Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Researcher: Flaws In Facebook App Authorization Could Lead To Clickjacking

Vulnerabilities could enable attackers to collect data on Facebook users and friends, Dhanjani says

Vulnerabilities in the way members authorize the use of third-party applications in Facebook could potentially lead to loss of personal information or even targeted attacks on specific individuals, a security researcher said today.

Nitesh Dhanjani, a well-known security researcher and author of Hacking: The Next Generation, says he has discovered design flaws in Facebook that could allow attackers to collect the personal information of users on the social networking site, and even build profiles of "friends" that might facilitate direct attacks on specific individuals within a company.

The flaws were presented to Facebook in November; Dhanjani has agreed not to release specific code or other details for two weeks while technical staffers at the social networking site continue their efforts to patch the vulnerabilities. Dhanjani says he has begun to speak generally about the problem, without specifics.

The vulnerabilities center around the way Facebook enables users to place third-party applications on their social networking pages, Dhanjani says. In a nutshell, Facebook allows the use of third-party apps within the confines of the site, but only if the user authorizes them. "If you click on a link that requires a third-party application, you see a dialog box, and you have to click 'yes' to authorize it," Dhanjani explains. "Once you authorize its use, all of your information -- your user ID, your friends list, everything -- is shipped to the third party. I'm not sure people really understand what's happening to their data."

Worse, Facebook also has enabled some applications to provide "automatic" authorization, Dhanjani observes. "When the user visits the application from within the Facebook environment, Facebook inserts "a parameter," he states in a report about the vulnerability. "If this parameter is present when the application is rendered, the application is allowed to scour information from the user's profile. The intention in this situation is that if the user clicked on the application [rather than a third-party site that redirects the user], the user has implicitly granted some level of authorization."

Dhanjani calls this automated authorization a "design flaw" in Facebook, but the social networking site has chosen not to comment on this particular concern. "They want users to be able to use the applications more easily, so it's basically a business decision to leave it the way it is," he states.

However, Facebook is responding to Dhanjani's assertion that flaws in these authorization procedures could potentially be exploited to create clickjacking attacks.

"The goal is to write a rogue Facebook application that is rendered when a user visits a malicious third party Website," Dhanjani explains in his report. "If the user already has an established session in Facebook [on another browser tab or window], the third-party site can load the malicious Facebook application in an iFrame to identify the user and steal the user's Facebook information."

Since only part of the actual Facebook site is being displayed in the iFrame, the attacker is essentially executing a "clickjacking" attack, Dhanjani says. The attacker is essentially creating a malicious application that looks like a legitimate app -- and then when the user clicks on the right link, the malware uses Facebook's flawed authorization process to collect all of the user's Facebook data, including information about the user's "friends."

"We've already seen clickjacking work on Facebook, but those attacks were mostly used to spread spam to users and their friends," Dhanjani says. "What's happening in this case is that the attacker is using clickjacking to collect the data of the user, as well as the data on their friends. You could map that data to specific domains, such as users who are in a company and their friends."

Cybercriminals could potentially use such a flaw to collect data on specific individuals, Dhanjani warns. "If you want to install malware on the computer of a user in a particular business unit of [a corporation], for example, that's pretty hard to do with a traditional browser attack. But with this, you can actually target an individual or build a group of individuals that you want to target with a specific piece of malware."

It's hard to tell how dangerous these attacks might be because the severity of targeted attacks can't be measured in numbers of infections or numbers of instances detected, Dhanjani says. "But I would be very surprised if there aren't already [hackers] looking at this vulnerability," he says.

Dhanjani plans to provide more details on the vulnerability, including specifics on code, in about two weeks -- "Hopefully, after Facebook has fixed the problem," he says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...