Programmer Discovers Unprotected Access to State's Jobless Claims Portal's Admin Mode (arktimes.com) 50
Long-time Slashdot reader bbsguru shares a story from the alternative newsweekly the Arkansas Times. "A computer programmer applying for unemployment on Arkansas's Pandemic Unemployment Assistance program discovered a vulnerability in the system that exposed the Social Security numbers, bank account and routing numbers and other sensitive information of some 30,000 applicants.
"Anyone with basic computer knowledge could have accessed personal information for malicious purposes." Alarmed, the computer programmer called the Arkansas Division of Workforce Services Friday morning and was told by an operator that there was no one available who could talk to him. He then tried someone at the Arkansas State Police Criminal Investigation Division, who told the programmer he would find the person he needed to talk with to fix the situation. The programmer later called the Arkansas Times for advice on whom to call. The Times alerted the Division of Workforce Services to the issue at 4:30 p.m. Soon after a message appeared on the website that said, "The site is currently under maintenance...."
In exploring the website, the computer programmer determined that by simply removing part of the site's URL, he could access the administrative portal of the site, where he had the option of editing the personal information of applicants, including bank account numbers. From the admin portal, he viewed the page's source code and saw that the site was using an API (application programming interface) to connect with a database. That API was also left unencrypted, and he could access all of the applicants' raw data, included Social Security numbers and banking information...
The computer programmer said he thought he could have programmed a script that would gather all of the information from the API in under an hour.
"Anyone with basic computer knowledge could have accessed personal information for malicious purposes." Alarmed, the computer programmer called the Arkansas Division of Workforce Services Friday morning and was told by an operator that there was no one available who could talk to him. He then tried someone at the Arkansas State Police Criminal Investigation Division, who told the programmer he would find the person he needed to talk with to fix the situation. The programmer later called the Arkansas Times for advice on whom to call. The Times alerted the Division of Workforce Services to the issue at 4:30 p.m. Soon after a message appeared on the website that said, "The site is currently under maintenance...."
In exploring the website, the computer programmer determined that by simply removing part of the site's URL, he could access the administrative portal of the site, where he had the option of editing the personal information of applicants, including bank account numbers. From the admin portal, he viewed the page's source code and saw that the site was using an API (application programming interface) to connect with a database. That API was also left unencrypted, and he could access all of the applicants' raw data, included Social Security numbers and banking information...
The computer programmer said he thought he could have programmed a script that would gather all of the information from the API in under an hour.
Nice... (Score:5, Insightful)
Dude is lucky they didnâ(TM)t have him arrested for hacking.
Re: (Score:1)
Exactly. It is a mistake to give up your name when exposing this shit.
Re: (Score:1)
Re: (Score:3)
Re: (Score:2)
not really. he was trying to do the right thing. good for him.
Yes, but the saying, "No good deed goes unpunished." didn't come from nowhere.
Re: Nice... (Score:3)
Nah, he will be rewarded; the state of New Jersey would like to know how much COBOL he can ahem, "hack".
Re:Nice... (Score:4, Informative)
Sorry, but it's happened before. And often.
Re: (Score:1)
Sorry, but it's happened before. And often.
Well I imagine it has to be 50-50 "wtf who the hell are you poking about it in our systems looking for exploits" and "oh holy shit thank you for bringing this to our attention", I mean at any employer I've had trying to hack their systems and steal data would be a fire-able offense. Many of them jail-able, in fact. If we take this over to the real world, maybe you did burglarize a home and found their drug stash or terror plans or child porn. But to get to that point, you must have been committing a burglar
Re: (Score:2)
There have been people specifically hired to do penetration testing who have been arrested for doing it. In the case that hit the slashdot front pages they eventually got off. That hasn't happened every time.
Re: (Score:2)
Re:Nice... (Score:4, Insightful)
They can still do it.
Re: (Score:2)
Re: (Score:1)
I told my daughter this was gong to happen (Score:2)
Re: (Score:2)
The code has not been touched in 13 years.
Re: (Score:2)
Re:I told my daughter this was gong to happen (Score:5, Informative)
The style sheet is dated March 21, 2007; the javascript library is dated August 15, 2007.
That said, it's not like people didn't know better back then than to rely on URL obscurity for security. It's not even necessarily the programmer's fault. Maybe they relied on HTTP authentication, which went away with a server upgrade or something.
And the official response? (Score:3)
Then she fell on the floor LHAO...
Re: (Score:2)
It looks exactly the same today as it did in 2003.
That's not a problem.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
but that is NOT the site that was compromised. Arkansas currently has two. according to reports, the one that was compromised was just built for this pandemic to take the load off of the main system. guess they got in too big of a hurry to get online.
I do agree though, the dws site does look like an amateur built it. you should see the pages where you have to log in to get to. it looks terrible but it works. and yes, I live in arkansas drawing unemployment while on furlough.
Re: (Score:2)
Just go look at the landing page for Arkansas DWS [arkansas.gov]. It just gets worse from there. Old school doesn't apply here. It looks exactly the same today as it did in 2003.
This is terrifying. I can't imagine typing personal information into that page.
And I thought Michigan's sites were outdated garbage. Holy crap.
I have to add this (Score:3)
Re: (Score:3)
From the landing page
This site is best suited if used with Microsoft Internet Explorer 6.0 or higher or Mozilla Firefox 2.0.
It's not wrong.
Re: (Score:2)
In small font at the bottom of the page... (Score:2)
Fuck programmers (Score:2)
This doesn't have to happen... (Score:3)
This doesn't have to happen. There are more than enough engineers and coders that would be willing to help states to lock down their systems pro bono. I would.
Re: (Score:2)
Oh, that's not how government works.
It's important to shift your perspective when thinking about government/large business. It's not a question of cost. Cost simply isn't a constraint. To a certain extent, the more expensive something is, the better. For some "better" means it's higher quality, for others "better" means it boosts their budgets higher ( and thus, keeps their budgets higher ).
Regardless, no one wants a product they can get for free.
Re: (Score:2)
Re: (Score:1)
Far more common than this (Score:4, Insightful)
There are servers and web sites sitting out there that were built over a decade ago by student workers "learning how to code 101" types because state agencies couldn't afford to pay for real professionals.
I'm actually surprised this isn't reported in the new more often. (Or, there are a lot of programmers who find the holes and don't say anything - or worse.
Kudos to the guy that made the effort to force the agency to take action.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Anyway recently I saw a case where there was an extremely obvious security bug, so bad that even non-technical people could understand the impact and how to exploit it. The lead developer said, "Our security is good, we just missed one case." I didn't even know how to answer that.
Stupid but that data is unimportant (Score:2)
If you've ever written a check to anyone or done a wire transfer, etc, then you have given that information to someone else. Every check has your name account number and routing number printed on it.
Yes, it was way fucking stupid they left a huge hole open but there's no critical data lost, if the summary is correct about what was there.
Can we pretend to be grown up about this stuff and stop going into panic mode over the "hack" of data that's
Re: (Score:2)
...but there's no critical data lost, if the summary is correct about what was there.
I think you missed the part of the summary that said Social Security numbers were exposed.
Re: (Score:2)
it was laughable to think it was ever private
Re: Stupid but that data is unimportant (Score:2)
Re: (Score:1)
Re: Stupid but that data is unimportant (Score:2)
Ok, so let's assume Bad Guy has the full name, ssn, home address and bank info for 30k random people in a region.
Now what?
Reading that headline gave me cancer. (Score:1)
Or should I say: Headline's readings cancer's me given?