Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Flaws in Uber’s UberCENTRAL Tool Exposed User Data

Several vulnerabilities have been identified in Uber’s recently launched UberCENTRAL service. The ride-sharing company patched the flaws and rewarded the expert who found them.

Several vulnerabilities have been identified in Uber’s recently launched UberCENTRAL service. The ride-sharing company patched the flaws and rewarded the expert who found them.

Announced in late July, UberCENTRAL provides a dashboard that companies can use to pay for Uber rides on behalf of their customers. UberCENTRAL administrators can add operators (i.e. employees who request rides for customers) based on their email address.

Since the rules of Uber’s bug bounty program specifically mention enumeration issues, bounty hunter Kevin Roh decided to see if such flaws are present in UberCENTRAL. Uber is particularly interested in vulnerabilities that can be used to enumerate users’ universally unique identifiers (UUIDs) via phone numbers or email addresses as these can allow insecure direct object reference (IDOR) attacks.

One of the flaws discovered by Roh allowed attackers to enumerate user UUIDs by sending requests with possible email addresses. If the email address is associated with an account, the response from the server will include the user’s UUID. If the email address is not valid, the response will contain an error.

While the second issue identified by the expert is similar, the third security hole he found could have been exploited to obtain not only UUIDs, but also full names, phone numbers and email addresses.

These issues were reported to Uber in September and October, and they were patched in October. The company awarded Roh hundreds of dollars for each of the vulnerabilities, but the exact amounts have not been disclosed. Roh is one of the top hackers in Uber’s bug bounty program.

The company says it has paid out more than $700,000 so far, with the average bounty ranging between $750 and $1,000. A researcher earned $10,000 this summer after informing Uber of a critical flaw in a third-party WordPress plugin used on the company’s websites.

Researchers from security consulting and audit firm Integrity informed Uber of 14 flaws, including ones that could have allowed attackers to access the details of Uber drivers and passengers.

Related: Uber Lures Facebook Security Chief Joe Sullivan to be CSO

Related: Uber Hires Car Hackers Charlie Miller, Chris Valasek

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Vulnerabilities

Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.