PoC for Facebook Worm: A Polish security researcher today published a PoC that could be used to create a fully functional Facebook worm.
The code exploits a security gap on the Facebook platform. The investigator using the Lasq alias discovered the vulnerability when he noticed that spammers used it on Facebook.
The vulnerability is in the version of the app for cell phones. The desktop version is not affected.
Lasq reports that the vulnerability allows clickjacking and that an attacker can exploit it via credentials iframe.
Yesterday I noticed a very annoying SPAM campaign on Facebook where many of my friends were posting a link to a site hosted on an AWS bucket. There was also some link to a French site with funny comic.
After clicking the link, the page hosted on the AWS bucket appeared, asking you to verify that you are 16 or older (in French) to get access in the content. After clicking the button, the page forwarded you to a page with funny comics (and lots of ads). However, in the meantime the same link you just clicked has automatically posted to your Facebook wall as well.
The researcher followed the issue and noticed that he was completely unaware of the security header "X-Frame-Options." This header is used by websites to prevent page code from loading through iframes and is a primary protection against clickjacking attacks.
Lasq said he announced the problem on Facebook, but the company refused to correct it. So he decided to publish the PoC.
Lasq's code doesn't include the clickjacking part, the one that posts content to victims' walls, but if you're interested and want to find it, it's on thenetwork with a simple search. Lasq's code only allows an attacker to load and execute unauthorized code on a Facebook user account.
___________
- Old Messages in Facebook return randomly to users
- LibreOffice 6.1.4 New Release from Document Foundation
- Facebook Research by DPC for leaked photos
- Facebook two-factor authentication without phone number