Should the title be updated to reflect that this is 2+ months old? After all, the fix was put in place in a couple of hours. This isn't a current bug, but rather, an excellent post-mortem, but the title suggests present tense.
Given the seriousness, I would hope it is in the five figures (Facebook don't go into details about rewards, but a comparable exploit for a Google Account would net you at least $10k).
That's a pretty amateur mistake for a such an enormous company. Made respect for FB, but c'mon, how'd this slip through? This was a very trivial exploit.
I don't really agree. They made all the effort to put CSRF tokens everywhere, and the vast majority are properly validated, but here there was probably some bug where they assumed the CSRF token validation check was always running, but I guess it wasn't.
It's certainly a mistake, but it was probably easy for developers and QA to miss.
Interestingly several of my wife's hotmail using Facebook friends accounts appeared to have been owned last night. Has someone found a new similar exploit?
The exploit may not have been patched in the mobile version of facebook or may still work using a hotmail alias (passport.net or w/e). These are just guesses. I dug into Facebook security a while back and they seemed to have very little protection in place on the mobile site.
I believe so. A friend with a hotmail account (although I don't know if he uses this hotmail account to login to FB) got his FB account hacked couple of days ago.
Redirect URL when you give access to Facebook is different for other email providers. Hotmail (that is, Outlook) is the only one that worked as far as I know - I have tested Gmail and yahoo, but neither of them were exploitable (there is also chance I missed something, so it is worth checking again).
Did anyone else notice that the site and social networking properties were all put up at the same time as the post (roughly)? Good tactic for starting a business.
[+] [-] bdcravens|12 years ago|reply
[+] [-] adamnemecek|12 years ago|reply
[+] [-] Zoomla|12 years ago|reply
[+] [-] rmc|12 years ago|reply
[+] [-] ryhanson|12 years ago|reply
[+] [-] franjkovic|12 years ago|reply
[+] [-] objclxt|12 years ago|reply
[+] [-] unknown|12 years ago|reply
[deleted]
[+] [-] pdappollonio|12 years ago|reply
[+] [-] himal|12 years ago|reply
[+] [-] yeukhon|12 years ago|reply
Because the system is complex, and security is hard.
[+] [-] RexRollman|12 years ago|reply
[+] [-] debt|12 years ago|reply
[+] [-] meowface|12 years ago|reply
It's certainly a mistake, but it was probably easy for developers and QA to miss.
[+] [-] RKearney|12 years ago|reply
[+] [-] mehwoot|12 years ago|reply
[+] [-] homakov|12 years ago|reply
[+] [-] franjkovic|12 years ago|reply
[+] [-] geden|12 years ago|reply
[+] [-] chrismarlow9|12 years ago|reply
[+] [-] antr|12 years ago|reply
[+] [-] bonobo|12 years ago|reply
[+] [-] franjkovic|12 years ago|reply
[+] [-] b0b0b0b|12 years ago|reply
Or would the effort not procure enough reward?
[+] [-] ryansan|12 years ago|reply