Vatican's wearable rosary gets fix for app flaw allowing easy hacks - CNET
Qui serve un e-Sorcista! <https://www.cnet.com/news/vaticans-wearable-rosary-gets-fix-for-app-flaw-all...> The road to internet-connected salvation is paved with cybersecurity issues. The Vatican discovered that Thursday, after a security researcher disclosed a severe vulnerability with the "Click to Pray" eRosary app. On Wednesday, the Vatican announced its $110 wearable rosary, an internet of things device that syncs with an app from the Pope's Worldwide Prayer Network. One advantage of IoT devices is that they open up a new way for people to interact with resources. With the eRosary, the Vatican said, people can get different prayers every day, as well as reminders on when to pray. The downside of IoT devices is that they're ripe for security issues. Lawmakers in the US have consistently called out poor security practices on connected gadgets, warning that they could lead to a flood of vulnerable devices. French security researcher Baptiste Robert found a significant flaw in the Vatican's app within 15 minutes. The vulnerability would have let a hacker take over a person's account, just by knowing the potential victim's registered email address. "This vulnerability is very severe as it allows an attacker to take over the victim's account and get his personal information," Robert said in a message. The Vatican didn't respond to a request for comment. Robert said he reached out to the Vatican on Wednesday and the security issue has since been fixed. The flaw worked because of how the app handled login credentials, Robert said. When you register for the "Click to Pray" app, you sign up with an email, and instead of setting a password, the app sends a PIN code to your inbox. You log in like this every time. Before the fix, the app was sending out requests to its server to email you the four-digit PIN. The issue was that PIN code itself was also sent on the network. Anyone analyzing the network traffic could have seen the response with the PIN sent. Robert demonstrated this vulnerability with an account we created on the app. Every time he gained access to the account, the app logged me out, telling me I was logged in on another device. It also sent an email with a new PIN code I didn't request. Once he had access, Robert was able to do anything I could on the account. He saw what I set as my gender, height, weight and birthday, as well as the cat photo I used for my avatar. He also deleted my account and was able to access a second account that I had made right after. The app logs other personal information as well, like how often someone prays, and it works as a fitness tracker. The rosary keeps track of how many steps a person takes throughout the day and distance traveled. The Android app also asks for access to location data and permissions to make calls.
In prima lettura mi hanno fatto un po' tenerezza. The register sottolinea anche con una certa ironia che Father Frederic Fornos, the International Director Pope's Worldwide Prayer Network, told The Register that as soon as he was alerted to the security weaknesses by Fidus on Thursday, he put Vatican coders on the job to fix it, and pledged to, miracles upon miracles, have the holes patched over within 24 hours. https://www.theregister.co.uk/2019/10/18/vatican_erosary_insecure/ Un bugfix di sicurezza in 24 ore è veramente fuori standard nell'informatica mondana: spesso 90 giorni non bastano! Ma se ci pensi un momento, l'e-Sorcista serve davvero! Perché qui abbiamo la Chiesa Cattolica che si mette a sorvegliare i fedeli! Come la chiamiamo? Comunione di Sorveglianza? :-D I bachi emersi mostrano come questa stratosferica scivolata del Vaticano sia dovuta ad una abissale ignoranza. Ma se la Chiesa si mette a giocare alla start-up di sorveglianza, noi cattolici abbiamo un serio problema. Giacomo On 19/10/2019, Alberto Cammozzo <ac+nexa@zeromx.net> wrote:
Qui serve un e-Sorcista!
<https://www.cnet.com/news/vaticans-wearable-rosary-gets-fix-for-app-flaw-all...>
The road to internet-connected salvation is paved with cybersecurity issues. The Vatican discovered that Thursday, after a security researcher disclosed a severe vulnerability with the "Click to Pray" eRosary app.
On Wednesday, the Vatican announced its $110 wearable rosary, an internet of things device that syncs with an app from the Pope's Worldwide Prayer Network. One advantage of IoT devices is that they open up a new way for people to interact with resources. With the eRosary, the Vatican said, people can get different prayers every day, as well as reminders on when to pray.
The downside of IoT devices is that they're ripe for security issues. Lawmakers in the US have consistently called out poor security practices on connected gadgets, warning that they could lead to a flood of vulnerable devices.
French security researcher Baptiste Robert found a significant flaw in the Vatican's app within 15 minutes. The vulnerability would have let a hacker take over a person's account, just by knowing the potential victim's registered email address.
"This vulnerability is very severe as it allows an attacker to take over the victim's account and get his personal information," Robert said in a message.
