Facebook is fixing a Web programming bug that could have allowed hackers to alter profile pages or make restricted information public. Facebook is fixing a Web programming bug that could have allowed hackers to alter profile pages or make restricted information public.The flaw was discovered last week and reported to Facebook by M.J. Keith, a senior security analyst with security firm Alert Logic. The bug has to do with the way that Facebook checked to make sure that browsers connecting with the site were the ones they claimed to be. Facebook’s servers use code called a “post_form_id” token to check that the browser trying to do something — liking a group, for example — was actually the browser that had logged into the account. Facebook’s servers check this token before making any changes to the user’s page, but Keith discovered that when he simply deleted the token from messages, he could change many settings on any Facebook account.“It’s like putting locks on a bunch of stuff but not locking them,” he said in an interview. Keith could make users’ private information public, change or read profile information, even add new contact e-mail addresses, he said. “It’s pretty bad; you can do a lot of damage with it,” he said.Facebook worked with Alert Logic to fix the bug, known as a cross-site request forgery (CSRF), Facebook spokesman Simon Axten confirmed in an e-mail message. “It’s now fixed,” he said. “We’re not aware of any cases in which it was used maliciously.” But as of late Tuesday afternoon, Pacific time, after Axten sent his e-mail, Facebook had not completely fixed the issue. For testing purposes, Keith created a Web page with an invisible iFrame HTML element that he programmed in Javascript. When the IDG News Service clicked on this page while logged into Facebook, it made the Facebook user automatically “like” several pages with no further interaction.That’s pretty much how an attack would have worked, Keith said. A victim would need to be tricked into clicking on a malicious Web site that contained the Javascript code that exploited the CSRF flaw.Facebook has been under a lot of heat recently by users who feel it hasn’t done enough to protect their privacy, and embarrassing technical glitches like this don’t help the social-networking company’s case. Earlier this month, Facebook had to temporarily pull its chat feature, after another bug let users eavesdrop on their friends’ private chat sessions. Related content news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry news UK data regulator warns that data breaches put abuse victims’ lives at risk The UK Information Commissioner’s Office has reprimanded seven organizations in the past 14 months for data breaches affecting victims of domestic abuse. By Michael Hill Sep 28, 2023 3 mins Electronic Health Records Data Breach Government news EchoMark releases watermarking solution to secure private communications, detect insider threats Enterprise-grade software embeds AI-driven, forensic watermarking in emails and documents to pinpoint potential insider risks By Michael Hill Sep 28, 2023 4 mins Communications Security Threat and Vulnerability Management Security Software news SpecterOps to use in-house approximation to test for global attack variations The new offering uses atomic tests and in-house approximation in purple team assessment to test all known techniques of an attack. By Shweta Sharma Sep 28, 2023 3 mins Penetration Testing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe