Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cathay Pacific Flight Load (com.cathaypacific.iJourneyLite) abusing apsearch API #1447

Open
jpatokal opened this issue Oct 22, 2023 · 2 comments

Comments

@jpatokal
Copy link
Owner

The server logs are recently full of this:

172.71.215.49 - - [19/Oct/2023:08:31:01 +0000] "POST /php/apsearch.php HTTP/1.1" 500 5 "-" "Flight Load/2.5.16 (com.cathaypacific.iJourneyLite; build:2.5.16; iOS 16.3.1) Alamofire/4.9.0"

Based on the one hit I could find on the Internet, this seems to be a Cathay Pacific internal flight planning app:
image

We could implement referer filtering or something, but I'd like to talk to them first, so any contact points for Cathay Pacific would be appreciated: the mentioned [email protected] bounces at least for external senders.

@reedy
Copy link
Collaborator

reedy commented Oct 22, 2023

I suspect in most cases, just blocking them with a "please contact us" type thing will be the best way to get in contact, unless you can find a "useful" IT contact somewhere online. Trying via Social Media or similar public channels (email, call centre etc) will likely not get anywhere.

The other options are potentially using their abuse address from their WHOIS as their "tech contact"; [email protected].

I do wonder how maintained the app may be. https://github.com/Alamofire/Alamofire/tree/4.9.0 is from September 2019...

@jpatokal
Copy link
Owner Author

No luck reaching out, so I've blocked them. Cathay, if you read this, you know where to reach me.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants