Bypassing airport security via SQL injection
A security vulnerability in the FlyCASS system allowed unauthorized access to TSA's KCM and CASS. Researchers reported it, leading to system disablement, but TSA provided misleading statements about security measures.
Read original articleA significant security vulnerability was discovered in the Known Crewmember (KCM) and Cockpit Access Security System (CASS) used by the TSA, which allows airline employees to bypass security screening. Researchers Sam Curry and Ian Carroll found that the FlyCASS system, which manages KCM and CASS for various airlines, was susceptible to SQL injection attacks. This flaw enabled unauthorized users to log in as administrators and add any individual as an authorized user, granting them access to secure areas without proper screening. The researchers reported the issue to the Department of Homeland Security (DHS) on April 23, 2024, which acknowledged the severity of the problem and subsequently disabled FlyCASS from KCM/CASS. However, the TSA issued misleading statements regarding the vulnerability, claiming that a vetting process was in place for KCM barcodes, despite evidence that manual entry of employee IDs was still possible. The researchers attempted to engage with DHS for a safe disclosure process but faced communication challenges. The timeline of events indicates a lack of responsiveness from the TSA regarding the vulnerability's implications. The incident highlights critical flaws in the security protocols surrounding airline employee access to sensitive areas.
- A SQL injection vulnerability was found in the FlyCASS system, allowing unauthorized access to KCM and CASS.
- Researchers reported the issue to DHS, which confirmed the seriousness and disabled FlyCASS from KCM/CASS.
- The TSA issued incorrect statements about the vulnerability, denying the possibility of bypassing security.
- The incident underscores significant flaws in the security measures for airline employee access.
- Communication issues arose during the disclosure process, complicating resolution efforts.
Related
CISA broke into a US federal agency, and no one noticed for a full 5 months
CISA's red team exercise at a US federal agency exposed critical security flaws, including an unpatched vulnerability in Oracle Solaris. Delays in patching allowed a breach, emphasizing the need for improved security measures.
Give Me the Green Light Part 1: Hacking Traffic Control Systems
The author uncovers a critical vulnerability in a traffic controller's web interface, allowing unauthorized access to manipulate traffic signals. Vendor response was dismissive, leading to community support and plans for a CVE.
Flightaware Security Breach
FlightAware reported a security breach on July 25, 2024, exposing user personal information. Affected users must reset passwords, raising concerns about security practices and accountability for data breaches.
FlightAware Leaks Customer Data (Name, Email Addresses and Passwords)
FlightAware reported a data breach exposing customer information due to a configuration error. Affected users must reset passwords, and notification was delayed over three weeks, violating EU regulations.
FlightAware configuration error leaked user data for years
FlightAware reported a data security incident exposing user information for over three years due to a configuration error. Affected users must reset passwords and are offered 24 months of identity protection.
- Many commenters express disbelief that such a basic SQL injection vulnerability could exist in a critical security system.
- There is a strong sentiment that the TSA's response was inadequate and dismissive, with accusations of cover-up and negligence.
- Commenters worry about potential repercussions for the researchers who reported the vulnerability, fearing legal action under the CFAA.
- Several users highlight the systemic issues within the TSA and the broader implications for national security.
- Many call for greater accountability and transparency from government agencies regarding cybersecurity practices.
But that isn't even relevant when you can go traipsing through the SQL query itself just by asking; wouldn't matter how well the passwords were stored.
I’m not buying this. Feels more like they knew the site developer would just fix it immediately and they wanted to make a bigger splash with their findings.
It seems pretty remarkable that airlines are buying such a security sensitive piece of software from a one person shop. If you make it very far into selling any piece of SaaS software to most companies in corporate America, at the absolute minimum they're going to ask you for your SOC2 audit report.
SOC2 is pretty damn easy to get through with minimal findings as far as audits go, but there are definitely several criteria that would should generate some red flags in your report if the company is operated by a single person. And I would have assumed that if your writing software that integrates with TSA access systems, the requirements would be a whole lot more rigorous than SOC2.
What is it, the year 2000 ?
It should be a criminal offence for whoever developed that system.
Everyone dropped the ball... and kept dropping it. The part where its handed to them on a silver platter and its essentially smacked away. Maddening.
> 06/04/2024: Follow-up to DHS CISO about TSA statements (no reply)
There should be a public Shitlist of Organisations that don't get the Benefit of Responsible Disclosure anymore, just a Pastebin drop linked to 4chan.
The TSA would have been the one suing you and would easily win.
Pilot: "Years ago we’d get a random enhanced check (which just means go to TSA precheck) now and then. These days it’s 60% of the time, so it’s not possible to get a whole crew through KCM anymore, and we wait on each other because the jet can’t be boarded until the flight attendants are ALL through security, and with the 2022/2023 KCM random checks being so high, that just doesn’t happen. Honestly, I rarely use KCM anymore. I just walk through TSA precheck. The odds are we’re going there anyway so just cut to the chase and hit precheck."[1]
VIP treatments (including the likes of KCM) should be removed no matter if someone is a prime minister[2], media personality[3] or airline CEO. In this way, VIPs can experience the inadequate security processes and staffing levels that everyone else has to deal with, and hopefully with their louder voices will be able to force airports and government agencies to improve the situation for all.
