Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Facebook many vulnerabilities found by @AnonymousOwn3r
- https://twitter.com/AnonymousOwn3r
- http://www.facebook.com
- 2720/2724 100%
- Cross-site Request Forgery
- Cross-site Request Forgery (CSRF) is a type of attack whereby unauthorized commands are transmitted from a user that the application trusts. Unlike Cross-site Scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser.
- solution: Url and Forms that perform important operations must be protected by random tokens (hidden nonce values). These tokens must be checked for validity at the server before the request is processed.
- url: http://www.facebook.com/
- form: <form method="POST" action="http://www.facebook.com/" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
- url: http://www.facebook.com/find-friends?ref=pf
- form: <form method="POST" action="https://www.facebook.com/find-friends/index.php" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
- url: http://www.facebook.com/facebook
- form: <form method="POST" action="http://www.facebook.com/ajax/ufi/modify.php" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
- url: http://www.facebook.com/pages/create.php?ref_type=sitefooter
- form: <form method="POST" action="http://www.facebook.com/ajax/pages/create/CreatePageCheck.php" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
- url: http://www.facebook.com/help/adpolicy
- form: <form method="POST" action="http://www.facebook.com/support/ajax/feedback.php" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
- url: http://www.facebook.com/r.php?possible_fb_user=1&is_enabled=1&next=https%253A%252F%252Fwww.facebook.com%252Fphoto.php%253Fv%253D3802752155040&locale=en_US
- form: <form method="POST" action="http://www.facebook.com/r.php?possible_fb_user=1&is_enabled=1&next=https%253A%252F%252Fwww.facebook.com%252Fphoto.php%253Fv%253D3802752155040&locale=en_US" enctype="application/x-www-form-urlencoded" autoc...
- Autocomplete Enabled
- Autocomplete should be disabled (autocomplete="off"), especially in forms which process sensitive data, such as forms with password fields, since an attacker, if able to access the browser cache, could easily obtain the cached information in cleartext.
- solution: Disable the autocomplete feature (autocomplete="off") on forms which may hold sensitive data.
- url: http://www.facebook.com/
- form: <form method="POST" action="http://www.facebook.com/" enctype="application/x-www-form-urlencoded" autocomplete="on"> ... </form>
- url: http://www.facebook.com/r.php?possible_fb_user=1&is_enabled=1&next=https%253A%252F%252Fwww.facebook.com%252Fphoto.php%253Fv%253D3802752155040&locale=en_US
- form: <form method="POST" action="http://www.facebook.com/r.php?possible_fb_user=1&is_enabled=1&next=https%253A%252F%252Fwww.facebook.com%252Fphoto.php%253Fv%253D3802752155040&locale=en_US" enctype="application/x-www-form-urlencoded" autoc...
- Path Disclosure
- Various system paths were disclosed within the application client source code or other files. This information could be used by attackers to make an educated guess about the application environment and any inherited weaknesses that may come with it.
- solution: It is recommended to re-examine the system path disclosures and remove their reference from the application's source code.
- path: e:\u003C ...
- request:
- GET http://www.facebook.com/jackie HTTP/1.1
- path: d:\u003C ...
- request:
- GET http://www.facebook.com/jackie HTTP/1.1
- IP Disclosure
- The server or application disclosed internal network information. This information could be used by attackers to make an educated guess about the internal or external network topology. Leaked IP addresses could be used as a stepping-stone to more complex attacks.
- solution: Ensure that sensitive information such as internal or external IP addresses is safely guarded. Unless there is a good, prevent the disclosure of network information.
- ip: 10.3.181.34
- request:
- GET http://www.facebook.com/careers/?ref=pf HTTP/1.1
- Facebook many vulnerabilities found by @AnonymousOwn3r
- https://twitter.com/AnonymousOwn3r
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement