You are here: Home » Technology » News
Business Standard

Facebook awards $10,000 for finding bug in its Android app

The security researcher found a vulnerability in the download feature of Facebooks Android app that could be exploited to launch RCE attacks

Facebook | Android | Mobile apps

IANS  |  New Delhi 

Google, Facebook
Representative image

A security researcher has found a vulnerability in the download feature of Facebooks app that could be exploited to launch remote code execution (RCE) attacks. The social networking giant awarded the researcher $10,000 for finding the bug.

Facebook's app uses two methods of downloading files from a group -- a built-in service called DownloadManager and a second method called Files Tab.

Security researcher Sayed Abdelhafiz discovered a path traversal flaw in the second method.

"I discovered an ACE on for Android that can be triaged through a download file from group Files Tab without opening the file," he said in a post on Medium.

The vulnerability was in the second method. While security measures were implemented on the server side when uploading the files, it was easy to bypass those.

"First idea that came to my mind was to use path traversal to overwrite native libraries which will lead to executing arbitrary code," Abdelhafiz said.

Abdelhafiz explained how the Files Tab flaw enabled the researcher to launch RCE attacks against a target device.

The vulnerability in the Files Tab has now been fixed.

In June this year, Ahmedabad-based security researcher Bipin Jitiya won Rs 23.8 lakh ($31,500) from for identifying a bug in its social networking platform and a third-party business intelligence portal.

Jitiya, 26, identified the web security vulnerability in internal blind Server-Side Request Forgery (SSRF) in the source code of a publicly accessible endpoint, built using tools from MicroStrategy, that performed custom data collection and content generation.

MicroStrategy has partnered with on data analytics projects for several years. Jitiya reported the bug to the MicroStrategy's security team, who acknowledged it, saying the issue has been mitigated.

In May, a 27-year-old Indian security researcher Bhavuk Jain grabbed $100,000 (over Rs 75.5 lakh) from Apple for discovering a now-patched Zero Day vulnerability in the Sign in with Apple account authentication.

The Zero Day vulnerability could have allowed a hacker to break into an Apple user's account who log into third-party apps like Dropbox, Spotify, Airbnb and Giphy (now acquired by Facebook) and more.



(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

Dear Reader,

Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.
We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor

First Published: Tue, October 06 2020. 09:53 IST