lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 4 Apr 2014 16:31:44 -0500 From: David Longenecker <dnlongen@...il.com> To: fulldisclosure@...lists.org Subject: [FD] Credit Cards for 1.2 Million Drivers Vulnerable at TxTag.org There is a serious flaw at TxTag.org, the Texas Department of Transportation's toll road account management system. This flaw exposes personal information for the (as of December 31) 1.2 million drivers with active TxTags, including names, full mailing addresses, email addresses, phone numbers, and credit card numbers with expiration date. TxTag.org uses predictable account names - an 8-digit number beginning with the number 2. Account holders may select a custom account name, but the original 8-digit TxTag number assigned to the account remains valid. Further, TxTag.org limits users to a 4-digit numeric PIN. That in and of itself is a recipe for abuse. To make matters worse, TxTag inexplicably stores the complete credit card number with expiration date as a hidden field on the Update AutoPay Methods page. http://dnlongen.blogspot.com/2014/04/credit-cards-for-12-million-drivers.html -- Regards, David Longenecker Connect: Security Blog <http://dnlongen.blogspot.com> | Security Twitter<https://www.twitter.com/dnlongen> | Awana Twitter <https://www.twitter.com/dstx_awana> | LinkedIn<https://www.linkedin.com/in/dnlongen/> _______________________________________________ Sent through the Full Disclosure mailing list http://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists