Facebook awards $10K for finding bug in its Android app : The Tribune India

Join Whatsapp Channel

Facebook awards $10K for finding bug in its Android app

A security researcher has found a vulnerability in the download feature of Facebooks Android app that could be exploited to launch remote code execution (RCE) attacks.

Facebook awards $10K for finding bug in its Android app

Facebook's Android app uses two methods of downloading files from a group -- a built-in Android service called DownloadManager and a second method called Files Tab.



New Delhi, October 6

A security researcher has found a vulnerability in the download feature of Facebooks Android app that could be exploited to launch remote code execution (RCE) attacks. The social networking giant awarded the researcher $10,000 for finding the bug.

Facebook's Android app uses two methods of downloading files from a group -- a built-in Android service called DownloadManager and a second method called Files Tab.

Security researcher Sayed Abdelhafiz discovered a path traversal flaw in the second method.

"I discovered an ACE on Facebook for Android that can be triaged through a download file from group Files Tab without opening the file," he said in a post on Medium.

The vulnerability was in the second method. While security measures were implemented on the server-side when uploading the files, it was easy to bypass those.

"The first idea that came to my mind was to use path traversal to overwrite native libraries which will lead to executing arbitrary code," Abdelhafiz said.

Abdelhafiz explained how the Files Tab flaw enabled the researcher to launch RCE attacks against a target device.

The vulnerability in the Files Tab has now been fixed.

In June this year, Ahmedabad-based security researcher Bipin Jitiya won Rs 23.8 lakh ($31,500) from Facebook for identifying a bug in its social networking platform and a third-party business intelligence portal.

Jitiya, 26, identified the web security vulnerability in internal blind Server-Side Request Forgery (SSRF) in the source code of a publicly accessible endpoint, built using tools from MicroStrategy, that performed custom data collection and content generation.

MicroStrategy has partnered with Facebook on data analytics projects for several years. Jitiya reported the bug to the MicroStrategy's security team, who acknowledged it, saying the issue has been mitigated.

In May, a 27-year-old Indian security researcher Bhavuk Jain grabbed $100,000 (over Rs 75.5 lakh) from Apple for discovering a now-patched Zero-Day vulnerability in the Sign in with Apple account authentication.

The Zero-Day vulnerability could have allowed a hacker to break into an Apple user's account who log into third-party apps like Dropbox, Spotify, Airbnb and Giphy (now acquired by Facebook) and more.

--IANS


Top News

10 dead as 2 helicopters crash during military rehearsal in Malaysia

Video: 10 dead as 2 helicopters crash during military rehearsal in Malaysia

The incident took place at the navy base in Lumut

US ready to re-start supply of military equipment to Ukraine

US ready to re-start supply of military equipment to Ukraine

The US Senate, will take up the bill this week before it is ...

Delhi CM Kejriwal given insulin in Tihar jail last night after sugar levels soar

Delhi CM Kejriwal given insulin in Tihar jail after sugar levels soar

AAP claimed Kejriwal's sugar level was continuously getting ...

North Korean leader Kim leads rocket drills that simulate a nuclear counterattack against enemies

North Korean leader Kim leads rocket drills that simulate a nuclear counterattack against enemies

Analysts say North Korea's large-sized artillery rockets blu...


Cities

View All