Previously Patched Facebook Remote Code Execution Bug Deemed Exploitable
CYBER NEWS

Previously Patched Facebook Remote Code Execution Bug Deemed Exploitable

1 Star2 Stars3 Stars4 Stars5 Stars (No Ratings Yet)
Loading...

A security researcher, Andrew Leonov, has been awarded $40,000 on behalf of Facebook for breaching the social network and fixing a remote code execution vulnerability. The researcher succeeded in cracking Facebook by using an ImageMagick flaw.

Related: Facebook Bug Reveals Primary Email Address of Any User

The ImageMagick Flaw Was Previously Fixed but Deemed Exploitable Once Again

This flaw was already discovered and fixed in 2016, but it needed to be addressed once again. The case goes that the vulnerability was still impacting the website. What Leonov did was establish a way to use it in October in a remote code execution scenario.

Leonov has shared his discovery in a blog post, saying that:

Once upon a time on Saturday in October i was testing some big service (not Facebook) when some redirect followed me on Facebook. It was a «Share on Facebook» dialog.

As visible in the quote above, the researcher stumbled upon the vulnerability by accident and decided to explore it in depth. He also shared he was glad to be the person who exploited it as he didn’t do it for black hat reasons. Nonetheless, he got awarded a bounty in the amount of $40,000, or at least that is what he claims. It appears that this is the biggest bug bounty every awarded. According to The Register, the previous biggest bounty was $33,500 paid to Reginaldo Silva for discovering another remote code execution flaw in Facebook.


More about Remote Code Execution

Shortly said, the ability to trigger arbitrary code execution from one computer on another (mostly via the Internet) is widely known as remote code execution. What enable attackers to execute malicious code and gain control over the compromised system is vulnerabilities such as the ImageMagick flaw in Facebook. Once a system is under the attackers’ control, they can elevate their privileges. That being said, the best way to prevent remote code execution attacks is by never allowing vulnerabilities to be exploited. Unfortunately, remote code execution flaws are very often favored by attackers, and that is what makes keeping your operating system up-to-date crucial.


Is the a malicious impact of the vulnerability? Luckily, no, as the Facebook ImageMagick flaw was privately reported and no user data has been compromised.

Related: $4.3 Million Paid Out by Facebook’s Bug Bounty Program

Facebook spends millions on bug bounties, as we have previously written. In 2015 alone the social network spent a total of $936,000. The sum was shared out to 210 researchers in exchange for reporting 526 bugs. The average size of a bug bounty was $1,780. Indian researchers were on the top of the ‘bug bounty chain’ in 2014 and 2015.

Avatar

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum for 4 years. Enjoys ‘Mr. Robot’ and fears ‘1984’. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles!

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...