back to article Parking firm pulls app after dev claims: I can SEE credit card privates

An automated parking firm has halted public access to its payment app after a blogger identified a serious security flaw which he claimed allowed him to see other users' credit card information. According to Matt Cheetham, an iOS developer based in Bournemouth, the Phone and Pay app was so leaky that he could easily access …

COMMENTS

This topic is closed for new posts.
  1. Anonymous Coward
    Anonymous Coward

    What?

    At no point has there been a material security breach and no credit card details have been compromised.

    But... isn't that how the guy found out about the problem? So surely there HAS been a material security breach and credit card details HAVE been compromised.

    And seriously, what kind of inept company did they use if they left all their logging in the release build? I mean, some logging stays in sure, but nothing on the sensitive data. After this I don't think I'd ever use the app no matter how many 'security updates' they release.

    1. David Dawson

      Re: What?

      And seriously, what kind of inept company did they use if they left all their logging in the release build? I mean, some logging stays in sure, but nothing on the sensitive data. After this I don't think I'd ever use the app no matter how many 'security updates' they release.

      -------

      Thats not the problem, logging shouldn't matter one bit.

      The problem here is that the communication between client and server is not correctly secured and authorised. The server should enforce security in all cases. The client can do so too, but their issue is server side.

      1. Anonymous Coward
        Anonymous Coward

        Re: What?

        Fair enough, maybe I misread the article. Either way I still stand by the theory that outputting logs with sensitive data to the console should have been removed. Even if it's not a direct security threat with the app itself, it's still a security threat as it gives malware etc something to hook into.

        I tend to do mostly stand-alone stuff, so networked security really isn't my strong point (or my weak point, more like my null point)

    2. Anonymous Coward
      Anonymous Coward

      Re: What?

      Raise a complaint with the ICO.

      Clearly the company are completely inept and need a good thrashing.

      The ICO can actually dish out punishment.

      1. Vic

        Re: What?

        Raise a complaint with the ICO.

        Clearly the company are completely inept and need a good thrashing.

        *chortle*

        Vic.

  2. frank ly

    I'm surprised ...

    ... that he wasn't reported and then arrested for hacking into a commercial computer system and stealing personal financial information. Got to clamp down on this sort of thing you know.

  3. Eradicate all BB entrants

    Can anyone get this ......

    ..... functionality for phone/device payments correct when it comes to parking?

    No matter what automated system is in place they are woefully bad, the phone/text ones especially. There is no recourse for anyone affected (especially when they pass the fines to recovery agents when you are still contesting the fine).

    And the card details have been breached, a person who is not supposed to be able to see them did.

    1. Anonymous Coward
      Anonymous Coward

      Re: Can anyone get this ......

      Ringo seemed to have it working ok, never had a problem with their system.

    2. stratofish

      Re: Can anyone get this ......

      > And the card details have been breached, a person who is not supposed to be able to see them did.

      "Cheetham alleged this allowed him to see other users' credit card details".

      Note use of the word 'alleged'. Until proven otherwise the statement by the company has to be taken at face value as they are presumably the ones who would know what was exposed or not.

      The fact that he says these were in logs of URLS (i.e. passed in plaintext) is far more significant than the app itself being leaky if true.

  4. Anonymous Coward
    Anonymous Coward

    Hate that kind of bull-plop PR speak.

    "no data was compromised" = "we're sure no one (else) bothered to try this. We really are"

    How the hell can they know no (other) data was compromised? They don't. To state that is utter fiction. A guess. At least one guy COULD have had off with as many CC details as he wanted. If no one else did so it's luck, not judgement.

    Mental note to continue to avoid such systems.

  5. solo

    Payment Gateway App - Requirements

    1. Secure transaction - POSTPONED

    2. Automated transaction - CHECKED

    3. Simple UI - CHECKED

    4. Cheap to develop - CHECKED

    5. Campaign for trust building - CHECKED

  6. Dan 55 Silver badge

    Negligence

    There seem to be plenty of laws about accessing systems without permission but practically none about sufficiently protecting systems from access without permission.

    A horribly prescriptive law updated from time-to-time with latest best security practice which states the technical measures that companies must take to protect websites, app servers, remote data, app clients, and client data is probably the only thing that will get security costs to be considered as non-optional.

  7. Stretch

    who cares about cc numbers

    "THE app store"

    I hope they die being run over by their own vans the little scroats.

  8. JimmyPage Silver badge
    WTF?

    PCI-DSS ?

    hang on, if this outfit were taking card details then their payment processor should have *required* them to be PCI-DSS compliant.

    Sounds like someone was asleep on the job.

This topic is closed for new posts.

Other stories you might like