lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 18 Aug 2005 15:21:58 +0000 GMT
From: "Jason Coombs" <jasonc@...ence.org>
To: "Bugtraq" <bugtraq@...urityfocus.com>
Cc: postmaster@...eticsUSA.com, info@...eticsUSA.com, security@...eticsUSA.com,
	webmaster@...eticsUSA.com,
	Full-Disclosure <full-disclosure@...ts.grok.org.uk>,
	support@...eticsUSA.com
Subject: Sensitive Information Disclosure Vulnerability in
	Kinetics Kiosk Product


The following script error message was noted being displayed this morning on an airline check-in kiosk manufactured by Kinetics USA.

Vendor: Kinetics USA
www.kineticsUSA.com


Line: 107
Char: 2
Error: object expected
Code: 0
URL: http://151.151.10.46:64080/attract
?time=1124376480&TransactionID=HNL_KIOSK09-050818044716

Clearly, building a product such as a publicly-accessible airline passenger check-in kiosk using Internet Explorer and Windows is a very bad design decision if you care at all about preventing this sort of information disclosure.

Even so, IE can and should be configured so as not to display such script errors.

Furthermore, the use of an IP address that is outside of the RFC 1918 private subnet address range appears very irresponsible.

Sincerely,

Jason Coombs
jasonc@...ence.org
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