[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAKAWO_X=8rW=aH9_a_BXj5ZyYSHQ1JWFWHzjduHfyWLxVpvQ4Q@mail.gmail.com>
Date: Fri, 4 Apr 2014 16:31:44 -0500
From: David Longenecker <dnlongen@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] Credit Cards for 1.2 Million Drivers Vulnerable at TxTag.org
There is a serious flaw at TxTag.org, the Texas Department of
Transportation's toll road account management system. This flaw exposes
personal information for the (as of December 31) 1.2 million drivers with
active TxTags, including names, full mailing addresses, email addresses,
phone numbers, and credit card numbers with expiration date.
TxTag.org uses predictable account names - an 8-digit number beginning with
the number 2. Account holders may select a custom account name, but the
original 8-digit TxTag number assigned to the account remains valid.
Further, TxTag.org limits users to a 4-digit numeric PIN. That in and of
itself is a recipe for abuse. To make matters worse, TxTag inexplicably
stores the complete credit card number with expiration date as a hidden
field on the Update AutoPay Methods page.
http://dnlongen.blogspot.com/2014/04/credit-cards-for-12-million-drivers.html
--
Regards,
David Longenecker
Connect: Security Blog <http://dnlongen.blogspot.com> | Security
Twitter<https://www.twitter.com/dnlongen> |
Awana Twitter <https://www.twitter.com/dstx_awana> |
LinkedIn<https://www.linkedin.com/in/dnlongen/>
_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists