exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

20050207_facebook.txt

20050207_facebook.txt
Posted Feb 22, 2005
Authored by Jonathan Rockway

thefacebook.com is susceptible to a cross site scripting attack.

tags | advisory, xss
SHA-256 | 9a84bd32409cc970109d3557c565d339ae25182a960753cf758fbdce4603a8cb

20050207_facebook.txt

Change Mirror Download
XSS Vulnerability at thefacebook.com

Not surprisingly, ``thefacebook'' <http://www.thefacebook.com/> contains an XSS hole. Basically, the signup form for paid announcements lets you add a school to display the announcement at. The script that adds the school accepts the name of the school as the "add" argument. Any HTML can be injected here, leading to an XSS exploit. Here's a sample injection:

http://www.thefacebook.com/announce.php?step=1&add=
<script>
var c = document.cookie;
alert("Security hole. ");
document.write("Your cookie is: <b>");
document.write(c);
document.write("</b>.<br><br><h1><font color=red>All of your personal information has been compromised.</b></font></h1></html>");
</script>

(pretty printed for easy analysis; put everything on one line to test this)

This can be used to steal a user's session cookie if you can convince him to click the link. That should be easy since thefacebook.com often sends e-mails saying "click here to join XYZ group". Just make one look convincing and you can conceivably obtain the personal information of anyone at the school that that user attends. Seems like an excellent way to harvest e-mail addresses, cell phone numbers, AIM screennames, etc.

Obviously you would need to modify the above script to do this; the code above prints the user's cookie, displays a dialog that says "Security hole.", and writes "All of your personal information has been compromised." to the screen in a scary red font.

For those just tuning in, the usual way of exploiting XSS holes is to load an image or iframe from a site you control with the output of document.cookie in the URL somewhere. Then you can extract the stolen cookies from your access log. Even more fun is load a remote perl script and send the cookie as the argument. Then your script can call curl --cookie "example=cookie" and get a privileged page. Then you can parse it and display key facts back to the user (via an iframe). For example, you could write: "Your personal information has been stolen. Your girlfriend's phone number is 123.456.7890" Perhaps this will teach users not to supply their personal information to an insecure, untrusted site that presumably profits from allowing other people to view this information!

In addition, it also seems like this hole can allow you to get a discount on their advertising rates. For example, adding the school named 'Ill.%20Chicago%20<b>' will reduce the ad rate from $12 to $10 (at the time of this writing; the web form looked like it would have let me pay $10 for an ad at "Ill. Chicago").

The latest version of this advisory is available at:
<http://www.uic.edu/~jrockw2/20050207_facebook.txt>
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close