Incidents

Facebook grants $25k USD bounty for critical vulnerability report

Vulnerability would have allowed an attacker to take control of an account by simply clicking a link

Facebook has just granted a $25k USD reward for
the report of critical cross-site request forgery vulnerability. According to
network security specialists from the International Institute of Cyber
Security, the vulnerability could have been exploited to hijack social network
accounts; the attacker only needed to trick the victim into clicking on a specially
crafted link.

The white hat hacker known in the community as “Samm0uda”
was responsible for reporting the flaw to the social network, which granted the
considerable amount for his report.

“The vulnerability could have allowed malicious
users to send requests with counterfeit tokens to arbitrary endpoints on
Facebook, so it was possible to take control of the victim’s account. The
victims just had to click on a link”, added the network
security
specialist.

“Exploiting this vulnerability is possible due
to a vulnerable endpoint that takes another Facebook endpoint selected by the
attacker along with the parameters and performs a POST request to that endpoint
after adding the FB_DTSG parameter. In addition, this endpoint is under the
www.facebook.com main domain, making it very easy for attackers to trick
victims into that URL”, added Samm0uda.

The network security expert published the URL
of his proof of concept, which could be exploited to post anything on the
victim’s timeline, or even change his profile photo. The vulnerability might
even have been exploited to remove a Facebook account, although victims would
have to have provided their password to the platform before completing the
account deletion process. 

If not enough, the vulnerability would also
have been exploited to reset the password of an account by changing the email
address or phone number associated with it. The attacker would have to have
sent some requests to Facebook to add their own contact ways to the account, so
reset the password would be easy to perform.

To take full control of an account, a hacker
would have to have exploited the vulnerability twice: one to replace or add
your email address or phone number, and a second time to confirm the change.

The expert was also able to create a unique
link that allowed him to get the victim’s access token.

To Top

Pin It on Pinterest

Share This