Vulnerabilities / Threats
9/20/2013
01:36 PM
Connect Directly
RSS
E-Mail
50%
50%

Android Facebook App Users: Patch Now

Facebook has fixed a bug in its Android app that left photos vulnerable to interception.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
Facebook apps for Android users: Ensure you've recently updated your Facebook app.

That warning comes via Egyptian security researcher Mohamed Ramadan, who disclosed Thursday that he'd found an HTTPS bug in Facebook's Android app -- as well as Facebook Messenger -- that have now been patched by the social network's security team. The bug could be exploited by an attacker using Wireshark or another sniffing tool to intercept images being transmitted to Facebook.

According to Ramadan's security report to Facebook, filed in February 2013, "I found that the official Facebook Messenger and Facebook app for Android latest version are sending and receiving images using HTTP protocol and anyone on the same wireless network can sniff my traffic and view all images or even replace it with his own images."

As a result, when using a vulnerable version of one of the apps, "if you are using a wireless network at cafe, hotel, airport, museum, disco, your friend's wireless network or even your own wireless network ... an attacker can run cain and abel, Ettercap, SSLstrip or his own tool to poison the traffic and hijack ARP table and sniff your images and your private images and leak it online or send it to his friends," he said.

[ You may have more pressing concerns. See Apple Hacker: Mobile Malware Threat Overrated. ]

Facebook's use of HTTP for sending people's images appeared to be an inadvertent programming error. For comparison's sake, Ramadan noted, Facebook apps for iOS were sending images using HTTPS, which would have prevented anyone from intercepting them using sniffing tools.

Accordingly, he recommended that all affected Android users update immediately, to protect their privacy. "Don't be lazy," said Ramadan, who runs Attack-Secure, which offers "smarter ethical hacking and penetration testing," including a "ninja skills course."

Ramadan's bug disclosure earned him $1,500 as part of Facebook's bug bounty program. Facebook later sweetened the payout by $500 for Ramadan alerting it to HTTPS problems in Facebook Messenger for Android. "Both were rooted in the same code issues so we essentially treated the Messenger issues as part of the same report rewarded with the bounty," Facebook's security team told him.

That didn't mark Ramadan's first appearance on Facebook's White Hat Security wall of thanks. Last year, for example, he earned $3,000 for informing Facebook of a critical vulnerability in its Facebook Camera app for iPhone. He's also spotted vulnerabilities in BlackBerry apps, as well as on the websites of Adobe, GitHub, Google, Microsoft and others.

Attention on how websites transmit people's personal information or potentially sensitive material -- such as photographs -- has been high since security researcher Eric Butler published his Firesheep tool in 2010. The Firefox plug-in allowed anyone to intercept the login information and other sensitive communications to sites such as Amazon, Facebook, Google and Twitter, for anyone connected to the same unsecured wireless network. While such data interception had long been possible using sniffing tools, Butler's plug-in drove most Web services to begin using HTTPS, at least for securing sensitive information such as login credentials.

Learn more about mobile security and other threats by attending the Interop conference track on Risk Management and Security in New York from Sept. 30 to Oct. 4.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.