The vulnerability was discovered by UK-based security consultant Jack Whitton who immediately informed Facebook.

Facebook engineers quickly took cognizance of the critical flaw and patched it within six hours.

Using atechniquedescribed in 2012, the expert managed to encode an XSS payload into a PNG images IDAT chunk.

Facebook pays bug bounty of $7500 for a FB account hijacking flaw

Whitton found that several Facebook plugins are designed to be placed in an iframe, which bypasses such protections.

This could be by posting a status with the link, or sending an email.

Facebook however confirmed toSecurityWeekthat it fixed the content throw in bug as well.

spot_img

source: www.techworm.net