USPS exposes 60M customer records via a leaky API
The U.S. Postal Service has patched a security vulnerability that exposed the data of some 60 million customers to anyone who was logged into the USPS.com website.
Made public Sunday by security researcher Brian Krebs, the vulnerability related to an authentication weakness in an application programming interface being used on the USPS website.
The API in question, ironically called “Informed Visibility,” had been designed to allow bulk mail senders track and analyze mail. Instead of restricting services to bulk mail senders alone, the API allowed anyone logged in to USPS.com to query the system for account details belonging to any other users, such as email address, username, user ID, account number, street address, phone number, authorized users and mailing campaign data.
Worse still, the vulnerability also let any user request account changes for any other user, such as email address, phone number or other key details.
After being informed, USPS patched the vulnerability before Krebs published the details. In a statement, the USPS said that it has “no information that the vulnerability was leveraged to exploit customer records.” But it added that “out of an abundance of caution, the Postal Service is further investigating to ensure that anyone who may have sought to access our systems inappropriately is pursued to the fullest extent of the law.”
The role of an API in the vulnerability is notable, Setu Kulkarni, vice president of strategy and business development at WhiteHat Security Inc., told SiliconANGLE. “APIs are turning out to be a double-edged sword when it comes to internet scale B2B connectivity and security,” he said. “APIs, when insecure, break down the very premise of uber connectivity they have helped establish.”
To avoid such flaws, he said, government agencies and companies must be proactive, not just reactive, in regards to application security. “Every business that handles consumer data needs to make security a consistent, top-of-mind concern with an obligation to perform the strictest security tests against vulnerable avenues: APIs, network connections, mobile apps, websites and databases,” he said.
Kulkarni added that “organizations that rely on digital platforms need to educate and empower developers to code using security best practices throughout the entire software lifecycle with proper security training and certifications.”
Photo: Pxhere
A message from John Furrier, co-founder of SiliconANGLE:
Your vote of support is important to us and it helps us keep the content FREE.
One click below supports our mission to provide free, deep, and relevant content.
Join our community on YouTube
Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.
THANK YOU