TechCrunch News 01月10日
Facebook awards researcher $100,000 for finding bug that granted internal access
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

安全研究员Ben Sadeghipour在2024年10月发现Facebook广告平台存在安全漏洞,该漏洞允许他在内部服务器上执行命令,从而控制服务器。Meta公司在收到报告后一小时内修复了该漏洞,并向Sadeghipour支付了10万美元的漏洞赏金。该漏洞源于Facebook广告系统使用的一个服务器存在Chrome浏览器中已修复的漏洞。Sadeghipour利用无头Chrome浏览器劫持了该服务器,并与Facebook内部服务器直接交互。他指出,在线广告平台因其后台数据处理而成为攻击目标,该漏洞可能允许攻击者访问内部基础设施中的其他站点和服务器。Meta公司已收到置评请求,但未在截稿前发表评论。

👨‍💻 安全研究员Ben Sadeghipour发现Facebook广告平台存在安全漏洞,该漏洞允许他控制内部服务器,并在服务器上执行命令。

🐛 该漏洞源于Facebook广告系统使用的服务器存在Chrome浏览器中已修复的漏洞,Sadeghipour利用无头Chrome浏览器成功劫持了该服务器。

💰 Meta公司在收到报告后一小时内修复了该漏洞,并向Sadeghipour支付了10万美元的漏洞赏金。

🎯 在线广告平台因其后台数据处理而成为攻击目标,该漏洞可能允许攻击者访问内部基础设施中的其他站点和服务器。

In October 2024, security researcher Ben Sadeghipour was analyzing Facebook’s ad platform when he found a security vulnerability that allowed him to run commands on the internal Facebook server housing that platform, essentially giving him control of the server.  

After he reported the vulnerability to Facebook’s owner Meta, which Sadeghipour said took just one hour to fix it, the social networking giant awarded him $100,000 in a bug bounty payout. 

“My assumption is that it’s something you may want to fix because it is directly inside of your infrastructure,” Sadeghipour wrote in the report he sent to Meta, he told TechCrunch. Meta responded to his report, telling Sadeghipour to “refrain from testing any further” while they fix the vulnerability.

The issue, according to Sadeghipour, was that one of the servers that Facebook used for creating and delivering ads was vulnerable to a previously fixed flaw found in the Chrome browser, which Facebook uses in its ads system. Sadeghipour said this unpatched bug allowed him to hijack it using a headless Chrome browser (essentially a version of the browser that users run from the computer’s terminal) to interact directly with Facebook’s internal servers. 

Sadeghipour, who found the Facebook vulnerability working with independent researcher Alex Chapman, told TechCrunch that online advertising platforms make for juicy targets because, “there’s so much that happens in the background of making these ‘ads’ — whether they are video, text or images.” 

“But at the core of it all it’s a bunch of data being processed on the server-side and it opens up the door for a ton of vulnerabilities,” said Sadeghipour.

The researcher said he didn’t test out everything he could have done once inside the Facebook server, but “what makes this dangerous is this was probably a part of an internal infrastructure.” 

“Since we have code execution, we could’ve interacted with any of the sites within that infrastructure,” said Sadeghipour. “With an [remote code execution vulnerability], you can bypass some of these limitations and also directly pull stuff from the server itself and the other machines that it has access to.”

Meta spokesperson Nicole Catalano acknowledged receipt of TechCrunch’s request for comment, but did not comment by press time.

Sadeghipour also said that similar ad platforms that other companies run, and which he has been analyzing, are vulnerable to similar vulnerabilities.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

安全漏洞 Facebook Meta 广告平台 Chrome
相关文章