Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Flaws in Uber’s UberCENTRAL Tool Exposed User Data

Several vulnerabilities have been identified in Uber’s recently launched UberCENTRAL service. The ride-sharing company patched the flaws and rewarded the expert who found them.

Several vulnerabilities have been identified in Uber’s recently launched UberCENTRAL service. The ride-sharing company patched the flaws and rewarded the expert who found them.

Announced in late July, UberCENTRAL provides a dashboard that companies can use to pay for Uber rides on behalf of their customers. UberCENTRAL administrators can add operators (i.e. employees who request rides for customers) based on their email address.

Since the rules of Uber’s bug bounty program specifically mention enumeration issues, bounty hunter Kevin Roh decided to see if such flaws are present in UberCENTRAL. Uber is particularly interested in vulnerabilities that can be used to enumerate users’ universally unique identifiers (UUIDs) via phone numbers or email addresses as these can allow insecure direct object reference (IDOR) attacks.

One of the flaws discovered by Roh allowed attackers to enumerate user UUIDs by sending requests with possible email addresses. If the email address is associated with an account, the response from the server will include the user’s UUID. If the email address is not valid, the response will contain an error.

While the second issue identified by the expert is similar, the third security hole he found could have been exploited to obtain not only UUIDs, but also full names, phone numbers and email addresses.

These issues were reported to Uber in September and October, and they were patched in October. The company awarded Roh hundreds of dollars for each of the vulnerabilities, but the exact amounts have not been disclosed. Roh is one of the top hackers in Uber’s bug bounty program.

The company says it has paid out more than $700,000 so far, with the average bounty ranging between $750 and $1,000. A researcher earned $10,000 this summer after informing Uber of a critical flaw in a third-party WordPress plugin used on the company’s websites.

Researchers from security consulting and audit firm Integrity informed Uber of 14 flaws, including ones that could have allowed attackers to access the details of Uber drivers and passengers.

Advertisement. Scroll to continue reading.

Related: Uber Lures Facebook Security Chief Joe Sullivan to be CSO

Related: Uber Hires Car Hackers Charlie Miller, Chris Valasek

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join SecurityWeek and Hitachi Vantara for this this webinar to gain valuable insights and actionable steps to enhance your organization's data security and resilience.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

Former Darktrace CEO Poppy Gustafsson has joined the UK government as Minister for Investment.

Nupur Goyal has joined cloud identity security and management solutions provider Saviynt as VP of Product Marketing.

Threat intelligence firm Intel 471 has appointed Mark Huebeler as its COO and CFO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.