Breaking News

ASUS Announces Late-August Availability of ProArt Display 6K PA32QCV ASRock Announces Exciting New AMD X870E motherboards ASUSTOR 30 TB Ironwolf Pro Now Officially Supported ASUS Announces ExpertCenter P500 SFF Lexar Launches the NM990 PCIe 5.0 SSD

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Facebook Apps Leaking Access to Advertisers

Facebook Apps Leaking Access to Advertisers

Enterprise & IT May 11,2011 0

Facebook users' personal information could have been accidentally leaked to advertisers over the past few years, according to Symantec. Third parties, in particular advertisers, have accidentally had access to Facebook users' accounts including profiles, photographs, chat, and also had the ability to post messages and mine personal information, Symantec said in its blog.

"Fortunately, these third-parties may not have realized their ability to access this information," the security firm added. Symantec has reported this issue to Facebook, who has taken corrective action to help eliminate this issue.

Facebook applications are Web applications that are integrated onto the Facebook platform. According to Facebook, 20 million Facebook applications are installed every day.

Symantec has discovered that in certain cases, Facebook IFRAME applications inadvertently leaked access tokens to third parties like advertisers or analytic platforms. The company estimates that as of April 2011, close to 100,000 applications were enabling this leakage.

"We estimate that over the years, hundreds of thousands of applications may have inadvertently leaked millions of access tokens to third parties," Symantec said.

Access tokens are like 'spare keys' granted by users to the Facebook application. Applications can use these tokens or keys to perform certain actions on behalf of the user or to access the user?s profile. Each token or 'spare key' is associated with a select set of permissions, like reading a users' wall, accessing his or her friend?s profile, posting to a wall, etc.

"During the application installation process, the application requests the user to grant permissions to these actions. Upon granting these permissions, the application gets an access token. Using this access token, the application can now access the user's information or perform actions on behalf of the user," Symantec explained.

By default, most access tokens expire after a short time, however the application can request offline access tokens which allow them to use these tokens until users change their passwords, even when they aren't logged in.

By default, Facebook now uses OAUTH2.0 for authentication. However, older authentication schemes are still supported and used by hundreds of thousands of applications. When a user visits apps.Facebook.com/appname, Facebook first sends the application a limited amount of non-identifiable information about the user, such as their country, locale and age bracket. Using this information, the application can personalize the page.

The application then needs to redirect the user to a permission dialog page. The application uses a client-side redirect for redirecting the user to the familiar application permission dialog box. This indirect leak could happen if the application uses a legacy Facebook API and has the following deprecated parameters, "return_session=1" and "session_version=3", as part of their redirect code. If these parameters are used, Facebook subsequently returns the access token by sending an HTTP request containing the access tokens in the URL to the application host.

The Facebook application is now in a position to inadvertently leak the access tokens to third parties potentially on purpose and unfortunately very commonly by accident. In particular, this URL, including the access token, is passed to third-party advertisers as part of the referrer field of the HTTP requests.

"Needless to say, the repercussions of this access token leakage are seen far and wide. Facebook was notified of this issue and has confirmed this leakage. Facebook notified us of changes on their end to prevent these tokens from getting leaked," Symantec said.

Symantec suggests concerned Facebook users to change their Facebook passwords to invalidate leaked access tokens.

Facebook has recently announced an update to their Developer RoadMap. The details of this update can be found here: https://developers.facebook.com/blog/post/497

Facebook has more than 500 million users and is challenging Google and Yahoo for users' time online and for advertising dollars.

Tags: facebook
Previous Post
Pioneer To Use Live Camera Footage In Car Navigation Systems
Next Post
Samsung Tape Outs 32nm And 28nm Chips

Related Posts

  • EU Privacy Watchdog Accused of Delaying Probe Procedures Against Facebook

  • Zuckerberg Says Remote Work is Here to Stay

  • Facebook to Launch New Shopping Feature Across Apps

  • EU Tech Chief Demands More From Facebook Regarding Business Practices

  • Facebook Buys GIPHY as Part of Instagram Team

  • Facebook Works With Telecoms on 2Africa Subsea Cable for Future Internet Connectivity

  • Facebook Reports Increased Number of Removals of Hate speech, Terrorism

  • Facebook Users Accept $550 Million Privacy Deal Over Facebook's “Tag Suggestions”

Latest News

ASUS Announces Late-August Availability of ProArt Display 6K PA32QCV
Enterprise & IT

ASUS Announces Late-August Availability of ProArt Display 6K PA32QCV

ASRock Announces Exciting New AMD X870E motherboards
PC components

ASRock Announces Exciting New AMD X870E motherboards

ASUSTOR 30 TB Ironwolf Pro Now Officially Supported
Enterprise & IT

ASUSTOR 30 TB Ironwolf Pro Now Officially Supported

ASUS Announces ExpertCenter P500 SFF
Enterprise & IT

ASUS Announces ExpertCenter P500 SFF

Lexar Launches the NM990 PCIe 5.0 SSD
PC components

Lexar Launches the NM990 PCIe 5.0 SSD

Popular Reviews

be quiet! Light Loop 360mm

be quiet! Light Loop 360mm

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Noctua NH-D15 G2

Noctua NH-D15 G2

Soundpeats Pop Clip

Soundpeats Pop Clip

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

Crucial T705 2TB NVME White

Crucial T705 2TB NVME White

be quiet! Pure Base 501

be quiet! Pure Base 501

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed