Stefan Bauer – N8D

Office 365, SharePoint, Web Development & Design

Menu Info
  • Home
  • About
  • Blog
  • Data Protection
Stefan Bauer

Stefan Bauer

Designer living and working in Vienna Austria. Owner of N8DMicrosoft MVP / Office Development SharePoint Pattern and Practice core team member

Verified Services

View Full Profile →

Archives

  • November 2020 (2)
  • October 2020 (6)
  • September 2020 (3)
  • July 2020 (3)
  • June 2020 (3)
  • May 2020 (2)
  • March 2020 (1)
  • February 2020 (1)
  • November 2019 (1)
  • October 2019 (2)
  • September 2019 (4)
  • August 2019 (2)
  • July 2019 (6)
  • June 2019 (5)
  • May 2019 (1)
  • April 2019 (2)
  • March 2019 (1)
  • February 2019 (2)
  • January 2019 (3)
  • December 2018 (2)
  • November 2018 (1)
  • October 2018 (4)
  • September 2018 (2)
  • August 2018 (1)
  • May 2018 (5)
  • April 2018 (5)
  • March 2018 (1)
  • February 2018 (2)
  • January 2018 (2)
  • December 2017 (4)
  • November 2017 (2)
  • October 2017 (1)
  • September 2017 (1)
  • August 2017 (1)
  • July 2017 (2)
  • May 2017 (1)
  • April 2017 (2)
  • March 2017 (3)
  • February 2017 (4)
  • January 2017 (1)
  • December 2016 (2)
  • October 2016 (1)
  • September 2016 (3)
  • August 2016 (1)
  • July 2016 (1)
  • June 2016 (1)
  • May 2016 (7)
  • April 2016 (6)
  • March 2016 (3)
  • February 2016 (1)
  • January 2016 (5)
  • December 2015 (1)
  • November 2015 (3)
  • October 2015 (2)
  • August 2015 (2)
  • July 2015 (4)
  • June 2015 (1)
  • May 2015 (3)
  • April 2015 (5)
  • March 2015 (2)
  • February 2015 (2)
  • January 2015 (1)
  • December 2014 (2)
  • November 2014 (2)
  • October 2014 (5)
  • September 2014 (1)
  • June 2014 (2)
  • May 2014 (1)
  • January 2014 (5)
  • November 2013 (2)
  • September 2013 (3)
  • May 2013 (2)
  • March 2013 (1)
  • December 2012 (1)
  • November 2012 (1)
  • October 2012 (1)
  • August 2012 (2)
  • July 2012 (1)
  • May 2012 (2)
  • April 2012 (1)
  • February 2012 (1)
  • January 2012 (1)
  • December 2011 (2)
  • November 2011 (2)
  • October 2011 (1)
  • August 2011 (2)
  • July 2011 (2)
  • May 2011 (2)
  • April 2011 (1)
  • March 2011 (2)
  • February 2011 (1)
  • December 2010 (1)
  • November 2010 (1)
  • August 2010 (2)

Tags

Atomic Design Atomic Web Design Branding CSS Custom Forms customization Deployment Design Development Fluent Ui gulp html HTML5 Javascript JQuery JSLink modern experience nodejs npm Office 365 Office 365 Development Office UI Fabric Pattern and Practices React responsive web design Rich Text Editor sass SharePoint SharePoint 2010 SharePoint 2013 SharePoint Development SharePoint Framework Speaking SPFx SPFx Development Tools UI user experience UX Web Design Web Development web fonts webpack web parts yeoman
Blogheim.at Logo
Article
18. June 2020
0 comment
by Stfbauer2

Workplace from Facebook exposes customer data publicly

Last week I discovered a leak that effects documents published on Workplace from Facebook. After filing a white hat report, I got a response from Facebook’s security team. It seems that they are not concerned that customer data are exposed publicly by their platform via public content delivery networks. The leak is how this platform treats documents and how sharing works.

Workplace from Facebook – marketing statement on their web site

“Access for everyone” and “discover the secrets of connected companies” are taken literally.

Symptom of the leak

Like many other social networks for companies, Workplace allows sharing documents with your co-workers. Documents that only intended for internal use.

