Hacking

Facebook fixed a flaw in the Messenger App.Doubts on its severity

Security experts discovered a security vulnerability in the Facebook Messenger App that allows hackers to replace the content of the messages they send.

Security experts from Check Point early this week reported a serious vulnerability in the Facebook Messanger App that could be exploited by attackers to replace the content of the messages they send via the mobile app. The impact of such flaw could be very severe, crook could exploit it to replace legitimate messages with content including malicious links.

“Check Point disclosed details about a vulnerability found in Facebook Messenger, both in the online and mobile applications.” reported Check Point in a blog post. “The vulnerability allows a malicious user to change conversation thread in the Facebook Online Chat & Messenger App. By abusing this vulnerability, it is possible to modify or remove any sent message, photo, file, link, and much more.”

As explained by the researchers, the Facebook Messenger App assigns a random ID to each message, the problem is that if an attacker obtains this ID via a request to facebook.com/ajax/mercury/thread_info.php, and then send another message with the same ID to the targeted user it will replace the original message.

Experts from Facebook who investigated the issue clarified that the security vulnerability only affects Messenger for Android. In particular, Facebook explained that for devices running iOS, only the first message is displayed even if attackers send further messages with the same ID.

“On most clients — including iOS — when duplicate messages are detected, the first message takes precedence and is displayed on both the sender’s and receiver’s device. However, a misconfiguration with the Messenger app on Android resulted in the last message being displayed instead. As a result, a sender could write a message and then appear to change its content retroactively.” states Facebook. “We received multiple reports about this bug through our Bug Bounty program — including one from Check Point, a security company — and we ran a thorough investigation.”Facebook tried to downplay the problem explaining that the vulnerability can be exploited by an attacker only to replace the content of their own messages and not someone else’s messages.

Would you have the ability to change the content of anyone else’s messages or just your own? Content could have only been adjusted by the person who sent the message. The bug did not provide the ability to change someone else’s messages.” states Facebook.

“Could you phish someone or send them malware by changing the content of your messages? No. Because even new content was subject to our anti-malware and anti-spam filters, this bug did not introduce the ability to send malicious content that would have been blocked in the original message.”

The company also highlighted that its antimalware and anti-spam filters could be enough to stop the threat.

“This bug affected the Android Messenger interface, but the message content was still correctly reflected on other platforms. We also confirmed that the content self-corrected on Android when the application refetched message data from the server, so it wasn’t permanently changed,” Facebook said.

Due to the above motivation, Facebook fixed the issue, but classified is as a “simple misconfiguration” ranked with a “low risk.”

Below the video PoC published by Check Point.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Facebook Messenger App, hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

9 hours ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

11 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

22 hours ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

1 day ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

1 day ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

1 day ago

This website uses cookies.