TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hijacking a Facebook Account with SMS

148 pointsby phwdalmost 12 years ago

12 comments

ComputerGurualmost 12 years ago
Facebook can and should be held liable for clear failings on the behalf of their security team.<p>Absolutely no backend code should be pushed out that isn&#x27;t first audited by a security company. God knows they can afford it, and mistakes like this could end up being much more costly to Facebook (stock price, lawsuits, etc).<p>Crap like this makes it clear that not only are critical changes to the security infrastructure at Facebook not at all audited (in-house or outsourced!) for even the most ludicrously-obvious security vulnerabilities, but also that Facebook itself does not take even begin to take security seriously.<p>And this is completely ignoring the fact that it took them five days to acknowledge such a critical issue, which is a further symptom of Facebook&#x27;s sheer apathy to the security, privacy, and data of their users, both corporations and individuals alike. To think that a company&#x2F;website like Facebook, containing as private and personal information as Facebook profiles have, and with such incredible monetary and technical resources at its beck and call cannot even triage incoming vulnerability reports correctly makes absolutely zero sense.
评论 #5950521 未加载
评论 #5950880 未加载
评论 #5949999 未加载
评论 #5950180 未加载
SpikedColaalmost 12 years ago
Chrome 27.0.1453.116 (for me) says:<p>&quot;Warning: Suspected phishing site!<p>The website at blog.fin1te.net contains elements from sites which have been reported as “phishing” sites. Phishing sites trick users into disclosing personal or financial information, often by pretending to represent trusted institutions, such as banks.&quot;<p>The home page doesn&#x27;t produce this message, even though the linked article is summarized there. Clicking on the article from the home page also produces this message.<p>Nonetheless, very simple yet very clever exploit! I&#x27;m sure someone kicked themselves pretty hard over that one.
评论 #5949905 未加载
评论 #5949543 未加载
评论 #5949888 未加载
nlyalmost 12 years ago
This is mindbogglingly bad. How did they manage to introduce a dependence on unauthenticated client-side state for such a critical operation in a relatively new feature?<p>If they weren&#x27;t willing to hit the database to recall the profile_id for the reset operation, it makes me wonder whether the confirmation codes are in fact deterministic, rather than randomly generated.
评论 #5949840 未加载
评论 #5953549 未加载
guynamedlorenalmost 12 years ago
This root of this bug (exposing profile_id or some user identifier in a hidden field and passing it to the server as a parameter) is incredibly common, and super easy to exploit via <i>inspect element</i>.<p>We have a rails test that we give dev candidates, and red flags go up when we see this happening (which is far more often than I&#x27;d like to admit). Kind of scary that there&#x27;s likely a bunch of production code floating around that is so easily hackable.
quackerhackeralmost 12 years ago
Great ingenuity in finding authentication flaws. It&#x27;s exactly what I told a friend who is learning programming...it&#x27;s all trial and error.<p>Every time I hear the reward amounts, it entices me to divert my attention to finding bugs and loopholes in systems. :&#x2F;
评论 #5949727 未加载
vxNsralmost 12 years ago
This is an incredibly simple (and dangerous) hack, I&#x27;m happy to see it was neutralized so soon after being discovered.<p>Also good to see that the finder was amply rewarded for his effort.
dchichkovalmost 12 years ago
Nice.<p>A side note - the SMS confirmation code text should <i>explain</i> what is going to happen when the code is used. Along the lines: &quot;Facebook mobile confirmation code ds3467hj. <i>Note. Entering this code would link this phone to your Facebook account</i>&quot;.<p>Otherwise, if the SMS is just &quot;confirmation code ds3467hj&quot; it is overly easy to create a phishing attack which results in the user (striving to get access to some resource, like a magazine article for example) in entering the code on an attacker web site.
benguildalmost 12 years ago
Looks like an easy $20,000. :)
fatbatalmost 12 years ago
Looks like there was a 2-day window between when the reveal post was made vs when Facebook fixed it.
评论 #5949602 未加载
评论 #5949700 未加载
评论 #5949712 未加载
BESebastianalmost 12 years ago
I&#x27;m surprised this ever made it into production. Never, ever trust user input.
3327almost 12 years ago
So how much does a facebook 0-day go for these days anyway?
nilsjuenemannalmost 12 years ago
This bug shows us, how bad their software really is and that all the PHP crap on their frontend can access every data from every users. If they have had a &quot;middleware&quot; between frontend and database, such kind of bugs weren&#x27;t possible.<p>Anyone remember the bug as everyone had access to private photos of Marc Zuckerberg?<p><a href="http://www.telegraph.co.uk/technology/facebook/8938725/Facebook-privacy-flaw-exposes-Mark-Zuckerberg-photos.html" rel="nofollow">http:&#x2F;&#x2F;www.telegraph.co.uk&#x2F;technology&#x2F;facebook&#x2F;8938725&#x2F;Faceb...</a><p>Same auth-bypass shit.
评论 #5950548 未加载
评论 #5949897 未加载
评论 #5949801 未加载
评论 #5950187 未加载