A New Tool Allows Hackers to Generate URLs that Can Hijack Accounts on Sites that Use Facebook Login, Potentially Enabling Powerful Phishing Attacks. The Tool Dubbed, 'Reconnect', was Released Last Week by Egor Homakov, a Researcher with Security Firm, Sakurity. It Takes Advantage of a Cross-Site Request Forgery (CSRF) Issue in Facebook Login, the Service that Allows Users to Login on 3rd-Party Websites Using their Facebook Accounts. Homakov Disclosed the Issue Publicly on his Personal Blog in January 2014, after Facebook Declined to Fix it because Doing so Would Have Broken Compatibility with a Large Number of Websites that Used the Service. "Facebook refused to fix this issue one year ago, unfortunately it's time to take it to the next level and give blackhats this simple tool", Homakov Said in a Blog Post Thursday.
http://sakurity.com/blog/2015/03/05/RECONNECT.html
The Attack Involves Generating Malicious URLs. When Potential Victims are Tricked into Clicking on the URLs, they're Logged Out of their Own Facebook Accounts and into Rogue Accounts on the Social Network that Have been Set Up by the Attackers. Also in the Background, their Accounts on Websites that Use Facebook Login are Linked to the Rogue Facebook Accounts Set Up by the Attackers. This Gives Attackers Control over the Victims' Accounts on those 3rd-Party Websites, Allowing them to Change Passwords, Read Private Messages and Perform Other Rogue Actions Using the Hijacked Accounts, Homakov Said. The 'Reconnect' Proof-of-Concept Tool, Can also Generate Malicious URLs to Hijack Accounts on Booking.com, Bit.ly, About.me, Stumbleupon, Angel.co, Mashable and Vimeo. However, Many More Websites that Support Facebook Login, Can be Targeted by Manually Inputting into the Tool the Links that Trigger Facebook Login Requests on Behalf of their Users.
In All, the Attack Exploits the Lack of CSRF Protection for 3 Separate Processes -- Facebook Login, Facebook Logout and 3rd-Party Account Connection -- Homakov Said. He Said the 1st 2 Issues Can be Fixed by Facebook but, the 3rd One Needs to be Fixed by the Sites that Integrate Facebook Login. Facebook did Try to Make the Issue Harder to Exploit, to the Extent it was Possible without Breaking Functionality and has Provided Guidance to Website Developers. "This is a well-understood behavior", the Company Said in an Emailed Statement. "Site developers using Login can prevent this issue by following our best practices and using the 'state' parameter we provide for OAuth Login. We've also implemented several changes to help prevent login CSRF and are evaluating others while aiming to preserve necessary functionality for a large number of sites that rely upon Facebook Login", the Company Said.
Info Source:
http://homakov.blogspot.com.au/2014/01/two-severe-wontfix-vulnerabilities-in.html
quinta-feira, 26 de março de 2015
Tool Allows Account Hijacking on Websites that Use Facebook Login
02:09
No comments
0 comentários:
Enviar um comentário