OAuth is an open standard for access delegation, commonly used by websites and applications to allow users to grant access to their information without sharing their login credentials. On Booking.com, OAuth is used to authenticate users and authorize them to access their account information securely.
The flaw in Booking.coms OAuth implementation allowed hackers to bypass the authentication process and gain unauthorized access to user accounts. This major security flaw enabled attackers to take control of users personal information, payment details, and booking history.
The security vulnerability on Booking.com has put the personal and financial information of millions of users at risk. With the ability to take over user accounts, hackers can make unauthorized bookings, steal payment information, and access sensitive personal data.
Is Booking.com taking steps to address the security vulnerability?
Users of Booking.com should update their passwords, enable two-factor authentication, and monitor their account activity closely to protect against unauthorized access.
Google Dorks Database |
Exploits Vulnerability |
Exploit Shellcodes |
CVE List |
Tools/Apps |
News/Aarticles |
Phishing Database |
Deepfake Detection |
Trends/Statistics & Live Infos |
Tags:
Booking.coms OAuth Implementation Vulnerable to Full Account Takeover