Redfin's Listing Contact Forms Exposed Users' Personal Info for Less than a Week
In a shocking security lapse, the online real estate giant Redfin made users' personal info available to others who logged onto its listings. A website security snafu left users' names, email addresses, and phone numbers exposed for less than a week.
The vulnerability occurred when users accessed contact information forms on listings. The form would pop up with details from past users, which would temporarily vanish. However, the contact info of past users remained visible even after disabling JavaScript, leaving their email addresses or phone numbers – sometimes both – open to prying eyes.
When confronted about the issue, Redfin spokesperson Alina Ptaszynski claimed that a technical error was responsible for the vulnerability and that it was quickly remedied. However, a subsequent investigation by The Intercept revealed that the company failed to address the problem on mobile listings until after multiple inquiries from the news outlet.
The security breach has raised concerns about data protection at Redfin, which boasts 50 million monthly users according to its parent company Rocket. While the vulnerability displayed only one user's contact information at a time, it could have been exploited by someone repeatedly visiting property listings and gathering available info en masse – with no indication that such exploitation had occurred.
The incident highlights the ongoing struggle for web services to balance functionality with data protection. In this case, Redfin's privacy policy states that private information may be shared only when accompanied by a clear disclosure – a principle not fully adhered to in the contact form's design.
As The Intercept noted, inadvertently revealing user info is an all-too-common problem plaguing web services for years.
In a shocking security lapse, the online real estate giant Redfin made users' personal info available to others who logged onto its listings. A website security snafu left users' names, email addresses, and phone numbers exposed for less than a week.
The vulnerability occurred when users accessed contact information forms on listings. The form would pop up with details from past users, which would temporarily vanish. However, the contact info of past users remained visible even after disabling JavaScript, leaving their email addresses or phone numbers – sometimes both – open to prying eyes.
When confronted about the issue, Redfin spokesperson Alina Ptaszynski claimed that a technical error was responsible for the vulnerability and that it was quickly remedied. However, a subsequent investigation by The Intercept revealed that the company failed to address the problem on mobile listings until after multiple inquiries from the news outlet.
The security breach has raised concerns about data protection at Redfin, which boasts 50 million monthly users according to its parent company Rocket. While the vulnerability displayed only one user's contact information at a time, it could have been exploited by someone repeatedly visiting property listings and gathering available info en masse – with no indication that such exploitation had occurred.
The incident highlights the ongoing struggle for web services to balance functionality with data protection. In this case, Redfin's privacy policy states that private information may be shared only when accompanied by a clear disclosure – a principle not fully adhered to in the contact form's design.
As The Intercept noted, inadvertently revealing user info is an all-too-common problem plaguing web services for years.