{"vuid":"VU#713312","idnumber":"713312","name":"DTE Energy Insight app vulnerable to information exposure","keywords":["CWE-200","information exposure","disclosure","authentication"],"overview":"The DTE Energy Insight app API allows an authenticated user to obtain and query certain limited customer information from other customers.","clean_desc":"CWE-200: Information Exposure - CVE-2016-1562 The DTE Energy Insight app lets DTE Energy customers track their energy usage. This information is exposed via an HTTP REST API. The API contains a parameter 'filter' that may be manipulated by an authenticated user. This parameter determines the customer data to be returned by the server. By manipulating the 'filter' parameter, an authorized user may be able to obtain and query limited customer information for other users. The researcher has released a blog post with more details.","impact":"A remote, authenticated user may be able to obtain limited information about other customers.","resolution":"DTE Energy has updated its Insight server backend to mitigate this issue. The researcher has confirmed that the APIs no longer allow access to other data.","workarounds":"","sysaffected":"","thanks":"Thanks to Jeffrey Quesnelle for reporting this vulnerability.","author":"This document was written by Garret Wassermann.","public":["http://jeffq.com/blog/dteenergy-insight/","https://play.google.com/store/apps/details?id=com.dteenergy.insight&hl=en"],"cveids":["CVE-2016-1562"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2016-01-28T19:35:33Z","publicdate":"2016-03-10T00:00:00Z","datefirstpublished":"2016-03-11T17:46:06Z","dateupdated":"2016-03-14T14:28:34Z","revision":40,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"1","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"N","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4","cvss_basevector":"AV:N/AC:L/Au:S/C:P/I:N/A:N","cvss_temporalscore":"3.1","cvss_environmentalscore":"2.3469899607","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}