J2TEAM Security: A must-have extension for Chrome users. Install now!

HIJACKING A FACEBOOK ACCOUNT WITH SMS

HIJACKING A FACEBOOK ACCOUNT WITH SMS | Juno_okyo's Blog
1 min read
This post will demonstrate a simple bug which will lead to a full takeover of any Facebook account, with no user interaction. Enjoy.

Facebook gives you the option of linking your mobile number with your account. This allows you to receive updates via SMS, and also means you can login using the number rather than your email address.

The flaw lies in the /ajax/settings/mobile/confirm_phone.php end-point. This takes various parameters, but the two main are code, which is the verification code received via your mobile, andprofile_id, which is the account to link the number to.



The thing is, profile_id is set to your account (obviously), but changing it to your target’s doesn’t trigger an error.

To exploit this bug, we first send the letter F to 32665, which is Facebook’s SMS shortcode in the UK. We receive an 8 character verification code back.



We enter this code into the activation box (located here), and modify the profile_id element inside thefbMobileConfirmationForm form.



Submitting the request returns a 200. You can see the value of __user (which is sent with all AJAX requests) is different from the profile_id we modified.



Note: You may have to reauth after submitting the request, but the password required is yours, not the targets.

An SMS is then received with confirmation.



Now we can initate a password reset request against the user and get the code via SMS.



Another SMS is received with the reset code.



We enter this code into the form, choose a new password, and we’re done. The account is ours.


Fix

Facebook responded by no longer accepting the profile_id parameter from the user.
Timeline

23rd May 2013 - Reported
28th May 2013 - Acknowledgment of Report
28th May 2013 - Issue Fixed
Note

The bounty assigned to this bug was $20,000, clearly demonstrating the severity of the issue.
Credit:http://blog.fin1te.net/

Bạn có thể thích những bài đăng này

  • Trong một bài viết trước Juno_okyo's Blog đã giới thiệu về DNS Spoofing. Và giờ tiếp tục với DNS Hijacking: Here is a beautiful Tut From my dear friend H4x4rwOw on DNS HI…
  • This post will demonstrate a simple bug which will lead to a full takeover of any Facebook account, with no user interaction. Enjoy. Facebook gives you the option of linking your …
  • A critical vulnerability was recently found in Facebook that could allow an attacker to hijack, and take control over, accounts on the social network. No, not the one that requi…
  • Its not made by me. I am just sharing it.Eboz is a turkish hacker. Even he pwned pakisani's google, ebay and many sites. ADVANCED DNS HIJACKING GUIDE |=-------------------------…
  • Today Facebook rollouts for FB users to comment with picture on any status. But the feature has a bug which allows malicious user to hijack the picture from any comments if the p…
  • Bằng cách sử dụng những đoạn script Facebook Like Hijacking, attacker hoàn toàn có thể kiểm soát từng click của bạn. Lợi dụng những script này, việc chèn vào các ứng dụng nhằm c…

2 nhận xét

  1. second ago
    Còn dùng được không vậy bạn
    1. second ago
      Facebook Team đã fix bug này rồi bạn nhé! ;)
Cảm ơn bạn đã đọc bài viết!

- Bạn có gợi ý hoặc bình luận xin chia sẻ bên dưới.

- Hãy viết tiếng Việt có dấu nếu có thể!