CyberInsecure.com

Daily cyber threats and internet security news: network security, online safety and latest security alerts
September 9th, 2009

RideMatch.info Exposes Sensitive Details On Military Personnel

Programming errors on a website that helps commuters carpool to work are exposing sensitive information of workers for hundreds of employers in Southern California, including at least one military installation.

The bugs, discovered last month on RideMatch.info, allow hackers access to a variety of personal information, including individuals’ names, home addresses, phone numbers, the times they commute to and from work, and in some cases employee numbers. The SQL injection vulnerability remained active at time of writing, more than two weeks after it was reported to a developer who runs the website.

“There’s sensitive data there that definitely shouldn’t be on the internet,” said Kristian Hermansen, a security researcher who identified the vulnerability after receiving an email from his employer saying he was required by law to provide the information. “The reason I am bringing this to your attention is that the issue is not being fixed by the admins and most companies don’t even know that their employees’ personal and corporate information, like employee ID and login ID, may have been compromised.”

The form Hermansen was required to complete asked for a wealth of personal information, including his typical work hours, the times he begins work on each workday, and his employee ID. “The state can impose monetary penalties on companies that fail to complete this survey,” an email sent by Hermansen’s employer warned.

The website is a joint project developed by transit authorities in five regional governments in Southern California. Individuals enter their work and home addresses and the time they leave from each, and the website pairs them up with others with home and office locations and commute times that are suitable for carpools. Hermansen said virtually all of the data is accessible to anyone who knows how to exploit the vulnerability. His tests revealed that at least one military institution was among the employers that used the website.

A spokesman for the Riverside County Transportation Commission, one of the agencies responsible for the website, said administrators are working to fix the problem with the help of Trapeze Group, an Ontario, Canada-based company that designed the carpool software.

“We’re confident we should have a fix for this in the next few days,” the spokesman, John Standiford, said. “Trapeze being the provider of that software, they’re trying to work with us and I guess others to come to a solution and fix the security problem.”

The security lapse on RideMatch.info is only the latest reminder of the perils of SQL injection vulnerabilities. Three weeks ago, federal prosecutors revealed that hackers who stole more than 130 million payment card numbers were able to penetrate the network defenses of Heartland Payment Systems and four other companies after exploiting the garden-variety bug.

The flaw is the result of web applications that fail to adequately scrutinize user-generated text entered into search boxes and other fields on websites. Hackers can exploit them to pass commands directly to a website’s backend database. Once identified, they can often be fixed in a matter of minutes, by changing a line or two of code.

The other agencies responsible for the site are: The Los Angeles County Metropolitan Transportation Authority, the Orange County Transportation Authority, the San Bernardino Associated Governments and the Ventura County Transportation Commission.

Share this item with others:

More on CyberInsecure:
  • Patients Personal Data Compromised In Walter Reed Army Medical Center
  • U.S. Military Contractor Booz Allen Hamilton Hacked, Emails And Sensitive Data Exposed
  • Hacker Published Confidential Records Belonging To Six Million Chileans On The Internet
  • Kaspersky.com USA Hacked Through SQL-Injection, Breach Exposes Sensitive Database
  • Military US Base Systems In Afghanistan And Iraq Hit By A Virus, At Least One Classified Network Penetrated

  • If you found this information useful, consider linking to it from your own website.
    Just copy and paste the code below into your website (Ctrl+C to copy)
    It will look like this: RideMatch.info Exposes Sensitive Details On Military Personnel

    Leave a Reply

    Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.

    *
    To prove you’re a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.