meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, September 20th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 20 September 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Taking Over Facebook Pages;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, September 20th, 2016 edition of the Sandson and Storm Center's

0:06.5

Stormcast. My name is Johannes Ulrich, and the day I'm recording from Baltimore, Maryland.

0:12.8

Aaron Sirish Kumar, a researcher, identified an interesting vulnerability in Facebook as part of Facebook's

0:20.0

Buck Bounty. This vulnerability would have allowed any use vulnerability in Facebook as part of Facebook's bug bounty.

0:22.0

This vulnerability would have allowed any user to take over any Facebook page.

0:28.7

A Facebook page is something typically businesses set up for their locations.

0:35.4

And the way they work is that these businesses can now assign some privileges

0:40.4

to a partner.

0:42.1

The way you would exploit this problem is that you set up your own page, you send a request

0:49.0

that would give access to your page to a partner but then you actually manipulate the requests

0:57.0

and you swap out your page ID for the victim's page ID which will then allow assign

1:04.5

privileges to the victim's page ID instead of to your own. So pretty standard direct object reference.

1:13.5

The request was not sufficiently authenticated.

1:17.9

Something we talk about in our web application security class for quite a bit.

1:23.7

And this is yet another example of such a vulnerability.

1:28.8

As usual, Facebook was very quick in patching this vulnerability and did pay out a nice

1:35.4

bug bounty.

1:37.6

Now, sticking with web applications, well, at least sort of, and reporting vulnerabilities

1:42.3

here for a moment, we do have another researchers that reported an interesting weakness in how exchange

1:51.3

auto discovery works.

1:53.2

Essentially, exchange auto discovery if you do add a new exchange account to a client.

1:59.6

This exchange client will then try to auto discover the settings

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.