Facebook awards $10K for finding bug in its Android app : The Tribune India

Join Whatsapp Channel

Facebook awards $10K for finding bug in its Android app

A security researcher has found a vulnerability in the download feature of Facebooks Android app that could be exploited to launch remote code execution (RCE) attacks.

Facebook awards $10K for finding bug in its Android app

Facebook's Android app uses two methods of downloading files from a group -- a built-in Android service called DownloadManager and a second method called Files Tab.



New Delhi, October 6

A security researcher has found a vulnerability in the download feature of Facebooks Android app that could be exploited to launch remote code execution (RCE) attacks. The social networking giant awarded the researcher $10,000 for finding the bug.

Facebook's Android app uses two methods of downloading files from a group -- a built-in Android service called DownloadManager and a second method called Files Tab.

Security researcher Sayed Abdelhafiz discovered a path traversal flaw in the second method.

"I discovered an ACE on Facebook for Android that can be triaged through a download file from group Files Tab without opening the file," he said in a post on Medium.

The vulnerability was in the second method. While security measures were implemented on the server-side when uploading the files, it was easy to bypass those.

"The first idea that came to my mind was to use path traversal to overwrite native libraries which will lead to executing arbitrary code," Abdelhafiz said.

Abdelhafiz explained how the Files Tab flaw enabled the researcher to launch RCE attacks against a target device.

The vulnerability in the Files Tab has now been fixed.

In June this year, Ahmedabad-based security researcher Bipin Jitiya won Rs 23.8 lakh ($31,500) from Facebook for identifying a bug in its social networking platform and a third-party business intelligence portal.

Jitiya, 26, identified the web security vulnerability in internal blind Server-Side Request Forgery (SSRF) in the source code of a publicly accessible endpoint, built using tools from MicroStrategy, that performed custom data collection and content generation.

MicroStrategy has partnered with Facebook on data analytics projects for several years. Jitiya reported the bug to the MicroStrategy's security team, who acknowledged it, saying the issue has been mitigated.

In May, a 27-year-old Indian security researcher Bhavuk Jain grabbed $100,000 (over Rs 75.5 lakh) from Apple for discovering a now-patched Zero-Day vulnerability in the Sign in with Apple account authentication.

The Zero-Day vulnerability could have allowed a hacker to break into an Apple user's account who log into third-party apps like Dropbox, Spotify, Airbnb and Giphy (now acquired by Facebook) and more.

--IANS


Top News

Will stop functioning in India if made to break encryption of messages: WhatsApp to Delhi High Court

Will stop functioning in India if made to break encryption of messages: WhatsApp to Delhi High Court

Facebook and Whatsapp have recently challenged the new rules...

Supreme Court to deliver verdict on PILs seeking 100 per cent cross-verification of EVM votes with VVPAT today

Supreme Court dismisses PILs seeking 100% cross-verification of EVM votes with VVPAT slips

Bench however, issues certain directions to Election Commiss...

Indian-origin student arrested in US for joining in anti-Israel protests

Indian-origin student arrested in US for joining in anti-Israel protests

Achinthya Sivalingan, born in Coimbatore and raised in Colum...

Firing resumes in Jammu and Kashmir’s Baramulla; operation to hunt down terrorists enters 2nd day

2 terrorists dead, 2 Army personnel injured as gunfight resumes in Jammu and Kashmir’s Baramulla

Fresh exchange of firing takes place at Check Mohalla Nowpor...


Cities

View All