A security researcher has [disclosed]() how he chained together multiple bugs in order to take over Facebook accounts that were linked to a Gmail account.
Youssef Sammouda states it was possible to target **all** Facebook users but that it was more complicated to develop an exploit, and using Gmail was actually enough to demonstrate the impact of his discoveries.
## Linked accounts
Linked accounts were invented to make logging in easier. You can use one account to log in to other apps, sites and services. The most commonly used is the link between Facebook and Instagram, so we will use that as an example. Log in to one account and you are also practically logged in at the other. All you need to do to access the account is confirm that the account is yours.
Since [2009, Facebook has supported myOpenID](), which allows users to login to Facebook with their Gmail credentials. To put it in a simpler way, this means that if you are currently logged in to your Gmail account, the moment you visit Facebook, you will be automatically logged in.
## Sandboxed CAPTCHA
The first discovery that enabled this takeover method lies in the fact that Facebook uses an extra security mechanism called “Checkpoint” to make sure that any user that logs in is who they claim to be. In some cases Checkpoint present those users with a [CAPTCHA]() challenge to limit the number of tries.
Facebook uses Google CAPTCHA and as an extra security feature the CAPTCHA is put in an iFrame. The iFrame is hosted on a sandboxed domain (fbsbx.com) to avoid adding third-party code from Google into the main domain (facebook.com). An iFrame is a piece of HTML code that allows developers to embed another HTML page on their website.
Now, for some reason, probably for logging purposes, the URL for the iFrame includes the link to the checkpoint as a parameter.
For example, let’s say the current URL is _https://www.facebook.com/checkpoint/CHECKPOINT_ID/?test=test_. In that case the iframe page would be accessible through this URL: _https://www.fbsbx.com/captcha/recaptcha/iframe/?referer=https%3A%2F%2Fwww.facebook.com%2Fcheckpoint%2FCHECKPOINT_ID%2F%3Ftest%3Dtest_
The attacker can replace the _referrer_ part in the URL by changing it into a _next_ parameter. This allows the attacker to send the URL including the login parameters to the sandbox domain. Now it is time to find a way to grab it from there, which is where cross-side-scripting (XSS) comes in.
## XSS
XSS is a type of security vulnerability, and can be found in some web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. Attackers can use a cross-site scripting vulnerability to bypass access controls such as the same-origin policy.
The same-origin policy (SOP) is where a web browser permits scripts contained in a first web page to access data in a second web page, but only if both web pages have the same origin. This policy prevents a malicious script on one page from obtaining access to sensitive data on another web page.
In this case that step was easy, since Facebook allows developers to test certain features and makes it possible for them to upload custom HTML files. The creator can upload these HTML files to the fbsbx.com domain. Which, as we saw earlier, is also in use for the Google CAPTCHA. Which allows the attacker to bypass the same origin policy since the target site and the custom script are on the same domain.
## CSRF
CSRF is short for cross-site request forgery. In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end user’s account.
In his attack script, Youssef used undisclosed CRSF attacks to log the target user out and later log them back in through the Checkpoint.
## OAuth
OAuth is a standard authorization protocol. It allows us to get access to protected data from an application. An OAuth Access Token is a string that the OAuth client uses to make requests to the resource server.
In this case, attackers can log out the current user and then log them back in to the attacker account which is in the Checkpoint state. But how does that allow the attacker to take over the Facebook account? By intercepting an OAuth Access Token string.
This is done by targeting a third-party OAuth provider that Facebook uses. One of these providers is Gmail. Gmail sends back the OAuth Access token to www.facebook.com for the logged in user. And since the attacker can steal the URL including the login parameters by sending them to the sandbox domain, they can intercept the OAuth Access Token string and the id_token of the user.
## Takeover
Summarized, the attacker can upload a script to the Facebook sandbox and try to trick his target(s) into visiting that page by sending them the URL.
Simplified, the script will:
1. Log out the user from his current session (CSRF)
2. Send them to the Checkpoint to log back in (CSRF)
3. Open a constructed accounts.google.com URL that redirects the target to Facebook.
Once the target has visited the page with the script outlined above, the attacker can start harvesting the strings they need to take over the Facebook account.
1. The attacker waits for the victim to log in and can later extract the Google OAuth Access Token string and id_token
2. Using the email address included in the id_token they can start a password recovery process
3. Now the attacker can construct a URL to access the target account with all the data they have gathered
## How to unlink accounts
Some sites will offer to log you in using your Facebook credentials. The same reasoning that is true for using the same password for every site is true for using your Facebook credentials to login at other sites. We wouldn’t recommend it because if anyone gets hold of the one password that controls them all, youre in even bigger trouble than you would be if only one site’s password is compromised.
You can check which accounts are linked to your Facebook account by opening the Facebook settings menu. Scroll down and open Settings & Privacy, then open Settings. At the bottom on the left, use the Accounts Center button. Tap Accounts & Profiles. There you can see a list ofthe accounts linked to your Facebook account. You can remove any unwanted linked accounts there.
## Facebook fix
Youssef says he reported the issue to Facebook in February. It was fixed in March and a $44,625 bounty was awarded earlier this month.
We [interviewed]() this Youssef last year. He told us he’s submitted at least a hundred reports to Facebook which have been resolved, making Facebook a safer platform along the way.
The post [Gmail-linked Facebook accounts vulnerable to attack using a chain of bugsnow fixed]() appeared first on [Malwarebytes Labs]().Read More
References
Back to Main