Simple Bug allows Hackers to Read all your Private Facebook Messenger Chats

A security researcher has discovered a critical vulnerability in Messenger that could allow an attacker to read all your private conversation, affecting the privacy of around 1 Billion Messenger users.
Ysrael Gurt, the security researcher at BugSec and Cynet, reported a cross-origin bypass-attack against Messenger which allows an attacker to access your private messages, photos as well as attachments sent on the chat.
To exploit this vulnerability, all an attacker need is to trick a victim into visiting a malicious website; that’s all.Once clicked, all private conversations by the victim, whether from a mobile app or a web browser, would be accessible to the attacker, because the flaw affected both the web chat as well as the mobile application.
Dubbed “Originull,” the vulnerability actually lies in the fact that Facebook chats are managed from a server located at {number}-edge-chat.facebook.com, which is separate from Facebook’s actual domain (www.facebook.com).
“Communication between the JavaScript and the server is done by XML HTTP Request (XHR). In order to access the data that arrives from 5-edge-chat.facebook.com in JavaScript, Facebook must add the “Access-Control-Allow-Origin” header with the caller’s origin, and the “Access-Control-Allow-Credentials” header with “true” value, so that the data is accessible even when the cookies are sent,” Gurt explained.
The root of this issue was misconfigured cross-origin header implementation on Facebook’s chat server domain, which allowed an attacker to bypass origin checks and access Facebook messages from an external website.
Gurt has also released a proof-of-concept video demonstration of the Originull vulnerability, which shows the cross-origin bypass-attack in action.
“This security flaw meant that the messages of 1-billion active monthly Messenger users were vulnerable to attackers,” said Stas Volfus, Chief Technology Officer of BugSec.
“This was an extremely serious issue, not only due to the high number of affected users, but also because even if the victim sent their messages using another computer or mobile, they were still completely vulnerable.”
The researcher disclosed the severe vulnerability through its Bug Bounty program. The Facebook security team acknowledged the issue and patched the vulnerable component.
You can read the full details of the flaw on Cynet’s blog post published on Tuesday.
Referenced and Published By The Hackers News (THN)
