• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

Adobe Flash is a HUGE SECURITY BACKDOOR!

motormafia

Alfrescian
Loyal
Joined
Aug 7, 2008
Messages
1,204
Points
48
Al though facebook & myspace fixed their sites, the problems facing us users are still existing on ANY websites that runs flash, there are too many of them. This is why I never trusted flash, I install add-on filters to block them all.


https://addons.mozilla.org/en-US/firefox/addon/433

<hr width="50%">

http://www.techcrunch.com/2009/11/0...yspace-flash-vulnerability-exposes-user-data/

Massive Facebook And MySpace Flash Vulnerability Exposes User Data (Updated)
:eek::eek:
* 38 Comments
*
503 retweet TOP100
*
Share277

by Jason Kincaid on November 5, 2009

A Facebook developer named Yvo Schaap has uncovered a massive security flaw present on both Facebook and MySpace that would give hackers the ability to steal all of your account data, including your photos, personal messages, and basically everything else you’ve ever put on the social networks, without you ever realizing it.
Update: MySpace tells us that in their case no private data was actually exposed, see their statement below. However, Schaap believes that MySpace is simply wrong, and that they were in fact open to the exploit.

Schaap stumbled upon the exploit and contacted both Facebook and MySpace. According to his blog MySpace has since fixed the bug, and while his blog indicates that Facebook is still working on it we’ve confirmed that they’ve fixed it as well. So what exactly could the exploit do? From Schaap’s blog:

You don’t need much time to think of all the ways this could be exploited. All what has to happen is a active session, or a “auto login”-cookie and a URL which hosts a exploiting Flash file. For example when accessed, a automatic “post update” could be mad e, that would lure friends of the user to access the exploit URL, and the exploit would spread virally. An more invasive and hidden exploit could harvest all the users personal photo’s, data and messages to a central server without any trace, and there is no reason why this wouldn’t be happening already with both Facebook and MySpace data.

Schaap’s post is accurate regarding Facebook’s problem, but MySpace says none of their private data was compromised. However, Schaap believes the MySpace is totally wrong. We’re waiting for further clarification on their end. Here’s MySpace’s statement:

“We’re 100% dedicated to the safety and security of our users and immediately after MySpace’s security team identified this spoutbuilder issue we blocked spoutbuilder and then helped them resolve their vulnerability. No private MySpace data was exposed and the vulnerability was never exploited.”

If you’ve ever checked that ‘remember me’ button on Facebook the MySpace login screen and have at any point viewed a Flash app taking advantage of the exploit, it’s possible that all of your data was compromised. You wouldn’t even have to neccesarily open anything — if one of the infected items showed up in your News Feed you could have your data stolen without ever knowing it. Yeah, that’s pretty damn scary. For what it’s worth, Facebook gave us this statement:

The security of our users is a top priority for Facebook and we worked with the researcher who identified the issue to fix it. We have not received any reports that it was ever exploited.

Of course, Schaap pretty clearly writes that there’s no way for a user or even Facebook to tell if their data was harvested, so for all we know it could have been used by multiple developers for months or longer (Facebook is currently investigating how long the bug may have existed). Granted, Schaap could be the first developer to ever stumble across the exploit. But the potential of this bug is so huge — allowing a developer to mine all of the data for any user who accessed their app — that less honest developers may well have used the hack for their own benefit. Facebook has previously said that there are a whopping 300,000 developers building on its platform. And we’ve seen time and time again that some of those developers are not opposed to Black Hat tactics. MySpace has had its own problems.

This is obviously bad news for both social networks, but Facebook in particular has long been heralded as the safer of the two, with its extensive privacy settings and authentic identities. Yet the site has repeatedly seen glitches in its security. I’ve written before about the sorry state of our privacy and the security of our data online, and issues like this underscore that the problem isn’t getting any better. Facebook is no longer just a platform for learning about your college buddies — it’s a serious business, used for photos and messages that can be very sensitive. Hell, I’ve heard of journalists who regularly use Facebook to reach out to potential sources, when secrecy is of the utmost importance. Apparently that’s not a good idea.

The security vulnerability works by taking advantage of an oversight in a crossdomain.xml configuration file, which is used by Flash applets to determine if an application has permission to access data on that domain. The crossdomain.xml files at Facebook and MySpace were allowing any applet from any other domain to access data and the API. Combined with browsers keeping a record of your logged in session if you have checked ‘remember me’, the vulnerability means that an invisible Flash applet on any website you visit would be able to read out all your data and send it away somewhere else. For more on cross-domain requests and security, there is a write up explaining all the details.

If you’re interested in the nature of the exploit itself, head over to Schaap’s blog for a full description of how he stumbled on it.
 
Last edited:
http://news.techworld.com/networkin...e-flaw-may-expose-users-private-data/?olo=rss

Major Facebook, MySpace flaw may expose users' private data
Developer finds coding error that leaves data open to hackers


* Email to a friend
* Print this article
* Bookmark this page
* RSS feed
* Share this article

By Jeremy Kirk
Published: 16:08 GMT, 05 November 09

MySpace and Facebook have apparently fixed coding errors that could have allowed hackers to access to all of their users' data and photos.

The simple coding errors are alarming considering the extent to which social networks have gone to reassure their users that their data will be safe. The security flaw involved the way those sites handle requests for data from other domains, known as the "cross-domain policy."

Sites such as MySpace and Facebook typically block other domains from requesting and receiving data for privacy reasons, except for their own vetted subdomains.

Facebook disallowed access from other applications on its main domain, but a developer in the Netherlands, Yvo Schaap, found that Facebook would allow data to be given out from one of its subdomains.

Since the subdomain also hosted all of Facebook's data, it would be possible to steal data by luring a victim to a URL with a Flash application rigged to grab the data if the victim had their auto-login enabled, which most people do, according to Schaap's blog.

A "more invasive and hidden exploit could harvest all the user's personal photos, data and messages to a central server without any trace, and there is no reason why this wouldn't be happening already with both Facebook and MySpace data," Schaap wrote on his blog.

He also found the problem on MySpace, which allowed a domain called "farm.sproutbuilder.com" to access data. A Flash application could be uploaded to that site, which would then be allowed access to the data if a victim visited a malicious URL.

A look at Facebook's latest crossdomain.xml file shows that the bug appears to have been fixed. MySpace also appears to have taken "farm.sproutbuilder.com" out of its cross-domain list.

Facebook and MySpace could not be immediately reached for comment.
 
http://tw.news.yahoo.com/article/url/d/a/091109/17/1ul3r.html


驚!Facebook遭踢爆有安全漏洞 網友資料可能早已外洩?

NOWnews 更新日期:"2009/11/09 09:07" 記者蘇湘雲/綜合報導

受到數億人歡迎的Facebook傳出,在過去一直存在有一重大安全漏洞!發現此狀況的一名應用程式開發人員Yvo Schaap說,雖然官方已經緊急修補該漏洞,但是可能已驚讓駭客取得使用者的賬戶個資、照片以及所有發佈在社交網路上的資料。

Yvo Schaap在個人MySpace部落格文章點名Facebook及MySpace含有重大安全漏洞,Schaap指出,Adobe推出crossdomain.xml以讓特定網域能夠存取其他網域的資料,在Facebook則不然,即使透過crossdomain.xml,仍舊禁止非Facbook網域的Flash程式存取主要網域資料;可是 Facebook卻允許任何flash應用程式存取子網域的資料,而該子網域竟然儲存所有Facebook的資產,包括Facebook用戶程序。

Schaap 表示,這也就是說,如果使用者是採用自動登入Facebook的模式,就能透過在用戶程序看到使用者的全名,還可利用使用者的憑證執行Facebook上的功能;而更嚴重的狀況是出在,大多數的Facebook用戶都啟動自動登入功能。此外,MySpace也有類似的漏洞。

因此,駭客很容易利用此漏洞,讓瀏覽器自動載入cookie及一個含有惡意Flash檔案的URL,此用戶會在不知情的情況下,帳戶再次自動登錄,而當用戶處理自動更新的時候,惡意代碼和病毒就會自動透過代為張貼使用者訊息,散佈給好友,同時,駭客在竊取資料時,不會在伺服器留下任何痕跡。

Yvo Schaap的發現對Facebook和MySpace是一個嚴重的打擊,雖然Facebook及MySpace迅速修補此漏洞,但是由於這兩個網站曾經多次被發現存在嚴重的安全問題,Schaap與外就普遍認為,應該已有其他開發人員已經發現此一漏洞,只是一直未被揭發而已,而使用者的資料可能早就外洩了。
 
Back
Top