Naijacrux News:Welcome to Naijacrux Online Forum..Great Place To Get Tips Facts Updates and More ,Interact Discuss & Learn With Others !!.remember to register to enjoy much more update!!!New Updates From Naijacrux -Naijacrux Is Now Mobile Friendly - Download Our Android App On Our Forum Rules And Announcement Section.Our App Will be Live On Google Playstore And IOS Store Soon Aswell - CLICK HERE TO DOWNLOAD NAIJACRUX ANDROID APP !!! Dear Guest And Naijacrux Dedicated Members,!!! ,  You Can Now Receive Naijacrux Weekly New Post and Updates Via Email by Subscribing To Our Newsletter Using The Subscribe Button Above The Naijacrux Announcement And Discussion At The Top Home Page!!Never Miss A New Post And Updates Again.!Thank You.  !!!YOU ARE WELCOME TO NAIJACRUX INFORMATIVE LEARNING AND INTERACTIVE FORUM.This Website is an Intensive Forum of Learning We recommend you Register & Login to Enjoy much free stuffs ::>>Also remember to Update your Profile Immediately after registration. Thank you!>>>!!!!To All Advertisers And Patronizers, kindly Send Mail To Support@naijacrux.com For adverts Placement. thanks!!!


Author Topic: Facebook fix Critical XSS Bug That Led to Total Account Compromise  (Read 1656 times)

0 Members and 1 Guest are viewing this topic.

Offline newspostng

  • Global Moderator
  • Hero Member
  • *****
  • Posts: 1595
  • Karma: +0/-0
Loading...

British security researcher Jack Whitton has identified a critical XSS (cross-site scripting) vulnerability on Facebook that could be leveraged via malicious PNG images and grant an attacker access to someone's account.

Mr. Whitton discovered that he could use steganography to craft a malicious PNG image which would hold the source code of an HTML file.

During the upload process, he managed to trick Facebook servers into accepting the initial upload as a PNG file, but later save this PNG (on their image storage CDN servers) as an HTML document.

But this HTML file, saved among images, on Facebook CDN server wasn't really that useful to begin with since there was no data for an attacker to steal and exploit. So he had to find a way to load this HTML file on Facebook's main website.

The bug allowed total compromise of someone's Facebook account

The researcher's task wasn't a simple one since he had to go around various security measures put in place by Facebook to protect its services from exactly these types of attacks. Eventually, Mr. Whitton managed to avoid Facebook's LinkShim malicious link shield,  HTTPOnly cookie settings, and X-Frame-Options headers.

In the end, he found a way to upload a malicious image on Facebook's CDN, which would be loaded via an iframe on Facebooks photo.facebook.com subdomain.

This granted him enough access to interact with the site's main cookies, where each user's identity token is stored to validate their identity.

Since this token can be used to imitate a Facebook user's logged in session, attackers using Mr. Whitton's XSS bug, together with other CSRF (cross-site request forgery) methods would have been able to retrieve a person's account details, post status updates, or do about anything a normal Facebook user can do.


 

 

Facebook Disabled Page Scam requesting users Credit Card and PayPal data

Started by newspostng

Replies: 0
Views: 1583
Last post January 07, 2016, 10:33:17 AM
by newspostng
Facebook Boss Zuckerberg reject criticism that his site Fake News affect US Poll

Started by internet police

Replies: 0
Views: 1608
Last post November 16, 2016, 07:20:05 AM
by internet police
Facebook posted surprisingly strong profit and revenue growth in Latest Update

Started by legendguru

Replies: 0
Views: 1558
Last post November 05, 2015, 11:18:14 AM
by legendguru
Isis made direct threats against Facebook founder Mark Zuckerberg and Twitter

Started by internet police

Replies: 0
Views: 1463
Last post February 25, 2016, 06:32:16 AM
by internet police
Facebook bans users from posting Scunthorpe , enables profanity filter feature

Started by admin

Replies: 0
Views: 1669
Last post April 06, 2016, 01:26:40 AM
by admin