exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Facebook Open Redirect

Facebook Open Redirect
Posted Jun 17, 2013
Authored by Arul Kumar.V

Facebook suffers from multiple open redirection vulnerabilities.

tags | exploit, vulnerability
SHA-256 | ecb907c5f37e4481ae56ae2fb0c1732c0e9bfd6002f6d3f56c8b3ec870c12277

Facebook Open Redirect

Change Mirror Download
Description:
[#] Title : Facebook Open URL Redirection Vulnerability 2013
[#] Status : Unfixed
[#] Severity : High
[#] Works on : Any browser with any version
[#] Homepage : www.facebook.com
[#] Author : Arul Kumar.V
[#] Email : arul.xtronix@gmail.com

I have found Open URL Redirection Vulnerabilities in facebook's
dialogs such as"Option Dialog","Friends Dialog","OAuth Dialog".This
Vulnerability is exploitable to all users who are signed into
facebook.

Impact of Vulnerability:
1. The user may be redirected to an untrusted page that contains
malware which may then compromise the user's machine.

2. The user may be subjected to phishing attacks by being redirected
to an untrusted page.

3. This bug can be applicable to any user who are signed in which
works at any browsers with any version.

Vulnerable Dialogs:
Option Dialog : (/dialog/optin)
OAuth Dialog : (/dialog/oauth)
Friends Dialog : (/dialog/friends)

Source:
https://vimeo.com/68469298
http://www.securitytube.net/video/7787

If you need more details about this bug,Visit my blogspot.I have
explained in brief about this bug.
http://arulxtronix.blogspot.in/2013/06/facebook-open-url-redirection_3515.html

Proof Of Concept:

If any signed facebook user clicks any one of the following link,they
will be redirected into our desired pages.URL Shorteners can be used
to mask malicious links.

Note: You must be signed into a facebook account to redirect sites.

Vulnerable URL's:
Once again i am remembering you,you must be signed into an facebook
account to redirect sites

1)Using "next" Parameter:
https://www.facebook.com/dialog/optin?app_id==&next=http://google.com

https://www.facebook.com/dialog/oauth?app_id==&next=http://yahoo.com

https://m.facebook.com/dialog/friends?app_id==&next=http://bing.com

2)Using "redirect_uri" Parameter:
https://www.facebook.com/dialog/optin?app_id==&redirect_uri=http://google.com

https://www.facebook.com/dialog/oauth?app_id==&redirect_uri=http://yahoo.com

https://m.facebook.com/dialog/friends?app_id==&redirect_uri=http://bing.com

3) Phising demo:
www.facebook.com/dialog/optin?app_id==&next=http://fbnew.t15.org

Thank You,
Arul Kumar.V
Login or Register to add favorites

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close