Data Breaches

Customer Information of Toyota Insurance Company Exposed Due to Misconfigurations

Exposed credentials for an email address at an Indian Toyota insurance broker led to customer information compromise.

Exposed credentials for an email address at an Indian Toyota insurance broker led to customer information compromise.

A series of misconfigurations and security vulnerabilities allowed a researcher to access customer information stored in an email account at Toyota Tsusho Insurance Broker India (TTIBI).

The unauthorized access, US-based researcher Eaton Zveare explains, was possible because the TTIBI site had a dedicated Eicher Motors subdomain, with a premium calculator.

TTIBI is an insurance broker under the Toyota Tsusho Insurance Management Corporation in Japan, and appears to have a close partnership with Eicher Motors, an Indian automotive company that makes motorcycles and commercial vehicles.

According to Zveare, he gained access to the noreplyeicher@ttibi.co.in email address after discovering that the Eicher Android application contained a link to a premium calculator on ttibi.co.in, which exposed a client-side email-sending mechanism in the page source.

The researcher created an API request to check whether authentication was required, and was able to successfully send an email, but also received a server error that included the base64 encoded password for the ‘noreply’ email account.

“The noreply account could be the most important account in an organization because it could potentially have a record of everything they have ever sent to customers. In TTIBI’s case, that is exactly what it is and the amount of information revealed is enormous,” Zveare notes.

Within the email account, the researcher found records of all messages sent to customers, which included customer information, password reset links, one-time passwords (OTPs), and insurance policy documents.

Additionally, access to the email account also provided access to TTIBI’s Microsoft cloud account, including to the corporate directory and to SharePoint and Teams services.

Advertisement. Scroll to continue reading.

The extended level of access, Zveare points out, was the result of five security issues and misconfigurations: the client-side email-sending mechanism, the lack of API authentication, the API response leaking information, the lack of two-factor authentication, and the retention of all emails that were sent and received from the account.

According to Zveare, it took TTIBI two months to take the Eicher subdomain offline and require an authentication mechanism for the exposed API. However, the password for the ‘noreply’ email account was still the same when the researcher verified access on January 17.

Related: Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data

Related: Vulnerability in Toyota Management Platform Provided Access to Customer Data

Related: Vulnerability Provided Access to Toyota Supplier Management Network

Related Content

Data Breaches

Tech giant notifies millions of customers that full names and physical mailing addresses were stolen during a security incident.

Data Breaches

Acuity, the tech firm from which hackers claimed to have stolen State Department and other government data, confirms hack, but says stolen info is...

Data Breaches

A weakness in a Firebase implementation allowed researchers to gain access to names, phone numbers, email addresses, plaintext passwords, confidential messages, and more.

Vulnerabilities

ExpressVPN disables split tunneling on Windows after learning that DNS requests were not properly directed.

Government

Former CIA software engineer sentenced to 40 years in prison for biggest theft of classified information in CIA history and for possession of child...

Data Breaches

A leaked token provided unrestricted access to the entire source code on Mercedes-Benz’s GitHub Enterprise server.

Cybercrime

Naz.API credential stuffing list containing 70 million unique email addresses and old passwords found on hacking forum.

Uncategorized

Real Estate Wealth Network database containing real estate ownership data, including for celebrities and politicians, was found unprotected.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version