LFI vulnerabilities used to expose sensitive files and a database schema Credit: Thinkstock A researcher known for exposing application flaws posted screenshots showing Local File Inclusion vulnerabilities on Adult Friend Finder. The incident marks the second time in just over a year that the internet hook-up destination has had security problems.On Tuesday, a researcher who goes by 1×0123 on Twitter, and Revolver in other circles, posted screenshots taken on Adult Friend Finder.The images show a Local File Inclusion vulnerability (LFI) being triggered. When asked directly,1×0123 confirmed LFI as the vulnerability being exploited, and said it was discovered in a module on the production servers used by Adult Friend Finder.LFI vulnerabilities allow an attacker to include files located elsewhere on the server into the output of a given application. In most cases, the LFI results in data being printed to the screen – which is what is happening here – or they can be leveraged to perform more serious actions, including code execution. This vulnerability exists in applications that don’t properly validate user-supplied input, and leverage dynamic file inclusion calls in their code.In his examples, 1×0123 shows a redacted image of the server’s /etc/passwd file, as well as a database schema generated on September 7, 2016. The database schema reveals the database names, internal IP details, and the generic six-character password used to access them. All of the listed databases share the same password. Among the databases listed are chat, ffibilling, memberlist, messages, photo, users, and video. In all, there are ninety databases listed.This isn’t the first time 1×0123 has been in the news. Last May, he published images and claimed to have command injection abilities and shell access to Pornhub. The adult entertainment giant investigated his claims, and after speaking with him directly, they called the incident a hoax.Perhaps he expects this reaction this time around as well. On Twitter, 1×0123 referenced the previous hoax claims in relation to Adult Friend Finder, stating, “…they will call it hoax again and I will fu—– leak everything.”Salted Hash reached out to Adult Friend Finder on Tuesday evening for comment and to alert them to the situation.In a brief statement emailed Wednesday morning, Firend Finder Network’s Vice President,and Senior Counsel of Corporate Compliance & Litigation, Diana Lynn Ballou said:“We are aware of reports of a security incident, and we are currently investigating to determine the validity of the reports. If we confirm that a security incident did occur, we will work to address any issues and notify any customers that may be affected.”In May of 2015, Adult Friend Finder confirmed that 3.5 million users had their accounts compromised. At the time the records were posted, the data was 74-days old. The person responsible for the data breach – an admin on the hacker forum HELL – said the reasoning was revenge-based, as a friend of his was owed money. The files were published along with a $100,000 USD ransom demand. As a result, Adult Friend Finder hired FireEye to help with the investigation, the results of which were never made public. Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe