Dodo customers exposed by insecure direct object reference hole

By

Timeout script failed.

Name, address, phone numbers and account details of Dodo Power and Gas customers have been exposed thanks to two security gaffes which made online statements publicly accessible.

Dodo customers exposed by insecure direct object reference hole

Users could access accounts for up to 500 customers via an insecure direct object reference vulnerability which granted access when URL address were correctly manipulated.

The flaw was one of the most common affecting online websites.

The number of affected Dodo Power and Gas customers was limited to between 100 to 500 people because the statements were posted only at a customers' request,

Each statement was made available for "a number of hours", Dodo chief Larry Kestelman told the SMH which first reported the story.

The statements were supposed to be deleted earlier by an automated script which had failed.

Kestelman said the company had fixed the flaw.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:

Most Read Articles

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Accenture to buy Australian cyber security firm CyberCX

Accenture to buy Australian cyber security firm CyberCX

TPG Telecom reveals iiNet order management system breached

TPG Telecom reveals iiNet order management system breached

"Shade BIOS" stealth malware hides below operating system

"Shade BIOS" stealth malware hides below operating system

Log In

  |  Forgot your password?