Researcher nets $20K for finding serious Facebook flaw

The problem, now fixed, could have allowed anyone to take over a person's account

A U.K.-based researcher has netted $20,000 for spotting a very serious flaw in Facebook that could have allowed an attacker to take over anyone's account with minimal effort.

The flaw was fixed by Facebook about a month ago, wrote Jack Whitten, an application security engineer who posted a post-mortem on his blog.

[ Also on InfoWorld: Facebook may have leaked data for users and nonusers alike. | The Web browser is your portal to the world -- and the gateway for security threats. InfoWorld's expert contributors show you how to secure your Web browsers. Download the free PDF today! | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]

Whitten found it was possible to reset the password of anyone's account by exploiting an error in how Facebook lets users link their mobile phone to their account for purposes such as receiving updates over SMS.

Facebook sends a verification code by SMS when a user registers a phone. But Whitten found it was possible to modify the "profile_id" field within the mobile confirmation form to that of a different user.

Facebook then asks for a password but not the one of the potential victim, Whitten wrote. The account of the victim is then inadvertently linked with the attacker.

Whitten then initiated a password reset on the victim's account. The code needed to reset that password was sent to Whitten's phone, along with a link to a password reset page.

"We enter this code into the form, choose a new password, and we're done. The account is ours," Whitten wrote.

A flaw such as the one found by Whitten would have had value among cyberattackers seeking to abuse Facebook accounts for spam or for the theft of personal data.

"The bounty assigned to this bug was $20,000, clearly demonstrating the severity of the issue," he wrote.

Whitten, who goes by the screen name "fin1te," has been recognized for finding vulnerabilities by Google, Facebook and Etsy.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

From CIO: 8 Free Online Courses to Grow Your Tech Skills
Join the discussion
Be the first to comment on this article. Our Commenting Policies