meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, October 2nd 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 2 October 2018

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Facebook Update; Adobe Acrobat Update; SMTP MTA Strict Transport Security

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, October 2, 2018 edition of the Sandcent Storm Center's Stormcast.

0:07.0

My name is Johannes Ulrich, and today I'm recording from Honolulu, Hawaii.

0:13.0

Facebook published a blog post with a bit more details about which vulnerabilities exactly were exploited in order to gain access to

0:22.4

these 50 million accounts that I talked about yesterday. The exploit was a bit more complicated

0:29.9

than what I envisioned. So first of all, it all starts out with viewing your own profile as a

0:37.4

different user. In this mode, you're supposed

0:40.5

to only be able to view your profile not to make any changes to your profile. However,

0:46.9

turns out there was one particular feature, and that's when you upload a video to user's

0:51.8

account to wish them happy birthday. That was still available,

0:56.0

so now you were able to upload a video to your own page while you were using this view as feature.

1:05.0

The access token created when you're doing so had two important flaws. First of all, this access token was created

1:13.4

for the user that you were impersonating. So that's essentially now how you got access to this

1:19.7

user's data by using this access token. But the other problem was that this token was really only

1:26.4

supposed to allow you to upload the video.

1:28.4

Nothing else.

1:29.7

Well, in addition, it was actually possible to use that token to use the mobile Facebook app.

1:36.0

So this is how the attackers were able to gain access to users' profiles.

1:42.4

At this point, Facebook states they're still investigating, so they're still

1:46.5

not 100% sure how many accounts were actually affected and what exactly was done with data or what

1:54.0

was done to these accounts. Personally, I actually think it's nice of Facebook to provide some

1:59.8

details about how these attacks work.

2:02.3

Certainly, it doesn't look like a very simple flaw and something that probably took some work to really figure out how to exploit this vulnerability.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.