mailing list archives
A damn aweful facebook DOS
From: "Chris C. Russo" <chris () calciumsec com>
Date: Thu, 08 Nov 2012 04:28:33 -0300
Good news everyone!
The last time I reported a security flaw to facebook, it took around 6
weeks until they replied,
telling me that there was no flaw at all. Perhaps that's why I decided
to make public any flaw on facebook from now on.
A few many years have passed since it was possible to disconnect a user
from MSN by sending a huge amount of big packets,
a quite classic Denial Of Service. It seems like not so many things have
changed from then.
Here's what I've found:
The chat module, which at this moment I can't use since it looks like I
have been blocked after testing it using burp suit,
doesn't have any kind of limit in the amount of characters that can be sent.
It has been possible to disconnect 3 different testing users (3 out of
3) by sending big enough messages,
one of them reported that his tablet restarted after the reception, and
it wasn't longer possible to open the FB app anymore,
since the chat log would remain there and it would make the app crash again.
The issue is exactly on www.facebook.com/ajax/mercury/send_messages.php
specifically in the parameter message_batch[body].
During the test, I've seen several packets causing an internal server
error (500 as response code),
while our collaborators where disconnected.
In order to prevent this, the length of that parameter should be analyzed
*before* sending the information to the addressee user by the
Personally I believe that there must be something wrong with XSRF
tokens as well, because it would allow me to send several packets using
the same token that I initially extracted,
however I couldn't this information due the ban prevention mechanism.
Here you have the technical details:
By sending the following packet it's possible to cause a DOS condition
to a remote user that doesn't even need to have the attacker in the
contact list or as "friend",
since it's possible to send messages to almost every user.
&message_batch[body]=%3C<EXTREMLY LONG MESSAGE HERE>%3E
(Properly replace the <EXTREMLY LONG MESSAGE HERE> before testing)
This might not be the best vulnerability description ever,
but I hope it helps solving the condition as soon as possible. Have fun.
PS: There's much more.
Success, *forward, quick.* Chris C. Russo
Más de 100,000 Km recorridos, conservo direcciones, presiono con
ambición, avanzo con delicadeza, flexibilizo para alcanzar, creo
escenarios, cambio realidades.
e: chris () calciumsec com
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- A damn aweful facebook DOS Chris C. Russo (Nov 09)