TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hacking Facebook’s Legacy API, Part 2: Stealing User Sessions

31 pointsby ssclafanialmost 11 years ago

4 comments

nmjohnalmost 11 years ago
This should serve as a reminder to developers, GET requests should only be returning information, not writing information.<p>With an IMG tag it&#x27;s trivial to get any user to execute any GET request the attacker wants, and that was critical in this exploit for binding a specified token to a users account.
评论 #8106730 未加载
e12ealmost 11 years ago
What a great writeup! I&#x27;m always uneasy about web and rest security, because of the number of serious issues found in production apps that have huge engineering resources behind them. It&#x27;s nice to see examples like this that show that the good old enemies of security are still a large factor: complexity, convenience and features&#x2F;feature creep (often driven by convience leading to complexity).<p>Nice, because the article clearly shows how a more conservative approach would have avoided these issues. So with a more limited scope it should be possible to avoid these issues, even with limited resources :)
eyearequealmost 11 years ago
Nice work, and great write up.<p>Mobile website security issues are often overlooked, but are a great place to look when pentesting.
spacefightalmost 11 years ago
A fair bounty considering the found bugs (20k). Have you considered donating part of it to charities or similar, e.g. the EFF?
评论 #8105438 未加载
评论 #8105576 未加载