A Facebook URL redirection vulnerability discovered last week was patched just a day after a blog post detailing the bug went live.
According to the post by security researcher Dan Melamed, the vulnerability would allow anyone to have a facebook.com link redirect to a website of their choosing “without any restrictions,” simply by removing the “http://” tagged to the end of the URL.
Facebook contacted the researcher to notify him that any suspicious redirects would be caught by their internal Link Shim security tool.
However, Melamed, who included a video highlighting the flaw in his post, wrote that “not all malware/spam” could be caught by Facebook, adding that attackers could easily keep shifting to other malicious links.
The bug landed Melamed $1000.
Cyber Resilience Summit
iTnews Executive Retreat - Security Leaders Edition
Huntress + Eftsure Virtual Event -Fighting A New Frontier of Cyber-Fraud: How Leaders Can Work Together
iTnews Cloud Covered Breakfast Summit
Live & Hands On Demo: Navigating the BMC AMI DevX Platform to Understand Code Faster Using AI



