Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/28/2019
07:10 PM
50%
50%

FirstAm Leak Highlights Importance of Verifying the Basics

The Fortune 500 giant in the real estate industry missed a basic vulnerability in its website, leaving as many as 885 million sensitive records accessible to attackers. The fix: teaching developers the top 10 security issues and frequent testing.

A simple-to-exploit vulnerability in the website of real estate insurance giant First American Financial that could have resulted in the theft of hundreds of millions of sensitive records underscores the importance of verifying basic security measures and implementing secure programming practices, experts said this week.

The vulnerability, first reported by KrebsOnSecurity, allowed anyone with a valid link to a document on the site to increment the identifier to access the next document in sequence, as processed by the firm. The journalist found that the first record accessible through the site, document 000000075, dated back to 2003.

The basic error is a major misstep for the financial firm. The class of vulnerability is so well known that it had its own slot on the popular Open Web Application Security Project (OWASP) Top 10 list of web security vulnerabilities, "A4-Insecure Direct Object References," for four years, and is so easy to find that a simple Google search often turns up the issue.

"You don't need a sophisticated security solution to find these issues," says Greg Pollock, vice president of products for cloud-security firm UpGuard. "It's not about bulking up on cutting-edge DevOps or continuous integration testing, but back-to-basics engineering practices and having a culture that, if an engineer sees something wrong — and they should have seen something wrong here — they raise the issue and it gets fixed."

Beyond the Top 10
The incident underscores that while many security firms urge customers to "go beyond the OWASP Top 10," a large portion of companies still need to make sure their software developers, application security specialists, and operations teams are meeting basic hurdles. The problem is that developers who do not consider the security implications in the design of their software application may look at a database of millions of records and decide to just index them using a sequential code and, worse, expose that code through the URL in a web application.

"[Y]ou should never expose direct references to your data," Jeff Williams, chief technology officer for Contrast Security, said in a statement on the incident. "Instead, you should always use an indirect reference that only allows access to authorized resources. This takes a bit of extra work, but this is a mandatory part of any internet web application or API."

While there is currently no evidence that anyone accessed the data, the information held by First American is a treasure trove for financial fraudsters and identity thieves. First American is a title insurance company, a critical supplier of information used during the process of selling and buying homes. Title insurance companies collect information from both the buyer and the seller in a real estate transaction, verifying and taking custody of a great deal of sensitive information.

Among the documents that could be accessed through the website were bank account statements, mortgage records, tax information, Social Security numbers, driver's license images, and receipt of money transfers, according to KrebsOnSecurity.

First American acknowledged the vulnerability, calling it "a reported design defect that created the potential for unauthorized access to customer data" in a statement released on May 28.

"We deeply regret the concern this defect has caused," Dennis J. Gilmore, CEO at First American Financial, said in the statement. "We are thoroughly investigating this matter and are fully committed to protecting the security, privacy and confidentiality of the information entrusted to us by our customers."

A real estate developer originally found the issue and reached out to KrebsOnSecurity, which verified the security flaw and contacted First American. After the company had fixed the issue, KrebsOnSecurity published its report.

Although the latest version of the OWASP Top 10, published in 2017, no longer has a category named for the specific class of vulnerabilities, insecure direct object references are one of the two categories that make up a new entry in the top 10 list known as "A5-Broken Access Control."

"Access control weaknesses are common due to the lack of automated detection, and lack of effective functional testing by application developers," OWASP states on its site, adding: "Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification or destruction of all data, or performing a business function outside of the limits of the user."

Two years ago, most companies had to worry about denial-of-service attacks on their web applications. Today, a wide variety of access control issues dominate the list of cloud security issues, according to the SANS Institute's annual survey. Account or credential hijacking is the top issue, followed by misconfiguration, privileged user abuse, unauthorized application components, and insecure APIs or interfaces, according to the SANS Institute's "2019 State of Cloud Security" report.

Developers need to be knowledgeable about such common issues and create tests to check code for any errors that could undermine security, UpGuard's Pollock says.

"While it is trivial to iterate through and pull out as many documents as you want, the flip side of it — and again why this one has gone undetected so long — is that it is much harder to do mass scans for these direct object references," he says. "Companies need to be mindful that this is a problem [and] have some sort of penetration testing or dynamic testing that looks for data leaks."

Related Content

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
5/29/2019 | 7:19:11 AM
Respect software developers
Management may have a part in this discussion too.   Outsourcing - writing code can be done from anywhere in the world whether Lincoln, Nebraska or Pune.  It is a damn sight cheaper to do it in Pune and while talented folk do exist in India, all too often it is young and dumb.  Sounds horrible I know but very much true and so companies, to save bucks, hire inexpensive talent wherever they can find them and with limited or no benefit expenses to boot.  Result = poorly written, non-tested code that has holes in it.  Thousand of miles away also removes true group participation with a time difference thrown in.  Whether overseas or domestic staff, talent should be good if not excellent on certain IT functions.  Now I am not surprised by this for look how many talented IT staffers in THIS country miss BACKUP PROTOCOLS, DISASTER RECOVERY PROCEDURES and BUSINESS CONTINUITY PLANNING.  How can you then expect true quality work from anybody if WE miss out on the basics.  Forget the advanced stuff - we're dead at the starting line. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:36:12 AM
Re: Respect software developers
Outsourcing - writing code can be done from anywhere in the world whether Lincoln, Nebraska or Pune. I think it is less about where you code more about how you code.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
5/29/2019 | 8:46:36 AM
Re: Respect software developers
TRUE and it is the quality of coding that is the point - I may be jaded but my experience with India in general, not specific, has been less than quality folk.  I have dealt with wonderful experts who are great people --- all too few and far between alas.  I just don't see real quality work coming out of Bangalore most of the time.  Freshers, people with NEW degrees, also lack experience --- and whether HERE OR OVER THERE.  
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:37:40 AM
Re: Respect software developers
to save bucks, hire inexpensive talent wherever they can find them and with limited or no benefit expenses to boot. This makes sense, we need skills to do good secure coding.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:38:51 AM
Re: Respect software developers
Result = poorly written, non-tested code that has holes in it. Agree. That is why we need a testing phase to find all the bugs and fix them.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:40:28 AM
Re: Respect software developers
How can you then expect true quality work from anybody if WE miss out on the basics. Forget the advanced stuff - we're dead at the starting line. This really makes sense. Basics have to be covered first, if not it does not matter what else you do.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:35:12 AM
Basics
First American Financial that could have resulted in the theft of hundreds of millions of sensitive records underscores the importance of verifying basic security measures and implementing secure programming practices, experts said this week. If they could not do basics they should not be in the business of holding others data.
Mobile Banking Malware Up 50% in First Half of 2019
Kelly Sheridan, Staff Editor, Dark Reading,  1/17/2020
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7227
PUBLISHED: 2020-01-18
Westermo MRD-315 1.7.3 and 1.7.4 devices have an information disclosure vulnerability that allows an authenticated remote attacker to retrieve the source code of different functions of the web application via requests that lack certain mandatory parameters. This affects ifaces-diag.asp, system.asp, ...
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.