We’ve been in this pandemic since March and once the pandemic started I was having plenty of free time, And I need to use that time wisely, So I’ve decided to take the OSWE certification and I finished the exam on 8 of August, after that, I took a couple of weeks to recover from the OSWE exam, then in the med of September, I said you know what? I did not register my name in the Facebook hall of fame for 2020 as I do every year. okay, let’s do it.
I never found a vulnerability on one of Facebook subdomains, and I took a look at some writeups and I saw one writeup in one of Facebook subdomains which got all my attention It was a great write up you can check it out [HTML to PDF converter bug leads to RCE in Facebook server.]
So after reading this write-up now I took a good idea about how many vulnerabilities I could find in such a huge web app.
So my main target was https://legal.tapprd.thefacebook.com and my goal was RCE or something similar.
I ran some fuzzing tools just to get the full endpoints of this web app and I took a 2 hours nap and watched a movie, Then I got back to see the results okay I got some good results.
Dirs found with a 403 response:
Dirs found with a 403 response:/tapprd/
I noticed a way to bypass the redirection into the Login SSO, https://legal.tapprd.thefacebook.com/tapprd/portal/authentication/login and after analyzing the login page, I noticed this endpoint
I said okay, this might be because the email is wrong or something? let’s get an admin email, Then I started to put random emails in a list to make a wordlist and after that, I used the intruder and I said let’s see what will happen.
I got back after a couple of hours I found the same error results plus one other result, This one was 302 redirect to the login page, I said wow, I’ll be damned if this worked Haha.
So let’s get back to see what I’ve done here, I sent random requests using intruder with a CSRF token and random emails with a new password to this endpoint /savepassword
and one of the results was 302 redirect.
Now I went to the login page and I put the login email and the new password and BOOM I logged in Successfully into the application and I can enter the admin panel :)
I read the hacker report who found RCE before using the PDF and they gave him a reward of 1000$ only so I said okay, let’s make a good Impact here and a perfect exploit.
I wrote a quick and simple script to exploit this vulnerability with python you put the email and the new password and the script will change the password.
The Impact here was so high because the Facebook workers used to login with their workplace accounts, Which mean they’re using their Facebook accounts access token, and maybe if another attacker wanted to exploit this it might give him the ability to gain access to some Facebook workers accounts .. etc
Then I reported the vulnerability and the report triaged.
And on 2 of October, I received a bounty of 7500$
I enjoyed exploiting this vulnerability so much, so I said that’s not enough, this is a weak script! let’s dig more and more.
And I found two more vulnerabilities on the same application, But we will talk about the other vulnerabilities in the Part two writeup :)
You can read the write-up on my website : https://alaa.blog/2020/12/how-i-hacked-facebook-part-one/
And you can follow me on twitter : https://twitter.com/alaa0x2