL injection could add anyone they wanted to Known Crewmember (KCM) and Cockpit Access Security System (CASS) via FlyCASS.com, allowing themselves to both skip security screening and then access the cockpits of commercial airliners. FlyCASS has fixed the flaw in the application. (ian.sh) More...

Sort type: [Top] [Newest]


Bobh528FA
Bob Hallissy 6
TSA or ARINC should *hire* Ian or Sam, not stop communicating with them.

[This poster has been suspended.]

locomoco
M.F. LaBoo 4
Given all the probing that goes on, it's surprising neither TSA or DHS appear to have tested this system for vulnerabilities zuch as this rather elementary one, and taken preemptive action. Looks like they need a few gray hats onboard.

Bandrunner
Bandrunner 5
Kudos to the authors for contacting the relevant authorities, rather than go public with it straight away.
Not impressed with the behaviour of the said authorities later, denying everything and saying it's all right now.
Also not impressed with the authors subsequent behaviour, going public with it when apparently there is still a vulnerability.
Bobh528FA
Bob Hallissy 5
> Also not impressed with the authors subsequent behaviour, going public with it when apparently there is still a vulnerability.

Eh? The article indicates:

> After the issue was fixed, we attempted to coordinate the safe disclosure of this issue.

Sounds like they didn't publicly disclose the vulnerability until it was fixed -- so what is wrong with that?
srobak
srobak 1
Do you think it has actually been implemented on every aircraft?
mendieta
Pablo Rogina 3
>> Also not impressed with the authors subsequent behaviour, going public with it when apparently there is still a vulnerability.

Well, that's a common practice within the information security field when a fix is not provided before a deadline set when the researchers initially privately disclosed the flaw.
See "responsible disclosure" -> https://cheatsheetseries.owasp.org/cheatsheets/Vulnerability_Disclosure_Cheat_Sheet.html

Login

Don't have an account? Register now (free) for customized features, flight alerts, and more!
Did you know that FlightAware flight tracking is supported by advertising?
You can help us keep FlightAware free by allowing ads from FlightAware.com. We work hard to keep our advertising relevant and unobtrusive to create a great experience. It's quick and easy to whitelist ads on FlightAware or please consider our premium accounts.
Dismiss