Creating a post on Workplace from Facebook

When the document gets attached to a post, a screenshot of the first page of a document gets created.

Uploading a document to Workplace from Facebook

This screenshot also gets stored in the Workplace environment. There is nothing wrong about functions like this when the screenshots get stored in a secure location and are not publicly available.

First page captured by Facebook

In case of Workplace the screenshots of the first page are stored on a public CDN without any access restrictions.

Inspection of the screenshot location

The storage location of this screenshot can be retrieved simply by inspecting the image. For example, through copy the image location and open in another browser that never have opened this image ever.
To be sure that not a local stored or cached version of this screenshot causes this effect, I opened a session on a browser testing tool that provides every time with a new browser instance from a clean virtual machine without any browser cache.

Screenshot of Document preview opened on a clean browser without cache

The image shown on the screenshot was opened without any authentication or authorisation by the owner. This first page is available to anyone.

To open this image shown before follow the following link:
Update: Link does not work anymore because Facebook disabled this account.
https://scontent-vie1-1.xx.fbcdn.net/v/t1.0-0/s640x640/83372861_126977559029169_15884798451260453_o.jpg?_nc_cat=108&_nc_sid=235911&_nc_ohc=zhR85t8WUCkAX_hrL_V&_nc_ht=scontent-vie1-1.xx&_nc_tp=7&oh=bcd3e5197774fbce230778de5f40327f&oe=5F0F44DE

As shown here, the abstract is easy to read, and the captured image has a proper resolution. As it seems this leak mostly apply to PDF, Word Documents, Google Docs as well as images shared on Workplace.

Any service connected with Workplaces from Facebook is likely to leak screenshots like this. Services like Google Docs, Office 365, DropBox, Box, to name some. The following screenshot is the content of a private document on Google, for example.

Preview capture of Google Docs document

Preview capture of Google Docs document

This leak is possible through piggybacking on the user permissions and credentials on the connected platforms and sharing the first page publicly on the publicly available content delivery network. Even someone that doesn’t have access to the document gets some information on about the document. The data is not only accessible inside an organisation but for everyone in the world.

Privacy settings on groups

Workplace for Facebook offers the following privacy settings.

Privacy settings of Groups

In fact these setting will not get applied to the screenshots those still remain on a public CDN. If a posted document shows a preview then this preview comes from a public CDN. During multiple test it seems that sometimes a preview will not get created. Also worth noticing sometimes the preview get generated with a deloy for some minutes.

Facebooks response

This security and privacy issue got reported as a Facebook white hat security report the included a video, the general concerns as well as steps to reproduce this issue. Facebook responded with the following statement.

Facebooks response

Even though there is the possibility when you have access to a computer that downloaded the information, there is no reason to store company data that supposed to stay internal to put them on a public content delivery network.
Especially when the data are available more than ten days, for now, I am not saying that this feature is not useful, but the data on the screenshot should get handled with the same restrictions as the document itself. Even after the deletion of the post and the document screenshot remained on the CDN.

It is also interesting that Facebook itself stores all pictures uploaded by users on public CDN’s all over the world. Someone else likely has the privately shared photos of your children too in the worst case.

I tried to reach out to Facebook after their first response again, raising concerns again how data get handled. So far, after a couple of days waiting, I haven’t received any follow-up. It is technically possible to avoid sharing this kind of information publicly and restrict access to only their services.

Facebook does not feel any need to do so, allowing people without good intentions to harvest images and confidential information from Facebook and Workplace from Facebook.

Update 23/09/2020:
Facebook is aware of this security and data leakage issue but refuse to fix it for the good of their users and businesses. Issue is still existent but won’t get fixed. It is like always a personal decision who to trust with their data.


Also published on Medium.

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Email
  • More
  • Print
  • Reddit

Like this:

Like Loading...

Related

Category
  • Facebook
  • Privacy
Tags
  • Cyber Security
  • Facebook
  • Facebook leak
  • GDPR
  • Information Leak
  • privacy
  • privacy issue
  • Security
  • Worplace from Facebook
Next Post »
« Previous Post
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 - Stefan Bauer - N8D

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.
%d bloggers like this: