Vulnerabilities / Threats
9/20/2013
01:36 PM
Connect Directly
RSS
E-Mail
50%
50%

Android Facebook App Users: Patch Now

Facebook has fixed a bug in its Android app that left photos vulnerable to interception.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
Facebook apps for Android users: Ensure you've recently updated your Facebook app.

That warning comes via Egyptian security researcher Mohamed Ramadan, who disclosed Thursday that he'd found an HTTPS bug in Facebook's Android app -- as well as Facebook Messenger -- that have now been patched by the social network's security team. The bug could be exploited by an attacker using Wireshark or another sniffing tool to intercept images being transmitted to Facebook.

According to Ramadan's security report to Facebook, filed in February 2013, "I found that the official Facebook Messenger and Facebook app for Android latest version are sending and receiving images using HTTP protocol and anyone on the same wireless network can sniff my traffic and view all images or even replace it with his own images."

As a result, when using a vulnerable version of one of the apps, "if you are using a wireless network at cafe, hotel, airport, museum, disco, your friend's wireless network or even your own wireless network ... an attacker can run cain and abel, Ettercap, SSLstrip or his own tool to poison the traffic and hijack ARP table and sniff your images and your private images and leak it online or send it to his friends," he said.

[ You may have more pressing concerns. See Apple Hacker: Mobile Malware Threat Overrated. ]

Facebook's use of HTTP for sending people's images appeared to be an inadvertent programming error. For comparison's sake, Ramadan noted, Facebook apps for iOS were sending images using HTTPS, which would have prevented anyone from intercepting them using sniffing tools.

Accordingly, he recommended that all affected Android users update immediately, to protect their privacy. "Don't be lazy," said Ramadan, who runs Attack-Secure, which offers "smarter ethical hacking and penetration testing," including a "ninja skills course."

Ramadan's bug disclosure earned him $1,500 as part of Facebook's bug bounty program. Facebook later sweetened the payout by $500 for Ramadan alerting it to HTTPS problems in Facebook Messenger for Android. "Both were rooted in the same code issues so we essentially treated the Messenger issues as part of the same report rewarded with the bounty," Facebook's security team told him.

That didn't mark Ramadan's first appearance on Facebook's White Hat Security wall of thanks. Last year, for example, he earned $3,000 for informing Facebook of a critical vulnerability in its Facebook Camera app for iPhone. He's also spotted vulnerabilities in BlackBerry apps, as well as on the websites of Adobe, GitHub, Google, Microsoft and others.

Attention on how websites transmit people's personal information or potentially sensitive material -- such as photographs -- has been high since security researcher Eric Butler published his Firesheep tool in 2010. The Firefox plug-in allowed anyone to intercept the login information and other sensitive communications to sites such as Amazon, Facebook, Google and Twitter, for anyone connected to the same unsecured wireless network. While such data interception had long been possible using sniffing tools, Butler's plug-in drove most Web services to begin using HTTPS, at least for securing sensitive information such as login credentials.

Learn more about mobile security and other threats by attending the Interop conference track on Risk Management and Security in New York from Sept. 30 to Oct. 4.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

CVE-2014-3303
Published: 2014-07-28
The web framework in Cisco WebEx Meetings Server does not properly restrict the content of query strings, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history, aka Bug ID CSCuj81713.

CVE-2014-3304
Published: 2014-07-28
The OutlookAction Class in Cisco WebEx Meetings Server allows remote attackers to enumerate user accounts by entering crafted URLs and examining the returned messages, aka Bug ID CSCuj81722.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.