The Vatican didn't respond to a request for comment. Robert said he reached out to the Vatican on Wednesday and the security issue has since been fixed.
The flaw worked because of how the app handled login credentials, Robert said.
When you register for the "Click to Pray" app, you sign up with an email, and instead of setting a password, the app sends a PIN code to your inbox. You log in like this every time.
Before the fix, the app was sending out requests to its server to email you the four-digit PIN. The issue was that PIN code itself was also sent on the network. Anyone analyzing the network traffic could have seen the response with the PIN sent.
Robert demonstrated this vulnerability with an account we created on the app. Every time he gained access to the account, the app logged me out, telling me I was logged in on another device. It also sent an email with a new PIN code I didn't request.
Once he had access, Robert was able to do anything I could on the account. He saw what I set as my gender, height, weight and birthday, as well as the cat photo I used for my avatar. He also deleted my account and was able to access a second account that I had made right after.
The app logs other personal information as well, like how often someone prays, and it works as a fitness tracker. The rosary keeps track of how many steps a person takes throughout the day and distance traveled.
The Android app also asks for access to location data and permissions to make calls. _______________________________________________ nexa mailing list nexa@server-nexa.polito.it https://server-nexa.polito.it/cgi-bin/mailman/listinfo/nexa
https://watchaware.com/watch-apps/1358741127 Sviluppata da uno dei nostri ragazzi del corso di due anni fa. Molto più economica. Un caro saluto Giorgio Il 19/10/2019 19:03, Alberto Cammozzo ha scritto:
Qui serve un e-Sorcista!
<https://www.cnet.com/news/vaticans-wearable-rosary-gets-fix-for-app-flaw-all...>
The road to internet-connected salvation is paved with cybersecurity issues. The Vatican discovered that Thursday, after a security researcher disclosed a severe vulnerability with the "Click to Pray" eRosary app.
On Wednesday, the Vatican announced its $110 wearable rosary, an internet of things device that syncs with an app from the Pope's Worldwide Prayer Network. One advantage of IoT devices is that they open up a new way for people to interact with resources. With the eRosary, the Vatican said, people can get different prayers every day, as well as reminders on when to pray.
The downside of IoT devices is that they're ripe for security issues. Lawmakers in the US have consistently called out poor security practices on connected gadgets, warning that they could lead to a flood of vulnerable devices.
French security researcher Baptiste Robert found a significant flaw in the Vatican's app within 15 minutes. The vulnerability would have let a hacker take over a person's account, just by knowing the potential victim's registered email address.
"This vulnerability is very severe as it allows an attacker to take over the victim's account and get his personal information," Robert said in a message.
The Vatican didn't respond to a request for comment. Robert said he reached out to the Vatican on Wednesday and the security issue has since been fixed.
The flaw worked because of how the app handled login credentials, Robert said.
When you register for the "Click to Pray" app, you sign up with an email, and instead of setting a password, the app sends a PIN code to your inbox. You log in like this every time.
Before the fix, the app was sending out requests to its server to email you the four-digit PIN. The issue was that PIN code itself was also sent on the network. Anyone analyzing the network traffic could have seen the response with the PIN sent.
Robert demonstrated this vulnerability with an account we created on the app. Every time he gained access to the account, the app logged me out, telling me I was logged in on another device. It also sent an email with a new PIN code I didn't request.
Once he had access, Robert was able to do anything I could on the account. He saw what I set as my gender, height, weight and birthday, as well as the cat photo I used for my avatar. He also deleted my account and was able to access a second account that I had made right after.
The app logs other personal information as well, like how often someone prays, and it works as a fitness tracker. The rosary keeps track of how many steps a person takes throughout the day and distance traveled.
The Android app also asks for access to location data and permissions to make calls. _______________________________________________ nexa mailing list nexa@server-nexa.polito.it https://server-nexa.polito.it/cgi-bin/mailman/listinfo/nexa
-- ======================================================================== Prof. Ing. Giorgio Ventre Direttore Dipartimento di Ingegneria Elettrica e Tecnologie dell'Informazione Università degli Studi di Napoli Federico II Via Claudio 21 80125, Napoli, Italy Tel: +39 081 7683908 Fax: +39 081 7683816 Mob: +39 3807679372 E-mail: giorgio@unina.it http://www.dieti.unina.it http://www.developeracademy.unina.it/en/ http://www.docenti.unina.it/giorgio.ventre ======================================================================== --- Questa e-mail è stata controllata per individuare virus con Avast antivirus. https://www.avast.com/antivirus
participants (3)
-
Alberto Cammozzo -
Giacomo Tesio -
Giorgio Ventre