Facebook on Android Attachment access_token information disclosure
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 8.8 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in Facebook on Android and classified as critical. Affected by this vulnerability is an unknown functionality of the component Attachment Handler. This manipulation of the argument access_token causes information disclosure. Moreover, an exploit is present. The affected component should be upgraded.
Details
A vulnerability was found in Facebook on Android (Social Network Software). It has been declared as critical. Affected by this vulnerability is an unknown part of the component Attachment Handler. The manipulation of the argument access_token with an unknown input leads to a information disclosure vulnerability. The CWE definition for the vulnerability is CWE-200. The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was disclosed 10/28/2013 by Mohamed Ramadan as All your Facebook Access Tokens are belong to us! as not defined advisory (Website). The advisory is shared at attack-secure.com. The public release has been coordinated in cooperation with the project team. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Technical details and also a public exploit are known. MITRE ATT&CK project uses the attack technique T1592 for this issue.
It is declared as proof-of-concept.
Upgrading eliminates this vulnerability. A possible mitigation has been published 3 days after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at SecurityFocus (BID 63458†) and OSVDB (99266†). If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Affected
- Facebook Messenger
Product
Type
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 8.8
VulDB Base Score: 9.8
VulDB Temp Score: 8.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Information disclosureCWE: CWE-200 / CWE-284 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Timeline
10/28/2013 🔍10/29/2013 🔍
10/31/2013 🔍
11/05/2013 🔍
03/25/2019 🔍
Sources
Advisory: All your Facebook Access Tokens are belong to us!Researcher: Mohamed Ramadan
Status: Not defined
Coordinated: 🔍
GCVE (VulDB): GCVE-100-11077
SecurityFocus: 63458 - Facebook Application And Facebook Pages Manager For Android Information Disclosure Vulnerability
OSVDB: 99266
scip Labs: https://www.scip.ch/en/?labs.20130704
Entry
Created: 11/05/2013 09:36Updated: 03/25/2019 10:20
Changes: 11/05/2013 09:36 (48), 03/25/2019 10:20 (6)
Complete: 🔍
Committer: olku
Cache ID: 216:7F6:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.