More details on One Planet York app vulnerability doesn't paint council in a good light  - opy - More details on One Planet York app vulnerability don’t paint council in a good light

For the past 24 hours or so, my interest has been piqued by the curious story of how a was found in the City of council’s recycling , and the council’s response to being told about the data-spilling flaw.

Now new information has come to light which makes it more difficult to defend some of the UK city’s actions and communications.

It appears that the initial discovery of the vulnerability was done by an unnamed employee of Leeds-based technology firm RapidSpike.

In a blog post, RapidSpike gives its side of the story denying the council’s claims that its employee failed to respond to the council’s questions (in fact, the firm claims, he responded within 18 minutes).

Compare what City of York council tweeted…

Council tweet  - council tweet - More details on One Planet York app vulnerability don’t paint council in a good light

… to the email exchange shared by RapidSpike:

Emails  - emails - More details on One Planet York app vulnerability don’t paint council in a good light

That looks to me like the person who found the vulnerability *was* responding to the council’s emails.

Vulnerability researcher 1. City of York Council 0.

Now let’s look at the actual vulnerability in the One York app.

RapidSpike’s employee discovered that if anyone accessed the One Planet York app’s “Leaderboard” screen, personal of the app’s ten users were sent to the app in plaintext. According to RapidSpike’s blog post that included a wealth of sensitive information:

This personal data included the users’ name, email address, phone number, postal address, postcode and other sensitive information such as their hashed password (which appeared to be a SHA256 hash, at least) and that password’s salt.

Notice something? The vulnerability researcher didn’t have to do anything convoluted or sneaky to get the app to carelessly send unencrypted sensitive information to his smartphone. All he had to do was click on the app’s leaderboard and the information was sent.

By that logic, if the researcher was guilty of “deliberate and unauthorised access” then so should anybody else who was running the app.

We need to arrest all of York! Or at least the app’s nearly 6000 users.

Vulnerability researcher 2. City of York Council 0.

To be fair, I do think some of the actions taken by the council were ones. They withdrew the app, contacted users, told them to change their passwords, informed the ICO. Maybe they were even justified in contacting the police in case others might have abused the sloppily-coded app to extract citizen’s personal information.

But what York council seems to have done wrong is present the incident as though a vulnerability researcher wasn’t doing everything in their power to be responsible and get a serious problem fixed as soon as possible.

- aa9ea0686c5d1aa9086d4b12c3aa05f2 s 80 d mm r g - More details on One Planet York app vulnerability don’t paint council in a good light

About the author, Graham Cluley

Graham Cluley is a veteran of the anti-virus having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon’s Anti-Virus Toolkit for Windows. Now an independent security analyst, he regularly makes media appearances and is an international public speaker on the topic of computer security, hackers, and online privacy.

Follow him on Twitter at @gcluley, or drop him an email.

Follow @gcluley





Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here