Feeds

Facebook scrambles to close hole exposing private data

Gives attacker almost as much control as user

Intelligent flash storage arrays

Facebook engineers are finishing a patch for a critical vulnerability that exposed user birthdays and other sensitive data even when they were designated as private, a security researcher said Wednesday.

The bug could be exploited by prompting a user to click on a link while logged into the social networking site, said M.J. Keith, a senior security analyst with Alert Logic, a provider of cloud-based intrusion detection systems. Attackers could then read, delete, or alter a victim's profile page, including pictures and data that are set to be viewed only by trusted friends.

"I would assume that every single Facebook user [could] have [had] their Facebook page defaced or have exposed things about them," Keith told El Reg. The bug "gives the attacker almost as much control as the user."

At time of writing, much of the CSRF (cross-site request forgery) bug appeared to have been patched, Keith said. However, as noted earlier by IDG News, attackers still could exploit the flaw to control a user's "like" functions, which are used to endorse ads and other types of content.

Facebook representatives didn't respond to an email asking about the status of the bug fix.

The flaw involved a piece of code Facebook engineers dubbed "post_form_id," which is used to ensure that commands can be issued only by browsers that have previously logged into the website. Keith discovered a simple way to bypass the security token: by omitting it altogether, Facebook servers no longer attempted to validate browsers.

It's at least the second glitch to compromise Facebook user privacy this month. Nine days ago, Facebook had to temporarily disable the site's live chat function to contain a bug that allowed users to eavesdrop on their friends' conversations.

Keith's advisory is here. ®

Update

A Facebook spokesman sent us a statement that included the following:

"Alert Logic reported a CSRF vulnerability to us, and we worked quickly to resolve it. We're in the process of confirming that all endpoints have been patched. We maintain a strong relationship with security experts around the world and work closely with them in the rare instances in which they find vulnerabilities."

He also noted that people can report Facebook vulnerabilities here.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.