Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Typeform Fixes Zendesk Sell Form Data Hijacking Vulnerability

Typeform Fixes Zendesk Sell Form Data Hijacking Vulnerability

Online surveys and form building software as a service Typeform has patched an information hijacking vulnerability.

The flaw which existed in Typeform’s Zendesk Sell app integration could let attackers quietly redirect form submissions with potentially sensitive data to themselves.

Typeform form IDs indexed by search engines

Online survey and form creation tool Typeform lets users create webpages for easy data collection from users.

Every such form created on the platform has a unique “form ID,” such as hHXhmf, which in the case of publicly accessible surveys may be indexed by search engines, as observed by BleepingComputer.

Indexed typeform surveys
Typeform surveys and online forms indexed by search engines
Source: BleepingComputer

Behind the scenes, Typeform’s systems use this form ID throughout workflows to keep track of form submissions and transmit collected data between different parts of the application.

Also Read: 15 Best Tools For Your Windows 10 Privacy Settings Setup

Under normal circumstances, knowledge of this form ID would merely let any user access and fill the corresponding survey.

However, a severe vulnerability in Typeform meant, attackers could covertly gather responses submitted by respondents for virtually any form, should they have knowledge of this ID.

Broken Zendesk integration lets attackers hijack submissions

Without explicitly naming Typeform, bug bounty hunter Ronak Patel recently provided details on an Insecure Direct Object Reference (IDOR) bug that impacted “an app [used] to generate forms for surveys, quiz and more.”

On further investigation, BleepingComputer identified the flaw had existed in Typeform.

IDOR vulnerabilities occur when a system object which has a reference can be accessed in an unauthorized manner directly by users.

In this case, the object refers to a Typeform form/survey and the reference is the “form_id” that can let attackers tap into the data submitted for a form.

Typeform allows integration of apps and web services like Google Analytics and Zendesk Sell to help enhance the processing of form submissions.  

For example, survey creators can use the Zendesk Sell app and map the survey response fields to the Zendesk Sell fields in their account for data analysis. 

Zendesk Sell is a sales CRM and leads conversion software which explains why Typeform survey creators from certain business areas may find it helpful.

Patel created a test Zendesk Sell account and integrated it with his Typeform account.

He observed the network requests, including the GET and POST fields, being exchanged between Typeform and Zendesk Sell throughout the integration workflow.

The “form_id” field, shown below, caught his attention.

Zendesk Typeform integration requests
GET and POST requests observed during Typeform-Zendesk Sell integration session
Source: Patel

The researcher additionally created an “attacker’s” Zendesk Sell account for testing and noticed it was possible to tamper with the “form_id” field being transmitted in the integration request to an arbitrary value, such as the form_ID of a Typeform survey belonging to the victim.

This means threat actors could casually keep looking up Typeform form IDs being indexed by search engines from time to time.

But now. by exploiting this app integration flaw, the actors could harvest the collected survey responses within their Zendesk Sell accounts, with the survey creator having no knowledge of the illicit activity taking place.

“Summing up, using IDOR in this integration process, attacker could integrate his Zendesk sell account with any form without any kind of user interaction and could fetch all sensitive data received as a form response,” said Patel.

Patel states the vulnerability was discovered by him about six months ago and patched two months ago by the platform.

Also Read: How To Secure Your WiFi Camera: 4 Points To Consider

BleepingComputer reached out to Typeform who ran an investigation and confirmed that they had patched the flaw earlier in a statement:

“We can confirm that all data submitted through typeforms [sic] is encrypted in transit and at rest. The fix to the vulnerability in this integration was implemented in July 2020,” a Typeform spokesperson told BleepingComputer.

The researcher’s detailed findings on the integration vulnerability can be found in his blog post.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us