Seagate Central Remote Facebook Access Token

Discussion in 'News Aggregator' started by Packet Storm, 5 Jun 2015.

  1. Packet Storm

    Packet Storm Guest

    Seagate Central stores linked Facebook account access tokens in /etc/archive_accounts.ser and this exploit takes advantage of two bugs - Passwordless root login via FTP to retrieve archive_accounts.ser file which contains access tokens and reuses the unencrypted and unprotected (-rw-r--r--) access tokens for a chosen scope to return data.

    Continue reading...
     

Share This Page

Loading...