[OAUTH-WG] fyi: Access Token Leak

=JeffH <Jeff.Hodges@KingsMountain.com> Tue, 19 July 2011 18:43 UTC

Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: oauth@ietfa.amsl.com
Delivered-To: oauth@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4241F11E807A for <oauth@ietfa.amsl.com>; Tue, 19 Jul 2011 11:43:01 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.141
X-Spam-Level:
X-Spam-Status: No, score=-102.141 tagged_above=-999 required=5 tests=[AWL=-0.191, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, SARE_MILLIONSOF=0.315, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ub8bgyeHPYfx for <oauth@ietfa.amsl.com>; Tue, 19 Jul 2011 11:42:56 -0700 (PDT)
Received: from oproxy4-pub.bluehost.com (oproxy4-pub.bluehost.com [69.89.21.11]) by ietfa.amsl.com (Postfix) with SMTP id D3D7811E8070 for <oauth@ietf.org>; Tue, 19 Jul 2011 11:42:56 -0700 (PDT)
Received: (qmail 5068 invoked by uid 0); 19 Jul 2011 18:42:56 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by cpoproxy1.bluehost.com with SMTP; 19 Jul 2011 18:42:55 -0000
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=kingsmountain.com; h=Received:Message-ID:Date:From:User-Agent:MIME-Version:To:Subject:Content-Type:Content-Transfer-Encoding:X-Identified-User; b=Cp7P5idxC+8R09JmHQ1dCe/AIo34a0SZr+AnM6G0tcEmXsTEIS1KfDGYyR/7/GuxrSJu3Fyoj1OiL2lPOobR98FfdoevSC2dcW6DxwuNHFHifTjLfwEwF52pimokwmBE;
Received: from outbound4.ebay.com ([216.113.168.128] helo=[10.244.137.251]) by box514.bluehost.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1QjFFu-0006ce-TO for oauth@ietf.org; Tue, 19 Jul 2011 12:42:54 -0600
Message-ID: <4E25D02D.1060400@KingsMountain.com>
Date: Tue, 19 Jul 2011 11:42:53 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.18) Gecko/20110617 Thunderbird/3.1.11
MIME-Version: 1.0
To: IETF oauth WG <oauth@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Subject: [OAUTH-WG] fyi: Access Token Leak
X-BeenThere: oauth@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: OAUTH WG <oauth.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/oauth>, <mailto:oauth-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/oauth>
List-Post: <mailto:oauth@ietf.org>
List-Help: <mailto:oauth-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/oauth>, <mailto:oauth-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Jul 2011 18:43:01 -0000

Of possible interest...

Facebook Patches Access Token Leak
Users should change their passwords to mitigate threats posed by the accidental 
leak of perhaps millions of account identity details.
http://www.informationweek.com/news/security/client/229500030

By Mathew J. Schwartz InformationWeek
May 11, 2011 01:05 PM


Have Facebook advertisers and analytics firms been reviewing your private 
profile? On Tuesday, security researchers warned that, due to how the site 
handles access tokens, enterprising third parties would have been able to 
access users' private data and perform any actions with a user's identity, 
beginning in 2007.

"Third parties, in particular advertisers, have accidentally had access to 
Facebook users' accounts including profiles, photographs, chat, and also had 
the ability to post messages and mine personal information," said Nishant 
Doshi, a senior principal software engineer at Symantec, in a blog post. He 
discovered the flaw, together with Symantec's Candid Wueest.

Facebook has reportedly acknowledged and fixed the problem.

Whether anyone had exploited the flaw, however, remains an open question. 
"There is no good way to estimate how many access tokens have already been 
leaked since the release of Facebook applications back in 2007," said Doshi. 
"We fear a lot of these tokens might still be available in log files of 
third-party servers or still be actively used by advertisers."

To mitigate the threat posed by user credentials lingering in advertisers' log 
files, change your Facebook password. "Changing the password invalidates these 
tokens and is equivalent to 'changing the lock' on your Facebook profile," said 
Doshi.

The flaw resulted because of how Facebook iFrame applications handled access 
tokens. "Access tokens are like 'spare keys' granted by you to the Facebook 
application. Applications can use these tokens or keys to perform certain 
actions on behalf of the user or to access the user's profile," said Doshi. 
"Each token or 'spare key' is associated with a select set of permissions, like 
reading your wall, accessing your friend's profile, posting to your wall." 
Users grant specific permissions to an application when they install it.

<snip/>