oculus

3 articles
sort: new top best
clear filter
0 5/10

A brute-force attack vulnerability was discovered in Oculus identity verification during username changes, where the lack of rate limiting allowed an attacker to enumerate 6-digit OTP codes and distinguish valid codes from invalid ones by analyzing response length differences (840 bytes for valid, 1152 for invalid).

Oculus Facebook Karthik Kumar Reddy Gmail Burp Suite
medium.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 8/10

Detailed walkthrough of exploiting blind SQL injection in Oculus' developer portal by bypassing multiple filters (no whitespace, no commas) using comment syntax and MySQL alternative function syntax, ultimately extracting admin session tokens and gaining administrative access.

Oculus Facebook Josip Franjković Jon (Bitquark) developer.oculusvr.com CompanyAction.php PHPSESSID MySQL
josipfranjkovic.blogspot.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details
0 9/10

A chained CSRF vulnerability in Oculus-Facebook account linking allowed attackers to connect victims' Facebook accounts to attacker-controlled Oculus accounts, extract first-party Facebook access tokens via GraphQL queries, and achieve complete account takeover including password reset. The vulnerability required multiple fixes after initial attempts could be bypassed using a second CSRF on the Oculus login flow.

Josip Franjković Facebook Oculus graph.oculus.com graph.facebook.com auth.oculus.com
josipfranjkovic.com · devanshbatham/Awesome-Bugbounty-Writeups · 20 hours ago · details