Pastebin launched a little side project called VERYVIRAL.com, check it out ;-) Want more features on Pastebin? Sign Up, it's FREE!
Guest

Facebook many vulnerabilities found by @AnonymousOwn3r

By: a guest on Oct 11th, 2012  |  syntax: None  |  size: 4.23 KB  |  views: 7,968  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. Facebook many vulnerabilities found by @AnonymousOwn3r
  2.  
  3. https://twitter.com/AnonymousOwn3r
  4.  
  5.  
  6.  
  7. http://www.facebook.com
  8.  
  9. 2720/2724 100%
  10. Cross-site Request Forgery
  11.  
  12. Cross-site Request Forgery (CSRF) is a type of attack whereby unauthorized commands are transmitted from a user that the application trusts. Unlike Cross-site Scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser.
  13.  
  14. solution: Url and Forms that perform important operations must be protected by random tokens (hidden nonce values). These tokens must be checked for validity at the server before the request is processed.
  15.  
  16. url: http://www.facebook.com/
  17.  
  18. form: <form method="POST" action="http://www.facebook.com/" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
  19.  
  20. url: http://www.facebook.com/find-friends?ref=pf
  21.  
  22. form: <form method="POST" action="https://www.facebook.com/find-friends/index.php" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
  23.  
  24. url: http://www.facebook.com/facebook
  25.  
  26. form: <form method="POST" action="http://www.facebook.com/ajax/ufi/modify.php" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
  27.  
  28. url: http://www.facebook.com/pages/create.php?ref_type=sitefooter
  29.  
  30. form: <form method="POST" action="http://www.facebook.com/ajax/pages/create/CreatePageCheck.php" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
  31.  
  32. url: http://www.facebook.com/help/adpolicy
  33.  
  34. form: <form method="POST" action="http://www.facebook.com/support/ajax/feedback.php" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
  35.  
  36. url: http://www.facebook.com/r.php?possible_fb_user=1&is_enabled=1&next=https%253A%252F%252Fwww.facebook.com%252Fphoto.php%253Fv%253D3802752155040&locale=en_US
  37.  
  38. form: <form method="POST" action="http://www.facebook.com/r.php?possible_fb_user=1&amp;is_enabled=1&amp;next=https%253A%252F%252Fwww.facebook.com%252Fphoto.php%253Fv%253D3802752155040&amp;locale=en_US" enctype="application/x-www-form-urlencoded" autoc...
  39. Autocomplete Enabled
  40.  
  41. Autocomplete should be disabled (autocomplete="off"), especially in forms which process sensitive data, such as forms with password fields, since an attacker, if able to access the browser cache, could easily obtain the cached information in cleartext.
  42.  
  43. solution: Disable the autocomplete feature (autocomplete="off") on forms which may hold sensitive data.
  44.  
  45. url: http://www.facebook.com/
  46.  
  47. form: <form method="POST" action="http://www.facebook.com/" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
  48.  
  49. url: http://www.facebook.com/r.php?possible_fb_user=1&is_enabled=1&next=https%253A%252F%252Fwww.facebook.com%252Fphoto.php%253Fv%253D3802752155040&locale=en_US
  50.  
  51. form: <form method="POST" action="http://www.facebook.com/r.php?possible_fb_user=1&amp;is_enabled=1&amp;next=https%253A%252F%252Fwww.facebook.com%252Fphoto.php%253Fv%253D3802752155040&amp;locale=en_US" enctype="application/x-www-form-urlencoded" autoc...
  52. Path Disclosure
  53.  
  54. Various system paths were disclosed within the application client source code or other files. This information could be used by attackers to make an educated guess about the application environment and any inherited weaknesses that may come with it.
  55.  
  56. solution: It is recommended to re-examine the system path disclosures and remove their reference from the application's source code.
  57.  
  58. path: e:\u003C ...
  59.  
  60. request:
  61.  
  62. GET http://www.facebook.com/jackie HTTP/1.1
  63.  
  64.  
  65. path: d:\u003C ...
  66.  
  67. request:
  68.  
  69. GET http://www.facebook.com/jackie HTTP/1.1
  70.  
  71.  
  72. IP Disclosure
  73.  
  74. The server or application disclosed internal network information. This information could be used by attackers to make an educated guess about the internal or external network topology. Leaked IP addresses could be used as a stepping-stone to more complex attacks.
  75.  
  76. solution: Ensure that sensitive information such as internal or external IP addresses is safely guarded. Unless there is a good, prevent the disclosure of network information.
  77.  
  78. ip: 10.3.181.34
  79.  
  80. request:
  81.  
  82. GET http://www.facebook.com/careers/?ref=pf HTTP/1.1
  83.  
  84.  
  85. Facebook many vulnerabilities found by @AnonymousOwn3r
  86.  
  87. https://twitter.com/AnonymousOwn3r
clone this paste RAW Paste Data