Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/28/2019
07:10 PM
50%
50%

FirstAm Leak Highlights Importance of Verifying the Basics

The Fortune 500 giant in the real estate industry missed a basic vulnerability in its website, leaving as many as 885 million sensitive records accessible to attackers. The fix: teaching developers the top 10 security issues and frequent testing.

A simple-to-exploit vulnerability in the website of real estate insurance giant First American Financial that could have resulted in the theft of hundreds of millions of sensitive records underscores the importance of verifying basic security measures and implementing secure programming practices, experts said this week.

The vulnerability, first reported by KrebsOnSecurity, allowed anyone with a valid link to a document on the site to increment the identifier to access the next document in sequence, as processed by the firm. The journalist found that the first record accessible through the site, document 000000075, dated back to 2003.

The basic error is a major misstep for the financial firm. The class of vulnerability is so well known that it had its own slot on the popular Open Web Application Security Project (OWASP) Top 10 list of web security vulnerabilities, "A4-Insecure Direct Object References," for four years, and is so easy to find that a simple Google search often turns up the issue.

"You don't need a sophisticated security solution to find these issues," says Greg Pollock, vice president of products for cloud-security firm UpGuard. "It's not about bulking up on cutting-edge DevOps or continuous integration testing, but back-to-basics engineering practices and having a culture that, if an engineer sees something wrong — and they should have seen something wrong here — they raise the issue and it gets fixed."

Beyond the Top 10
The incident underscores that while many security firms urge customers to "go beyond the OWASP Top 10," a large portion of companies still need to make sure their software developers, application security specialists, and operations teams are meeting basic hurdles. The problem is that developers who do not consider the security implications in the design of their software application may look at a database of millions of records and decide to just index them using a sequential code and, worse, expose that code through the URL in a web application.

"[Y]ou should never expose direct references to your data," Jeff Williams, chief technology officer for Contrast Security, said in a statement on the incident. "Instead, you should always use an indirect reference that only allows access to authorized resources. This takes a bit of extra work, but this is a mandatory part of any internet web application or API."

While there is currently no evidence that anyone accessed the data, the information held by First American is a treasure trove for financial fraudsters and identity thieves. First American is a title insurance company, a critical supplier of information used during the process of selling and buying homes. Title insurance companies collect information from both the buyer and the seller in a real estate transaction, verifying and taking custody of a great deal of sensitive information.

Among the documents that could be accessed through the website were bank account statements, mortgage records, tax information, Social Security numbers, driver's license images, and receipt of money transfers, according to KrebsOnSecurity.

First American acknowledged the vulnerability, calling it "a reported design defect that created the potential for unauthorized access to customer data" in a statement released on May 28.

"We deeply regret the concern this defect has caused," Dennis J. Gilmore, CEO at First American Financial, said in the statement. "We are thoroughly investigating this matter and are fully committed to protecting the security, privacy and confidentiality of the information entrusted to us by our customers."

A real estate developer originally found the issue and reached out to KrebsOnSecurity, which verified the security flaw and contacted First American. After the company had fixed the issue, KrebsOnSecurity published its report.

Although the latest version of the OWASP Top 10, published in 2017, no longer has a category named for the specific class of vulnerabilities, insecure direct object references are one of the two categories that make up a new entry in the top 10 list known as "A5-Broken Access Control."

"Access control weaknesses are common due to the lack of automated detection, and lack of effective functional testing by application developers," OWASP states on its site, adding: "Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification or destruction of all data, or performing a business function outside of the limits of the user."

Two years ago, most companies had to worry about denial-of-service attacks on their web applications. Today, a wide variety of access control issues dominate the list of cloud security issues, according to the SANS Institute's annual survey. Account or credential hijacking is the top issue, followed by misconfiguration, privileged user abuse, unauthorized application components, and insecure APIs or interfaces, according to the SANS Institute's "2019 State of Cloud Security" report.

Developers need to be knowledgeable about such common issues and create tests to check code for any errors that could undermine security, UpGuard's Pollock says.

"While it is trivial to iterate through and pull out as many documents as you want, the flip side of it — and again why this one has gone undetected so long — is that it is much harder to do mass scans for these direct object references," he says. "Companies need to be mindful that this is a problem [and] have some sort of penetration testing or dynamic testing that looks for data leaks."

Related Content

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
5/29/2019 | 8:46:36 AM
Re: Respect software developers
TRUE and it is the quality of coding that is the point - I may be jaded but my experience with India in general, not specific, has been less than quality folk.  I have dealt with wonderful experts who are great people --- all too few and far between alas.  I just don't see real quality work coming out of Bangalore most of the time.  Freshers, people with NEW degrees, also lack experience --- and whether HERE OR OVER THERE.  
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:40:28 AM
Re: Respect software developers
How can you then expect true quality work from anybody if WE miss out on the basics. Forget the advanced stuff - we're dead at the starting line. This really makes sense. Basics have to be covered first, if not it does not matter what else you do.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:38:51 AM
Re: Respect software developers
Result = poorly written, non-tested code that has holes in it. Agree. That is why we need a testing phase to find all the bugs and fix them.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:37:40 AM
Re: Respect software developers
to save bucks, hire inexpensive talent wherever they can find them and with limited or no benefit expenses to boot. This makes sense, we need skills to do good secure coding.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:36:12 AM
Re: Respect software developers
Outsourcing - writing code can be done from anywhere in the world whether Lincoln, Nebraska or Pune. I think it is less about where you code more about how you code.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:35:12 AM
Basics
First American Financial that could have resulted in the theft of hundreds of millions of sensitive records underscores the importance of verifying basic security measures and implementing secure programming practices, experts said this week. If they could not do basics they should not be in the business of holding others data.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
5/29/2019 | 7:19:11 AM
Respect software developers
Management may have a part in this discussion too.   Outsourcing - writing code can be done from anywhere in the world whether Lincoln, Nebraska or Pune.  It is a damn sight cheaper to do it in Pune and while talented folk do exist in India, all too often it is young and dumb.  Sounds horrible I know but very much true and so companies, to save bucks, hire inexpensive talent wherever they can find them and with limited or no benefit expenses to boot.  Result = poorly written, non-tested code that has holes in it.  Thousand of miles away also removes true group participation with a time difference thrown in.  Whether overseas or domestic staff, talent should be good if not excellent on certain IT functions.  Now I am not surprised by this for look how many talented IT staffers in THIS country miss BACKUP PROTOCOLS, DISASTER RECOVERY PROCEDURES and BUSINESS CONTINUITY PLANNING.  How can you then expect true quality work from anybody if WE miss out on the basics.  Forget the advanced stuff - we're dead at the starting line. 
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13640
PUBLISHED: 2019-07-17
In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed.
CVE-2019-5222
PUBLISHED: 2019-07-17
There is an information disclosure vulnerability on Secure Input of certain Huawei smartphones in Versions earlier than Tony-AL00B 9.1.0.216(C00E214R2P1). The Secure Input does not properly limit certain system privilege. An attacker tricks the user to install a malicious application and successful ...
CVE-2019-1919
PUBLISHED: 2019-07-17
A vulnerability in the Cisco FindIT Network Management Software virtual machine (VM) images could allow an unauthenticated, local attacker who has access to the VM console to log in to the device with a static account that has root privileges. The vulnerability is due to the presence of an account w...
CVE-2019-1920
PUBLISHED: 2019-07-17
A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling conditi...
CVE-2019-1923
PUBLISHED: 2019-07-17
A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by access...