Facebook many vulnerabilities found by @AnonymousOwn3r


SUBMITTED BY: Guest

DATE: Nov. 9, 2013, 9:01 a.m.

FORMAT: Text only

SIZE: 4.6 kB

HITS: 1124

  1. Facebook many vulnerabilities found by @AnonymousOwn3r
  2. https://twitter.com/AnonymousOwn3r
  3. http://www.facebook.com
  4. 2720/2724 100%
  5. Cross-site Request Forgery
  6. Cross-site Request Forgery (CSRF) is a type of attack whereby unauthorized commands are transmitted from a user that the application trusts. Unlike Cross-site Scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser.
  7. solution: Url and Forms that perform important operations must be protected by random tokens (hidden nonce values). These tokens must be checked for validity at the server before the request is processed.
  8. url: http://www.facebook.com/
  9. form: <form method="POST" action="http://www.facebook.com/" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
  10. url: http://www.facebook.com/find-friends?ref=pf
  11. form: <form method="POST" action="https://www.facebook.com/find-friends/index.php" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
  12. url: http://www.facebook.com/facebook
  13. form: <form method="POST" action="http://www.facebook.com/ajax/ufi/modify.php" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
  14. url: http://www.facebook.com/pages/create.php?ref_type=sitefooter
  15. form: <form method="POST" action="http://www.facebook.com/ajax/pages/create/CreatePageCheck.php" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
  16. url: http://www.facebook.com/help/adpolicy
  17. form: <form method="POST" action="http://www.facebook.com/support/ajax/feedback.php" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
  18. url: http://www.facebook.com/r.php?possible_fb_user=1&is_enabled=1&next=https%253A%252F%252Fwww.facebook.com%252Fphoto.php%253Fv%253D3802752155040&locale=en_US
  19. form: <form method="POST" action="http://www.facebook.com/r.php?possible_fb_user=1&is_enabled=1&next=https%253A%252F%252Fwww.facebook.com%252Fphoto.php%253Fv%253D3802752155040&locale=en_US" enctype="application/x-www-form-urlencoded" autoc...
  20. Autocomplete Enabled
  21. Autocomplete should be disabled (autocomplete="off"), especially in forms which process sensitive data, such as forms with password fields, since an attacker, if able to access the browser cache, could easily obtain the cached information in cleartext.
  22. solution: Disable the autocomplete feature (autocomplete="off") on forms which may hold sensitive data.
  23. url: http://www.facebook.com/
  24. form: <form method="POST" action="http://www.facebook.com/" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
  25. url: http://www.facebook.com/r.php?possible_fb_user=1&is_enabled=1&next=https%253A%252F%252Fwww.facebook.com%252Fphoto.php%253Fv%253D3802752155040&locale=en_US
  26. form: <form method="POST" action="http://www.facebook.com/r.php?possible_fb_user=1&is_enabled=1&next=https%253A%252F%252Fwww.facebook.com%252Fphoto.php%253Fv%253D3802752155040&locale=en_US" enctype="application/x-www-form-urlencoded" autoc...
  27. Path Disclosure
  28. Various system paths were disclosed within the application client source code or other files. This information could be used by attackers to make an educated guess about the application environment and any inherited weaknesses that may come with it.
  29. solution: It is recommended to re-examine the system path disclosures and remove their reference from the application's source code.
  30. path: e:\u003C ...
  31. request:
  32. GET http://www.facebook.com/jackie HTTP/1.1
  33. path: d:\u003C ...
  34. request:
  35. GET http://www.facebook.com/jackie HTTP/1.1
  36. IP Disclosure
  37. The server or application disclosed internal network information. This information could be used by attackers to make an educated guess about the internal or external network topology. Leaked IP addresses could be used as a stepping-stone to more complex attacks.
  38. solution: Ensure that sensitive information such as internal or external IP addresses is safely guarded. Unless there is a good, prevent the disclosure of network information.
  39. ip: 10.3.181.34
  40. request:
  41. GET http://www.facebook.com/careers/?ref=pf HTTP/1.1
  42. Facebook many vulnerabilities found by @AnonymousOwn3r
  43. https://twitter.com/AnonymousOwn3r

comments powered by Disqus