#infosec #vulnerability

Disorder in the Court

Insufficient permission check vulnerabilities in public court record platforms from multiple vendors allowed unauthorized public access to sealed, confidential, unredacted, and/or otherwise restricted case documents. Affected documents include witness lists and testimony, mental health evaluations, child custody agreements, detailed allegations of abuse, corporate trade secrets, jury forms, and much more.

https://github.com/qwell/disorder-in-the-court

Catalis - CMS360 is used in Georgia, Mississippi, Ohio, and Tennessee. Catalis is a "government solutions" company that provides a wide array of public record, payment, and regulatory/compliance platforms.

Henschen & Associates - CaseLook is used in Ohio. Henschen & Associates did not respond after multiple reports.

Tyler Technologies - Court Case Management Plus is used in Georgia. In February 2022, a different Tyler Technologies court records platform had a similar vulnerability that allowed the website judyrecords.com to accidentally scrape sensitive data.

Five platforms used by individual courts in Florida -- Brevard County, Hillsborough County, Lee County, Monroe County, and Sarasota County -- are each presumed to be developed "in-house" by the county court.

While all of the platforms allowed unintended public access to restricted documents, the severity varied based on the levels of restrictions that could be bypassed and the discoverability of document IDs. The methods used to exploit each of the vulnerabilities also varied, but could all be performed by an unauthenticated attacker using only a browser's developer tools.

CVE-2023-6341, CVE-2023-6342, CVE-2023-6343, CVE-2023-6344, CVE-2023-6352, CVE-2023-6353, CVE-2023-6354, CVE-2023-6375, CVE-2023-6376

Note: Additional platforms from other vendors that are known to be vulnerable will be included in future disclosures.

GitHub - qwell/disorder-in-the-court: Court platform vulnerability disclosure(s).

Court platform vulnerability disclosure(s). Contribute to qwell/disorder-in-the-court development by creating an account on GitHub.

GitHub
Security flaws in court record systems used in five US states exposed sensitive legal documents | TechCrunch

Exclusive: The vulnerabilities allowed public access to restricted and sensitive court filings using only a web browser.

TechCrunch

https://www.cisa.gov/news-events/alerts/2023/11/30/multiple-vulnerabilities-affecting-web-based-court-case-and-document-management-systems

"A researcher" is far nicer than some of the things I've been called. I'll take it! (I kid -- honestly I'm super stoked to see this.)

Software Flaws Exposed Sealed Court Docs, Researcher Says - Law360 Pulse

Soon after cybersecurity researcher Jason Parker began probing a court records website this year, they discovered they could easily access a sealed order granting children new names to protect them from an abusive parent, they said. Next, Parker was able to view an "extremely detailed" mental health evaluation from a doctor in a criminal case.

@RosenzweigP @benjaminwittes @lawfare I'd love to discuss these vulnerabilities on The Lawfare Podcast. I think it would make an excellent follow-up to the Secure By Design episode with CISA (who assisted with this disclosure).