Ο Wesley Wineberg, ένας ανεξάρτητος ερευνητής ασφαλείας, που συμμετείχε στο πρόγραμμα bug bounty του Facebook, κατάφερε να σπάσει τις άμυνες του Instagram και να αποκτήσει σχεδόν τον πλήρη έλεγχο της υπηρεσίας. Όταν ο ερευνητής αποκάλυψε την ευπάθεια στο Facebook, η company threatened to sue him, rather than pay his fee.
Wineberg began his research into Instagram's systems after a friend advised him that the siteσελίδα sensu.instagram.com, provides access to the Instagram admin panel.
The researcher identified the software that usesται από το πάνελ διαχείρισης, (Sensu-Admin), και χρησιμοποιώντας μια παλαιότερη research which states that the software may be vulnerable to RCE (remote code execution), managed to gain access to one of the configuration files containing the Sensu credentials associated with a PostgreSQL database.
In this database, Wineberg discovered over 60 λIemployee compliments on Instagram and Facebook. The codes access they were encrypted with bcrypt, but that didn't stop him from cracking some that were very easy (changeme, Instagram, password).
So soon she was able to log-in to the sensu environment.
But Wineberg did not stop here. From the configuration files, he discovered an access key to an account (AWS Amazon Web Services), which is used to access various S3 (data storage) drives.
He also discovered Instagram SSL certificates, keys and other APIs used to interact with other services, user photos, and static content on Instagram.com.
http://exfiltrated.com/research-Ιnstagram-RCE.php