- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
Researchers Ian Carroll and Sam Curry discovered the vulnerability in FlyCASS, a third-party web-based service that some airlines use to manage the Known Crewmember (KCM) program and the Cockpit Access Security System (CASS). KCM is a Transportation Security Administration (TSA) initiative that allows pilots and flight attendants to skip security screening, and CASS enables authorized pilots to use jumpseats in cockpits when traveling.
Definitions:
SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.
Jesus fucking Christ. It’s 2024. Sanitize your inputs people.
Especially since backend web frameworks do all this for you.
I’m curious what they are using. It’s pretty hard to set up modern frameworks so bad they’ll allow that stuff. I mean it’s possible, but significantly harder than doing it right.
Bold assumption they’re using anything remotely modern.
Yeah, I know. But it would be interesting to know what they used.
Looks like regular PHP.
builtwith
The language of the gods!