Hacking Facebook By Stealing Facebook Access_tokens In Device Login
Short Bytes: A security researcher has located a flaw in Facebook’s device login feature that allows one to easily authorise apps on IoT devices. Due to the lack of CSRF protection, an attacker can fool Facebook’s systems and grab the access_token of the victim. Facebook has now fixed the bug and awarded $5,000 bounty to the white hat hacker.
While using this feature, your IoT device shows a password that you need to enter on a web page that you open on your PC or smartphone. This could be used to grant permission to new apps and services.
Josip Franjkovic, a renowned Facebook white hat hacker who is one of the Facebook’s top 10 bug reporters since 2013, has found a vulnerability in Facebook’s device login feature.
Hacking Facebook by exploiting device login flow:
To get permission, the new application requests Facebook Graph API to retrieve a hash code and user_code. Then the app tells the user to go to facebook.com/device and enter the user_code provided by Graph API.
The next step involves verification of the application via OAuth flow. Here, the user_code entered by the user is connected to the app code.
Here’s how it looks like:
Now the application can request the Graph API to get the user access_token.
Franjkovic found a flaw in the step where user_code is connected to the application_code. This step is performed without any CSRF protection.
So, to exploit this vulnerability, Franjkovic built his own proof of concept. In his exploit, an attacker requests the user_code as told in the first step and presents a page to the victim using the same. It’s possible due to the lack of any CSRF protection.
Let’s suppose an attacker is able to get a user_code abcd and hash code 1234, he/she can easily fork a page with URL:
Similarly, the next step involves a successful redirection to something like this:
Now the attacker can get the access_token of the user by requesting:
To carry out this exploit, an attacker needs to know that a user has approved some app for Login for Devices. Every device that has Login for Devices enabled and Web OAuth Login disabled, automatically gets m.facebook.com/device.php as a valid redirect.
With further tweaks, a pre-approved application can be exploited to hack a Facebook account.
Franjkovic reported this vulnerability and Facebook has now fixed this bug, awarding him a bug bounty of $5,000.
After the fix, Facebook shows a re-confirmation pop-up each time you use device login. Facebook has further added the missing CSRF protection.
Did you find this article helpful? Don’t forget to drop your feedback in the comments section below.
Also Read: Uber Promo Code Hack Shows How To Get Unlimited Free Uber Rides