Face.com flaw ‘could have allowed Facebook, Twitter hijacking’

Lucian Constantin
23 June, 2012
View more articles fromthe author
Facial recognition start-up Face.com patched a vulnerability in its KLINK iOS app that could have allowed attackers to hijack the Facebook and Twitter accounts of its users, according to Ashkan Soltani, the independent security researcher who claims to have found the flaw.

KLIK is a camera app designed to allow users to easily tag friends in new photos by scanning their Facebook photo albums. It uses facial recognition technology developed by Face.com.

In order to use the app, users need to grant it access to their Facebook accounts. However, the app can also be integrated with Twitter, where it can post messages on their behalf.

A simple vulnerability in the app allowed users to access each others’ Facebook and Twitter accounts, Soltani said in a blog post this week, just after Face.com announced that it had been acquired by Facebook.

The vulnerability was caused by Face.com storing Facebook and Twitter OAuth tokens – unique authentication keys – on its servers in an insecure way that made them accessible to anyone, Soltani said.

With access to users’ OAuth tokens, an attacker could abuse the KLIK app’s permissions on their accounts. This includes the ability to access their private photos and friend lists or to post status updates and tweets in their names.

Since the vulnerability affected facial recognition technology, the privacy implications were significant, Soltani said. An attacker could hijack a popular user’s account – like Lady Gaga’s, had she used KLINK – and build face prints for their millions of Facebook friends. Then they could match those in real time to people walking down the street.

“Since this was a vulnerability that could potentially reveal sensitive consumer information, I worked with Face.com, Facebook, and Twitter to make sure it was addressed before disclosing it,” Soltani said.

Face.com did not immediately return a request for comment.

Leave a Comment

Please keep your comments friendly on the topic.

Contact us