{"id":190722,"date":"2017-05-02T23:04:42","date_gmt":"2017-05-03T03:04:42","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/flickr-account-hijack-flaw-earns-researcher-7k-zdnet\/"},"modified":"2017-05-02T23:04:42","modified_gmt":"2017-05-03T03:04:42","slug":"flickr-account-hijack-flaw-earns-researcher-7k-zdnet","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/mind-uploading\/flickr-account-hijack-flaw-earns-researcher-7k-zdnet\/","title":{"rendered":"Flickr account hijack flaw earns researcher $7k &#8211; ZDNet"},"content":{"rendered":"<p><p>CNET  <\/p>\n<p>    Yahoo has awarded a researcher $7,000 for disclosing a Flickr    security flaw which enabled attackers to hijack user accounts    without limit.  <\/p>\n<p>    The issue, patched on April 10, permitted attackers to    intercept and grab access tokens by circumventing Flickr    protections.  <\/p>\n<p>    According to security researcher Michael Reizelman who     privately disclosed the bug to Yahoo-owned photo and    video-sharing website Flickr before making the details public,    the problem was caused by the way Flickr handled access tokens.  <\/p>\n<p>    When a user wants to login to Flickr.com, they click a sign-in    button which redirects them to a Yahoo account login page.    After being prompted to enter their credentials and completing    the form to login, the user is directed first to a Yahoo    endpoint where the credentials are verified. If valid, they are    then redirected back to a Flickr URL.  <\/p>\n<p>    However, if the user is already logged into Yahoo and clicks    the initial sign-in Flickr link, then only one click is needed    for verification. With this in mind, Reizelman investigated and    found that the .done parameter, which controls where login    tokens are sent, can be manipulated.  <\/p>\n<p>    While Flickr already has some endpoint protections in place to    prevent tokens from being leaked to external servers, tweaking    an URL and adding a backslash bypasses these protections    through the Flickr forum.  <\/p>\n<p>    The researcher then discovered a way to leak user account    tokens to his own server by posting crafted images which forced    the Flickr service to relinquish the tokens on forum pages    which did not have Content Security Policy protections in    place.  <\/p>\n<p>    See also: IBM admits it sent malware-infected USB sticks    to customers (TechRepublic)  <\/p>\n<p>    Should a user click on a malicious link posted within the    forum, the redirection code would then send the authentication    token to an attacker's server and allow the threat actor to    browse the site using the victim's account.  <\/p>\n<p>    \"An attacker had a complete access to the victim's account,\"    Reizelman     told ThreatPost. \"He actually was logged in to the site    with the victim's account, so he could do any action on the    victim's behalf: uploading content, deleting it, or any other    thing he wants.\"  <\/p>\n<p>    Once disclosed through Yahoo's bug bounty program hosted on    HackerOne's platform on April 2, the issue was investigated    within 24 hours. It took the Flickr team a further week to    resolve the issue and prepare for public disclosure. The    researcher was then awarded his bounty.  <\/p>\n<p>    Bug bounties are becoming a popular way to entice skilled    security researchers to ferret out security flaws in products    and services before attackers do. Last week, the US Air Force    invited hackers to do their worst and find security    vulnerabilities in the military's websites.  <\/p>\n<p>    NSA halts domestic digital surveillance program over    privacy issues:  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.zdnet.com\/article\/yahoo-flickr-account-hijack-flaw-earns-researcher-7k\/\" title=\"Flickr account hijack flaw earns researcher $7k - ZDNet\">Flickr account hijack flaw earns researcher $7k - ZDNet<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> CNET Yahoo has awarded a researcher $7,000 for disclosing a Flickr security flaw which enabled attackers to hijack user accounts without limit. The issue, patched on April 10, permitted attackers to intercept and grab access tokens by circumventing Flickr protections.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/mind-uploading\/flickr-account-hijack-flaw-earns-researcher-7k-zdnet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187745],"tags":[],"class_list":["post-190722","post","type-post","status-publish","format-standard","hentry","category-mind-uploading"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/190722"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=190722"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/190722\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=190722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=190722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=190722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}