Oops, Airlines! Major OAuth Snafu Risks Millions of Accounts in Travel Booking Mix-Up
A misconfigured OAuth implementation flaw exposed millions of airline customers to account takeovers. Attackers could redirect users’ OAuth credentials, log into systems, and book services with loyalty points. This highlights the importance of securing third-party integrations and ensuring stringent verification processes.

Hot Take:
Looks like some airlines might have accidentally put their cybersecurity on autopilot! In a world where misconfigured OAuth is the latest in-flight entertainment, it’s a bumpy ride for millions of frequent flyers. Maybe they should have set their security to airplane mode instead!
Key Points:
- A major vulnerability in OAuth authentication exposed millions of airline customers to potential account takeovers.
- The flaw allowed attackers to redirect OAuth credentials to a server of their choosing.
- Victims’ accounts could be hijacked with a simple click, leading to unauthorized bookings and data access.
- This isn’t an isolated incident; similar issues have been found with other companies like Booking.com and Grammarly.
- Third-party integrations can be a security weak point, as seen with the unnamed travel company’s misconfiguration.
Already a member? Log in here