A recent security vulnerability in a widely used airline integration service has exposed millions of users to account takeovers, raising concerns over the safety of online travel services.
Security researchers from Salt Labs discovered the flaw, which enabled hackers to access user accounts without authorization, potentially compromising sensitive information and airline loyalty points.
The vulnerability lies in integrating a popular third-party travel booking service (“Acme Travel”) and major airline websites.
This integration allows airline customers to book hotels and car rentals using their loyalty points. However, the API trust between the airline and Acme Travel became a weak link attackers could exploit.
At the heart of the issue is manipulating a parameter (“tr_returnUrl”) during the OAuth authentication process.
Attackers could create a malicious link that redirected authentication tokens (essentially user credentials) to servers under their control.
Once a legitimate user clicked the link and authenticated into their airline account, the attacker intercepted these tokens, gaining full access to the victim’s Acme Travel account.
This exploit allowed attackers to impersonate users, book hotels or car rentals using their loyalty points, and even update or cancel reservations without the user’s consent.
Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar
The normal login process between airlines and Acme Travel involves the following steps:
However, Salt Labs researchers discovered that the tr_returnUrl parameter, which determines where the tokens are sent, wasn’t validated by the backend server.
Attackers could replace this value with a URL they controlled. Once a user logged in, the attacker received the tokens, enabling account hijacking. For example:
Unsuspecting users clicking on such a link would unknowingly send their credentials to the attacker.
Potential Impact
The implications of this vulnerability were significant:
The integration service is used by dozens of major airlines globally, meaning millions of users may have been at risk.
Mitigation and Resolution
Salt Labs followed a responsible disclosure process, alerting the travel service provider to the vulnerability. The company confirmed the issue, implemented fixes, and closed the security gap.
As of now, the vulnerability has been mitigated, preventing further exploitation. To protect themselves, users are advised to:
This incident underscores the increasing risks posed by API supply chain attacks, where third-party integrations become the focus of exploitation.
While APIs enable seamless digital experiences, they also expand the attack surface. If one service fails to implement robust security measures, the entire chain can be compromised.
“This case highlights a critical need for better API governance and validation mechanisms,” said a spokesperson for Salt Labs.
“Every service provider must ensure rigorous verification of third-party interactions to prevent such vulnerabilities from slipping through.”
The discovery of this vulnerability serves as a wake-up call for organizations relying on integrated services.
While the rapid adoption of APIs has revolutionized digital interactions, security must remain a top priority to ensure the protection of user data and trust.
Collect Threat Intelligence with TI Lookup to improve your company’s security - Get 50 Free Request
Cybersecurity experts have uncovered a new exploit leveraging the widely used Remote Desktop Protocol (RDP).…
Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that is…
Experts at Wiz Research have identified a publicly exposed ClickHouse database belonging to DeepSeek, a…
The highly anticipated release of OPNsense 25.1 has officially arrived! Nicknamed "Ultimate Unicorn," this update…
Microsoft has officially added DeepSeek R1, an advanced AI model, to its Azure AI Foundry…
Researchers from the Georgia Institute of Technology and Ruhr University Bochum have uncovered two novel…