Got a tip for us? Share it...

New in OS X: Get MacRumors Push Notifications on your Mac

Resubscribe Now Close

Facebook and Dropbox Apps for iOS Vulnerable to Credential Theft

Earlier this week, Gareth Wright disclosed his recent work showing that Facebook's app for iOS contains a security vulnerability that could allow malicious users to access login credentials held in a .plist file associated with the app. Obtaining a copy of that .plist file could allow a malicious users to automatically login in to the affected user's account on another device. The flaw reportedly also exists on Android devices.

Wright first discovered the issue while using iExplorer to browse files on his iPhone, discovering that the Facebook .plist file maintains the full oAuth key and secret needed to access his account in plain text. Working with a friend, Wright was able to demonstrate that simply moving that .plist file to another device granted that device access to his Facebook account.
After backing up his own plist and logging out of Facebook he copied mine over to his device and opened the Facebook app…

My jaw dropped as over the next few minutes I watched posts appear on my wall, private messages sent, webpages liked and applications added.

Scoopz then opened Draw Something on his iPad which logged him straight into my account where he sent some pictures back to my friends.
Wright outlines a number of different ways in which a malicious user could obtain the login credentials, including customized apps, hidden applications installed on public PCs, or hardware solutions such as a modified speaker dock that could siphon the data.

Facebook has issued a statement claiming that the issue only affects devices that have been jailbroken or lost, as it requires either installation of a custom app or physical access to the device. But as pointed out by Wright and confirmed by The Next Web, unmodified devices need not be lost in order to be targeted, as simply plugging in a device to a compromised computer or accessory would be sufficient to allow the data to be gathered.


Dropbox .plist file seen through iExplorer (Source: The Next Web)

Furthermore, The Next Web has confirmed that the same issue affects Dropbox for iOS, similarly allowing a user to simply copy the .plist file from one device to another in order to gain access to the account. Given that two high-profile apps are vulnerable to credential theft, it seems likely that other services are also affected by the same issue.

As multiple reports note, there is no evidence that this method of collecting login credentials is actively being used in a malicious manner, and users can protect themselves for the time being by not connecting their devices to public computers or charging stations.

Update: While Wright's initial post claims that the issue affects "locked passcoded unmodified iOS Devices" when connected to a PC set up to capture the .plist file, The Next Web has now updated its report to indicate that in its testing the technique does not work on devices protected with a passcode.

Top Rated Comments

(View all)

31 months ago
Sloppy programming. This sort of information should be stored in the Keychain!
Rating: 12 Votes
31 months ago
Apple engineers and even Geniuses in the retail stores will tell you (and rightfully) that Facebook is a poorly written application. Aside from the aforementioned issue, Facebook is a memory hog and one of the reasons for battery drain. Check your logs on your iPhone (Settings -> General -> About -> Diagnostics & Usage -> Diagnostics & Usage Data), you should find LowMemory and other logs related to Facebook. Closing the app in the multitasking bar should speed up your iOS device, especially for older devices, while cutting back on battery usage.

Apple has been on Facebook regarding this issue but to no avail. With Facebook's popularity they seem to have Apple by the nads.

Noticed a negative vote, don't understand why as the information I provided is based on evidence/fact and I hope would be beneficial to some. I wish MacRumors would disengage this silly negative voting system as it truly serves no purpose other than to inflame others. Positive votes for truly helpful posts seems more logical and would support a more mature site. :)
Rating: 11 Votes
31 months ago

This has been a good week for the Apple security team


What does the security of the Facebook and Dropbox Apps have to do with the Apple Security Team? This is about lazy developers, not utilizing stuff that is there.
Rating: 11 Votes
31 months ago

Sloppy programming. This sort of information should be stored in Keychain!


Exactly. Apple makes it very clear that any sensitive information goes in the Keychain. It's not the easiest API in the iOS SDK, but anyone getting paid to write apps should be able to muscle through it.

The other thing that's obscene about the Facebook app for iOS is that it caches every element of every web page you visit with the app. Check your usage and Facebook could easily be gobbling multiple GB. Details on my blog: Facebook for iOS Pigs Out (http://www.subfurther.com/blog/2012/03/20/facebook-for-ios-pigs-out/)
Rating: 7 Votes
31 months ago
Rating: 7 Votes
31 months ago
This is exactly why I refuse to have the FB app on my phone and I NEVER log into apps using my FB account. Turns out I'm not as crazy as my friends think I am.
Rating: 7 Votes
31 months ago
I certainly hope these companies fix this ASAP. I don't use Facebook, so I'm alright there, but I do use Dropbox.

Agreed with someone above that this is sloppy programming. It still amazes me in this day that folks don't consider security when they create apps and such that require authentication.
Rating: 6 Votes
31 months ago
A good reason to use the Passcode function with simple passcode turned off and erase data function on.
Rating: 5 Votes
31 months ago
The only way to get a hold of these files is with physical access to the phone. Pretty scary though. Especially if your phone's nicked.

Facebook's claim that jailbroken devices are inherently vulnerable to this is just plain, plain wrong. The only way that a jailbroken device would be more vulnerable is through SSH being installed voluntarily by the user, and the root password not being changed.
Rating: 5 Votes
31 months ago

Honestly it sounds like Android is much more vulnerable than iOS to this issue, as every Android phone is essentially jailbroken. iOS users would either have to tether or jailbreak to be affected, but Android users (and iOS jailbroken users) could be affected by rogue apps. Security issues like this are the main thing keeping me from jailbreaking my phone.


Actually, jailbreaking has nothing to do with this. Unjailbroken devices are just as vulnerable.
Rating: 5 Votes

[ Read All Comments ]