Your hotel check-in confirmation could be putting you at risk

Security researchers found hundreds of hotel websites leaking booking details to third parties and advertisers.

Alfred Ng Senior Reporter / CNET News
Alfred Ng was a senior reporter for CNET News. He was raised in Brooklyn and previously worked on the New York Daily News's social media and breaking news teams.
Alfred Ng
2 min read

Confirmation and reservation emails from hotels are leaking your information to third parties and advertisers, researchers said.

Angela Lang / CNET

When your hotel automatically emails you your booking information, there's a good chance that you're not the only person with access to those documents.

Symantec, a security company, found flaws on hundreds of hotel websites, which were leaking sensitive information like names, phone numbers, passport numbers and addresses in confirmation emails.

Candid Wueest, a threat researcher at Symantec, said he looked at more than 1,500 hotel websites in 54 countries and found the issues among two-thirds of them.

Hotels are a primary target for cyberattacks, as they hold treasure troves of data on guests during vacation season. They are frequently hacked, as cyberattacks on Sheraton, Westin, Starwood, Marriott and Wyndham hotels over the last few years show. Last November, Marriott disclosed that hackers had stolen records from up to 383 million guests in one of the largest personal data breaches in history.

Hotels have a hotbed of data, and their websites have been leaking out that information, Wueest said. One major issue stems from the URL that they send to guests in emails. About 850 hotel websites don't require authentication to see those details, allowing anyone with the link to view your personal information. Nearly one-third of those pages have the booking number in the URL itself, Wueest found.

If the guest were the only person who could view that URL, it wouldn't be much of an issue, but these websites have advertisers and third-party analytics tools embedded on the pages.

Those third parties get that URL too, and a potential attacker could gather that information for malicious purposes, researchers found. Wueest said he found a Google Analytics request for a hotel booking confirmation page contained a URL with the reservation number in plain sight.

All an attacker would have to do with that is enter the reservation number and find out all the sensitive information tied to it.

Several hotel websites were also found to be vulnerable to brute forcing -- when an attacker guesses every possible combination for a reservation number. With computer advances, today a machine can guess every possible combination of an eight-character password in less than three hours. To prevent this, websites will usually limit the number of guesses someone can make.

With one hotel website, Wueest said he was able to brute force his way in and view every active reservation for the company.

He said he reached out to all the hotels with these security issues and one-fourth of them ignored his warnings for more than six weeks. Wueest recommended that hotels stop including booking information in the URL and start implementing authentication measures on confirmation pages.