Feeds

Facebook security glitch exposes user in-boxes

Cache glitch chaos forces users to work

The Power of One eBook: Top reasons to choose HP BladeSystem

Updated Office workers logging into Facebook on Tuesday morning were shocked to discover they were being served up other user's private pages.

Information going astray included other user's message inboxes. Fortunately more sensitive information - such as users' contact details - remained off limits to all but a member's friends.

The security glitch reared its head early on Tuesday, since when the site has been intermittently unavailable, at least in the UK. Access to the site from Spain, at least, has been fine since lunchtime.

The experience of Reg reader Wes seems typical.

"This morning I took part in my daily ritual of a cup of coffee and a quick look at my Face book account. However, when I logged in and click around, I was presented with other user's private pages, most notably other user's message inboxes. Further clicking around has exposed other areas of random people's accounts to me, but fortunately for them, so far all important information is still off limits," Wes reports.

Wes said the rest of his office are having similar difficulties accessing the service. Other Reg readers have written in reporting similar problems, some sending screen shots to illustrate their concerns.

In a statement, Facebook said the problem was due to a programming glitch - not the actions of external hackers - and has now been resolved, after the firm temporarily suspended services to apply an update. It apologised for any inconvenience.

"This morning, we temporarily took down the Facebook site to fix a bug we identified earlier today. This was not the result of a security breach. Specifically, the bug caused some third party proxy servers to cache otherwise inaccessible content. The result was that an isolated group of users could see some pages that were not intended for them. The site has now been restored, and we apologise for any inconvenience this may have caused," it said. ®

Bootnote

We can perhaps console ourselves with the observation that because Facebook was down for everyone for a short time on Tuesday - and unavailable for some for a much longer period - office workers were obliged to get on with their work, instead of posting photos and exchanging banter with their mates. Parts of the economy should be braced for unexpected end of month jump in productivity, perhaps.

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.