Pentester Nepal
Published in

Pentester Nepal

Facebook Email/phone disclosure using Binary search

So in December I decided to hunt on Facebook, and chose to go with the Facebook Android App

I was analyzing the Facebook app’s password recovery flow.

I noticed that the following endpoint was being used.

When a user enters his email/phone number his email is supplied in the following manner using parameter `q`

The endpoint contained manyyyyy parameters, more than it required.

So I was eager to test what those parameters did.

I quickly noticed that although the user’s email is being carried by `q` parameter, it also contains a `qs` parameter.

Now, incase you don't know;
In Facebook the character `s` behind a parameter means plural.

invite_id, Plural= invite_ids
user_id, Plural=user_ids

I knew that in plural parameters you can supply array of data

so I supplied data in following manner:


But it gave an error stating the array key are invalid.

So this wasn't a normal array, it had its own keys.

So after some fuzzing I finally figured out that the parameter `qs` takes the value in json wrapped format along with the keys “phone” and “email” and the values of email/phone are the ones that will be supplied as an array


When you supply an email in the forget password endpoint, the data belonging to you is given in the response in encrypted format.

The response will contain:
your encrypted userID ,contact points etc

Along with the data there was a value `summary` and it was set to `1`.

Initially I thought it to be a Boolean.
But turns out:

When we supply one email in `qs`
Data of one user is obtained in response.
hence: summary=1

When we supply two emails in `qs`
Data of two users is obtained in response.
Hence: summary=2

But here comes the final part:

Lets say I supply:
Data of only 1 user is obtained.

What does that mean?
Both the emails belong to the same user and both emails pointed to same user resulting in the response “summary”:1

Now, basically it was bruteforce attack scenario.

I supply victim's username along with a email and if the email belonged to victim the response is “summary:1”


//Yup, We can supply username in email parameter

BinarySearch to the rescue

Bruteforce attacks are noisyyy.
But using binary search, this attack became much easier.

Refer to this video to learn about BinarySearch:

Since, the endpoint was accepting an array of data:
I wasn’t forced to only submit
1 username+1 email

I could supply
1username+ 100s of email.



Now if any of the email from the request belonged to vicitmUserName:

//Response of email1+email2+email3

Else summary=4
//Response of vicitmUsername+email1+email2+email3

This made it easier to bruteforce and effectively identify any user’s private email.

Diagram demonstrating the binarySearch

I also received this sweeeet response from the Facebook team,
felt good ;)

Submitted : January 3
Triaged: February 13
Bounty $XXXX Awarded :March 22




Aim to feature infosec, bug bounty, privacy and security awareness articles from Nepali security researchers and bug bounty hunters.

Recommended from Medium

What do different VPN protocols mean?

Pixelated text from redacted documents can be restored with the tool called “Unredacter”

{UPDATE} 脑筋急转弯: 终极挑战700问 考验你的脑洞 Hack Free Resources Generator

Cybercriminals are shipping out ransomware-infected USB devices

MiceForce — how to mint

Crack WPA/WPA2 Wi-Fi routers

Mass mailer attack using Social Engineering Toolkit

OPeraCake Finace Tokenomics

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


I hunt for bug sometimes :)

More from Medium

AppSec Series 0x04: Crowdsourcing Security

InSecure Design Vulnerabilities: What are they and Why they Occurs

Mobile Static Analysis using Scrounger Framework

How we ran unity servers on AWS EKS. Part 2 — Implementation