exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

20050207_facebook.txt

20050207_facebook.txt
Posted Feb 22, 2005
Authored by Jonathan Rockway

thefacebook.com is susceptible to a cross site scripting attack.

tags | advisory, xss
SHA-256 | 9a84bd32409cc970109d3557c565d339ae25182a960753cf758fbdce4603a8cb

20050207_facebook.txt

Change Mirror Download
XSS Vulnerability at thefacebook.com

Not surprisingly, ``thefacebook'' <http://www.thefacebook.com/> contains an XSS hole. Basically, the signup form for paid announcements lets you add a school to display the announcement at. The script that adds the school accepts the name of the school as the "add" argument. Any HTML can be injected here, leading to an XSS exploit. Here's a sample injection:

http://www.thefacebook.com/announce.php?step=1&add=
<script>
var c = document.cookie;
alert("Security hole. ");
document.write("Your cookie is: <b>");
document.write(c);
document.write("</b>.<br><br><h1><font color=red>All of your personal information has been compromised.</b></font></h1></html>");
</script>

(pretty printed for easy analysis; put everything on one line to test this)

This can be used to steal a user's session cookie if you can convince him to click the link. That should be easy since thefacebook.com often sends e-mails saying "click here to join XYZ group". Just make one look convincing and you can conceivably obtain the personal information of anyone at the school that that user attends. Seems like an excellent way to harvest e-mail addresses, cell phone numbers, AIM screennames, etc.

Obviously you would need to modify the above script to do this; the code above prints the user's cookie, displays a dialog that says "Security hole.", and writes "All of your personal information has been compromised." to the screen in a scary red font.

For those just tuning in, the usual way of exploiting XSS holes is to load an image or iframe from a site you control with the output of document.cookie in the URL somewhere. Then you can extract the stolen cookies from your access log. Even more fun is load a remote perl script and send the cookie as the argument. Then your script can call curl --cookie "example=cookie" and get a privileged page. Then you can parse it and display key facts back to the user (via an iframe). For example, you could write: "Your personal information has been stolen. Your girlfriend's phone number is 123.456.7890" Perhaps this will teach users not to supply their personal information to an insecure, untrusted site that presumably profits from allowing other people to view this information!

In addition, it also seems like this hole can allow you to get a discount on their advertising rates. For example, adding the school named 'Ill.%20Chicago%20<b>' will reduce the ad rate from $12 to $10 (at the time of this writing; the web form looked like it would have let me pay $10 for an ad at "Ill. Chicago").

The latest version of this advisory is available at:
<http://www.uic.edu/~jrockw2/20050207_facebook.txt>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close