Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Multiple Vulnerabilities in Spytec GPS platform

Medium

Synopsis

1. Reveal location of devices for any/all clientIds

Any authenticated user can request the current device status for any other user by clientId. While this does not reveal the user's email, it does reveal their device locations and information. The issue exists because of an Insecure Direct Object Reference (IDOR) vulnerability in the /prod/clients/<clientId>/devicestatus endpoint of the api.

2. Reveal boundary information for any/all clientIds

A similar IDOR vulnerability exists in the boundaries endpoint, which allows a potential attacker to gather information about any of the boundaries/geofences a user has created. 

3. Reveal position data from all users' trips

A similar IDOR vulnerability exists which allows a potential attacker to reveal the device info for all trip ids, even for trips belonging to other users.

4. Ability to cancel/reactivate any client's device subscriptions

The activation.spytec.com site contains multiple endpoints which allow a user to list any devices which can be cancelled/reactivated by customer id, as well as enact the cancellation/reactivation of those devices. 
These pages do not require authentication or validate that the user making the request (if they are logged in), and as a result a potential unauthenticated attacker can:
* list the current cancellable or cancelled devices for a given customerId
* reactivate or cancel those device subscriptions

Solution

Please contact Spytec for further information and support.

Disclosure Timeline

June 9, 2021 - Tenable requests security contact information
June 9, 2021 - Tenable receives automated support ticket, no further response
June 16, 2021 - Tenable reports vulnerabilities to Spytec support
June 16, 2021 - Tenable receives automated support ticket, no further response
July 14, 2021 - Tenable requests an update, receives no response
August 24, 2021 - Tenable sends email to Spytec support reminding them of disclosure date
September 14, 2021 - 90 Day Disclosure date reached, advisory published

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID: TRA-2021-37
Credit:
Evan Grant
Affected Products:
Spytec GPS
Risk Factor:
Medium