Feeds

HSBC plugs hole that exposed site directory

John Lewis Partnership site rather too open for comfort

Next gen security for virtualised datacentres

HSBC has finally fixed a bug that allowed web surfers to browse the directory structure of a supposedly secure website it helps to run.

The John Lewis Partnership card secure website (a joint venture with HSBC) allowed the curious, and potentially malicious, to peek into its underlying structure.

"Great if you were planning a phishing attack and wanted to get a complete site layout and set of assets," as Reg reader Liam notes.

The problem was first drawn to our attention by Reg reader Martin, who came across it when looking at his John Lewis Partnership credit card statement. He told us about the bug back at the start of April.

"I've just tried to look at my John Lewis Partnership credit card statement (operated by HSBC) and was greeted by the directory listing of the website," Martin said at the time. "I doubt there was any very interesting information there, but it shows something is going pretty wrong there." He supplied screenshots to back up his concerns, which we won't republish in case they give miscreants any clues.

The directory problems at the site were one of three information security queries about HSBC we put to the bank early this month. It was able to satisfactorily explain the other two but not immediately deal with the directory browsing, asking for more information, which we didn't immediately have to hand.

It was only when Liam's tip-off came in, prompting fresh inquiries from El Reg, that it zeroed in on the problem.

"Although there is no access to any customer data via this link, there is no reason for the content of John Lewis's website to be available in this format. We are in the process of removing access to the John Lewis Partnership card website from this link," a spokesman for the bank explained.

HSBC has now fixed the bug.

Taken on its own the directory browsing problem is no big deal. But HSBC has had all sorts of problems keeping its e-payments system up and running over recent weeks, for example, to say nothing of the unfortunate incident when it lost customer data in the post or earlier problems in forgetting to renew one of its digital certificates on time.

Recent developments suggest the bank is becoming more committed to making its ecommerce sites more secure, however. The bank has begun using extended validation certs from VeriSign; a welcome step in itself, but of course irrelevant to ecommerce merchants who lost money through its ecommerce processing outages. ®

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.