[1] https://www.quora.com/As-a-pilot-how-does-it-feel-like-to-ha...
[2] https://www.theage.com.au/national/red-faces-as-nz-leader-ge...
[3] https://www.smh.com.au/traveller/travel-news/louise-milligan...
It is sadly an all-too-common occurence when you give uneducated dimwits police-level power with no oversight and no recourse for anyone affected. I assume flexing government power is the real objective here since everybody knows that security is not.
> We did not want to contact FlyCASS first as it appeared to be operated only by one person and we did not want to alarm them
It’s incredible (and entirely too credible) that this kind of “high security” integration could be built in such an amateur way: and a good reminder why government projects often seem to be run with more complexity than your startup devs might think is necessary.
Wait, what? Is this a euphemism for they didn't believe they would take it seriously? Reporting it over their heads to DHS was probably not less "alarming" to anyone...
This program seems like the root cause of the security issue.
(Outside of the US) I've often gone through security screenings just before or after crew groups in fast track, but otherwise normal security screening lanes.
Also… you can fix all the SQL issues, but you’re still not going to be able to fix the “men in hoodies with a big wrench talk to an authorized administrator (while their kids are kidnapped in Mexico)”
To be clear, I really hope they don’t, but they are also clearly trying to spin this in a way at odds with the researchers, and I’d hate to be in a position where they want to have leverage over me if I’d done this.
Brave that they did so though and I do think the severity of the vuln warrants this.
How do they protect against corrupt staff. It's like they're not even thinking. Why don't they just fast track staff checks.
Are they cryptographically signed by a system that was inaccessible?
Or is it just a matter of figuring out the bar code format and writing out some KCM id?
He convinced me at the time, but I wasn't expecting such an on-the-nose demonstration.
What I mean: security through obscurity is imo the best situation to be in. You can't attack something if you don't know it exists in the first place. That alone gives this system a leg up over more exposed (but hardened) platforms.
Second, convenience always beats secure. Requiring password rotations is worse than requiring none at all, because people tend to find the path of least resistance (writing a password on a notepad instead of memorizing).
If it was faster/easier to ship a useful (but vulnerable) app, that's net better than the app not shipping at all because of security hurdles. I have to imagine sanitizing inputs doesn't take much more time to include, but I don't know the systems involved.
Ultimately, what damage was experienced here? We can throw out hypotheticals about what -could- have happened, but you can't sue every driver on the road because they -could- have hit you.
An insecure system served a useful purpose for years, got more secure, and continues ticking.
These guy are going to end up with some serious federal charges.
(edit) the charging guidelines are somewhat re-assuring but still https://www.justice.gov/opa/pr/department-justice-announces-...
I’m continually amused, amazed, and exasperated at how classes of software defects older than I am continue to be a problem.
It is really telling that they try to cover up and deny instead of fix it, but not surprising. That is a natural consequence of authoritarian thinking, which is the entire premise and culture of the TSA. Any institution that covers up and ignores existential risks instead of confronting them head on will eventually implode by consequences of its own negligence- which hopefully will happen to the TSA.
The reason there aren't more terrorist attacks isn't because various security agencies around the world protect us from them. It's because there are extremely few terrorists.
Out of that multibillion dollar budget, TSA allocates $10.4M for “cybersecurity staffing, as well as the development and implementation of enhanced cybersecurity-related measures to improve cyber resiliency across the U.S. Transportation Systems Sector.”
Glad to see our tax dollars working so effectively! \s
What a joke of a country this is
[1] https://www.tsa.gov/news/press/testimony/2023/03/29/fiscal-y...
LOL
> Unfortunately, our test user was now approved to use both KCM and CASS
smh...
Related
CISA broke into a US federal agency, and no one noticed for a full 5 months
CISA's red team exercise at a US federal agency exposed critical security flaws, including an unpatched vulnerability in Oracle Solaris. Delays in patching allowed a breach, emphasizing the need for improved security measures.
Give Me the Green Light Part 1: Hacking Traffic Control Systems
The author uncovers a critical vulnerability in a traffic controller's web interface, allowing unauthorized access to manipulate traffic signals. Vendor response was dismissive, leading to community support and plans for a CVE.
Flightaware Security Breach
FlightAware reported a security breach on July 25, 2024, exposing user personal information. Affected users must reset passwords, raising concerns about security practices and accountability for data breaches.
FlightAware Leaks Customer Data (Name, Email Addresses and Passwords)
FlightAware reported a data breach exposing customer information due to a configuration error. Affected users must reset passwords, and notification was delayed over three weeks, violating EU regulations.
FlightAware configuration error leaked user data for years
FlightAware reported a data security incident exposing user information for over three years due to a configuration error. Affected users must reset passwords and are offered 24 months of identity protection.