New highly critical Facebook XSS vulnerabilities pose serious privacy risks
Written by DP
Monday, 15 December 2008
users are susceptible to phishing attacks and ID theft due to some new highly critical cross-site scripting vulnerabilities.
Security researchers Zeitjak
, David Wharton
, have recently discovered XSS flaws that affect several Facebook functionalities including the developers page, new users registration page, iphone login page and applications page.
Malicious people can exploit these XSS bugs to infect millions of Facebook members with malware, adware and spyware.
It is also very safe not to accept friend invitations from people you don't know. The reason is that a Facebook profile contains enough personal information which can be studied by fraudsters (your unknown friends) in order to create special phishing attacks or malware targeted to individual users or businesses. What if you click on a shared link or item? Then your privacy will belong to them!!!
So with the keywords security and privacy in mind, do use appropriately safe your social networking profile. Always question suspicious requests and notify them to the security staff.
Facebook staff usually fixes such flaws promptly.
Latest critical Facebook XSS:
XSS #1 with POST (by Zeitjak) | Mirror:
POST: reg_email__="onmouseover="alert('XSS - ZJ')"foo="bar
XSS #2 with POST (by David Wharton) | Mirror:
XSS #3 (by DaiMon) | Mirror:
This one works on another IP (220.127.116.11) and can't be used for a worm, except a phishing one.
XSS #4 with POST (by p3lo) | Mirror: