{"id":2863,"date":"2016-04-26T14:30:33","date_gmt":"2016-04-26T11:30:33","guid":{"rendered":"http:\/\/www.one-it.ro\/blog\/?p=2863"},"modified":"2016-04-26T14:30:33","modified_gmt":"2016-04-26T11:30:33","slug":"vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook","status":"publish","type":"post","link":"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/","title":{"rendered":"Vulnerabilitate \u00een procesul de autentificare al Facebook. Atacatorii puteau avea acces la conturi care permit conectarea prin Facebook"},"content":{"rendered":"\n\n<div class=\"kk-star-ratings kksr-auto kksr-align-right kksr-valign-top\"\n    data-payload='{&quot;align&quot;:&quot;right&quot;,&quot;id&quot;:&quot;2863&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;valign&quot;:&quot;top&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;auto&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;2&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;5&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;4&quot;,&quot;greet&quot;:&quot;Rate this post&quot;,&quot;legend&quot;:&quot;5\\\/5 - (2 votes)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;width&quot;:&quot;78&quot;,&quot;_legend&quot;:&quot;{score}\\\/{best} - ({count} {votes})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}'>\n            \n<div class=\"kksr-stars\">\n    \n<div class=\"kksr-stars-inactive\">\n            <div class=\"kksr-star\" data-star=\"1\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"2\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"3\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"4\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"5\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n    <\/div>\n    \n<div class=\"kksr-stars-active\" style=\"width: 78px;\">\n            <div class=\"kksr-star\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n    <\/div>\n<\/div>\n                \n\n<div class=\"kksr-legend\" style=\"font-size: 9.6px;\">\n            5\/5 - (2 votes)    <\/div>\n    <\/div>\n<p><strong>Bitdefender a descoperit o vulnerabilitate \u00een procesul de autentificare al Facebook. Atacatorii puteau avea acces la conturi care permit conectarea prin Facebook<\/strong><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-2864\" src=\"http:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2016\/04\/facebook.jpg\" alt=\"security\" width=\"600\" height=\"357\" \/><\/p>\n<h2>Specialistii in securitate cibernetica ai Bitdefender au descoperit o vulnerabilitate in mecanismul de autentificare al Facebook, care le permitea atacatorilor sa fure identitatea anumitor utilizatori de internet si sa le acceseze majoritatea conturilor online unde se pot conecta prin Facebook.<\/h2>\n<p>Speciali\u0219tii \u00een securitate cibernetic\u0103 ai Bitdefender au descoperit o vulnerabilitate \u00een mecanismul de autentificare al Facebook, care le permitea atacatorilor s\u0103 fure identitatea anumitor utilizatori de internet \u0219i s\u0103 le acceseze majoritatea conturilor online unde se pot conecta prin Facebook.<\/p>\n<p>Autentificarea prin re\u021bele sociale este o metod\u0103 alternativ\u0103 de conectare la diverse conturi, care le ofer\u0103 utilizatorilor o modalitate mai convenabil\u0103 de a se \u00eenregistra f\u0103r\u0103 a mai completa c\u00e2mpurile de utilizator \u0219i parol\u0103. Cele mai multe site-uri permit conectarea prin Facebook, LinkedIn, Twitter sau Google Plus. Speciali\u0219tii Bitdefender au g\u0103sit o modalitate prin care s\u0103 \u00ee\u0219i asocieze identitatea utilizatorului \u0219i s\u0103 contoleze ne\u00eengr\u0103dit conturile online ale acestuia.<!--more--><\/p>\n<p>\u201eFolosind aceast\u0103 vulnerabilitate \u00een sistemul de login via Facebook, atacatorii pot accesa majoritatea conturilor online ale utilizatorilor care permit autentificarea cu aceast\u0103 re\u021bea social\u0103. Asta \u00eenseamn\u0103 c\u0103 atacatorii pot face pl\u0103\u021bi \u00een numele utilizatorilor pe site-urile magazinelor online, de exemplu\u201d, spune C\u0103t\u0103lin Co\u0219oi, Chief Security Strategist, Bitdefender.<\/p>\n<p>Pentru ca atacul s\u0103 reu\u0219easc\u0103, adresa de e-mail a victimei nu trebuie s\u0103 fie asociat\u0103 deja unui cont de Facebook, \u00eens\u0103 pot fi folosite adrese alternative de\u021binute de aceasta. De regul\u0103, utilizatorii de\u021bin mai mult de o adres\u0103 de e-mail, unele fiind publice pe internet \u0219i, deci, se afl\u0103 la dispozi\u021bia oric\u0103rui r\u0103uf\u0103c\u0103tor. Pentru a verifica identitatea unui utilizator f\u0103r\u0103 s\u0103-i expun\u0103 datele de autentificare, Login prin Facebook folose\u0219te protocolul OAuth, prin care autorizeaz\u0103 ter\u021bii s\u0103 primeasc\u0103 unele informa\u021bii despre utilizatori \u00een momentul acces\u0103rii anumitor site-uri.<\/p>\n<p>Cum func\u021bioneaz\u0103 vulnerabilitatea<\/p>\n<p>Cercet\u0103torii Bitdefender au reu\u0219it s\u0103 ocoleasc\u0103 etapa de confirmare, cerut\u0103 de regul\u0103 \u00een momentul \u00eenregistr\u0103rii pe un site cu o nou\u0103 adres\u0103 de e-mail asociat\u0103 unui cont Facebook. Mai \u00eent\u00e2i, au creat un profil de Facebook, cu adresa de e-mail a victimei asociat\u0103 diverselor conturi pe care le de\u021bine pe internet.<\/p>\n<p>Fig. 1 Atacatorul creeaz\u0103 un nou cont de Facebook folosind adresa de e-mail a victimei<\/p>\n<p>Dup\u0103 ce au creat profilul Facebook cu adresa de e-mail apar\u021bin\u00e2nd victimei, au ad\u0103ugat contului de Facebook \u0219i o adres\u0103 controlat\u0103 de atacatori.<br \/>\nFig. 2 Atacatorul \u00eenlocuie\u0219te adresa de e-mail a victimei cu propria adres\u0103 de e-mail<\/p>\n<p>Dup\u0103 un refresh al paginii, e-mail-ul victimei este deja validat de Facebook. C\u00e2nd \u00eencearc\u0103 s\u0103 se autentifice pe o alt\u0103 pagin\u0103 folosind butonul Facebook Login cu adresa de e-mail a victimei, i se solicit\u0103 s\u0103 confirme propria adres\u0103 e-mail, nu pe cea ini\u021bial\u0103, apar\u021bin\u00e2nd victimei.<br \/>\nFig. 3 Atacatorului i se solicit\u0103 s\u0103 confirme propria adres\u0103 de e-mail<\/p>\n<p>\u00cen set\u0103rile contului de Facebook, atacatorul stabile\u0219te propria adres\u0103 drept contact primar pentru cont \u00een locul adresei de e-mail a victimei.<\/p>\n<p>Fig. 4 Atacatorul pune adresa de e-mail a victimei drept contact primar<br \/>\n\u00cen consecin\u021b\u0103, atacatorul se conecteaz\u0103 cu succes la conturile online de\u021binute de victim\u0103, \u00eenregistrate cu adresa de e-mail folosit\u0103 de atacator s\u0103 creeze profilul Facebook, precum cele din magazine online, site-uri de rezerv\u0103ri, aplica\u021bii personale, etc. Partea care certific\u0103 identitatea \u2013 \u00een acest caz, Facebook &#8211; ar fi trebuit s\u0103 a\u0219tepte p\u00e2n\u0103 c\u00e2nd noua adres\u0103 de e-mail asociat\u0103 contului de Facebook era verificat\u0103.<\/p>\n<p>Compania Facebook a remediat vulnerabilitatea dup\u0103 notificarea furnizat\u0103 de c\u0103tre cercet\u0103torii Bitdefender.<\/p>\n<p>Articol sursa: \u00a0<a href=\"http:\/\/www.bitdefender.ro\/news\/bitdefender-a-descoperit-o-vulnerabilitate-in-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook-3136.html\" target=\"_blank\">http:\/\/www.bitdefender.ro\/news\/bitdefender-a-descoperit-o-vulnerabilitate-in-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook-3136.html<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bitdefender a descoperit o vulnerabilitate \u00een procesul de autentificare al Facebook. Atacatorii puteau avea acces la conturi care permit conectarea prin Facebook Specialistii in securitate cibernetica ai Bitdefender au descoperit o vulnerabilitate in mecanismul de autentificare al Facebook, care le permitea atacatorilor sa fure identitatea anumitor utilizatori de internet si sa le acceseze majoritatea conturilor [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[5],"tags":[189],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerabilitate \u00een procesul de autentificare al Facebook. Atacatorii puteau avea acces la conturi care permit conectarea prin Facebook - One-IT blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerabilitate \u00een procesul de autentificare al Facebook. Atacatorii puteau avea acces la conturi care permit conectarea prin Facebook - One-IT blog\" \/>\n<meta property=\"og:description\" content=\"Bitdefender a descoperit o vulnerabilitate \u00een procesul de autentificare al Facebook. Atacatorii puteau avea acces la conturi care permit conectarea prin Facebook Specialistii in securitate cibernetica ai Bitdefender au descoperit o vulnerabilitate in mecanismul de autentificare al Facebook, care le permitea atacatorilor sa fure identitatea anumitor utilizatori de internet si sa le acceseze majoritatea conturilor [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/\" \/>\n<meta property=\"og:site_name\" content=\"One-IT blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OneIT\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-26T11:30:33+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2016\/04\/facebook.jpg\" \/>\n<meta name=\"author\" content=\"One-IT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@oneitro\" \/>\n<meta name=\"twitter:site\" content=\"@oneitro\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"One-IT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/\"},\"author\":{\"name\":\"One-IT\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/#\/schema\/person\/22bc65c3ffb17647f9457adc941ab683\"},\"headline\":\"Vulnerabilitate \u00een procesul de autentificare al Facebook. Atacatorii puteau avea acces la conturi care permit conectarea prin Facebook\",\"datePublished\":\"2016-04-26T11:30:33+00:00\",\"dateModified\":\"2016-04-26T11:30:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/\"},\"wordCount\":648,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.one-it.ro\/blog\/#organization\"},\"keywords\":[\"securitate facebook\"],\"articleSection\":[\"Diverse\"],\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/\",\"url\":\"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/\",\"name\":\"Vulnerabilitate \u00een procesul de autentificare al Facebook. Atacatorii puteau avea acces la conturi care permit conectarea prin Facebook - One-IT blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.one-it.ro\/blog\/#website\"},\"datePublished\":\"2016-04-26T11:30:33+00:00\",\"dateModified\":\"2016-04-26T11:30:33+00:00\",\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/#website\",\"url\":\"https:\/\/www.one-it.ro\/blog\/\",\"name\":\"One-IT blog\",\"description\":\"Mai mult dec\u00e2t un expert, un prieten!\",\"publisher\":{\"@id\":\"https:\/\/www.one-it.ro\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.one-it.ro\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/#organization\",\"name\":\"ONE-IT\",\"url\":\"https:\/\/www.one-it.ro\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2019\/10\/logo_OneIT.png\",\"contentUrl\":\"https:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2019\/10\/logo_OneIT.png\",\"width\":255,\"height\":230,\"caption\":\"ONE-IT\"},\"image\":{\"@id\":\"https:\/\/www.one-it.ro\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/OneIT\",\"https:\/\/twitter.com\/oneitro\",\"https:\/\/www.instagram.com\/oneit.ro\/\",\"https:\/\/www.linkedin.com\/company\/oneit\/\",\"https:\/\/www.youtube.com\/oneit\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/#\/schema\/person\/22bc65c3ffb17647f9457adc941ab683\",\"name\":\"One-IT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/719951a327fa9ba9d20500d1492b2dfe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/719951a327fa9ba9d20500d1492b2dfe?s=96&d=mm&r=g\",\"caption\":\"One-IT\"},\"description\":\"ONE-IT - Smart technologies, Cyber Security, Cloud, integrated IT solutions for business productivity. Detalii despre noi: echipa One-IT\",\"sameAs\":[\"http:\/\/www.one-it.ro\"],\"url\":\"https:\/\/www.one-it.ro\/blog\/author\/one-it\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerabilitate \u00een procesul de autentificare al Facebook. Atacatorii puteau avea acces la conturi care permit conectarea prin Facebook - One-IT blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/","og_locale":"ro_RO","og_type":"article","og_title":"Vulnerabilitate \u00een procesul de autentificare al Facebook. Atacatorii puteau avea acces la conturi care permit conectarea prin Facebook - One-IT blog","og_description":"Bitdefender a descoperit o vulnerabilitate \u00een procesul de autentificare al Facebook. Atacatorii puteau avea acces la conturi care permit conectarea prin Facebook Specialistii in securitate cibernetica ai Bitdefender au descoperit o vulnerabilitate in mecanismul de autentificare al Facebook, care le permitea atacatorilor sa fure identitatea anumitor utilizatori de internet si sa le acceseze majoritatea conturilor [&hellip;]","og_url":"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/","og_site_name":"One-IT blog","article_publisher":"https:\/\/www.facebook.com\/OneIT","article_published_time":"2016-04-26T11:30:33+00:00","og_image":[{"url":"http:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2016\/04\/facebook.jpg"}],"author":"One-IT","twitter_card":"summary_large_image","twitter_creator":"@oneitro","twitter_site":"@oneitro","twitter_misc":{"Scris de":"One-IT","Timp estimat pentru citire":"3 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/#article","isPartOf":{"@id":"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/"},"author":{"name":"One-IT","@id":"https:\/\/www.one-it.ro\/blog\/#\/schema\/person\/22bc65c3ffb17647f9457adc941ab683"},"headline":"Vulnerabilitate \u00een procesul de autentificare al Facebook. Atacatorii puteau avea acces la conturi care permit conectarea prin Facebook","datePublished":"2016-04-26T11:30:33+00:00","dateModified":"2016-04-26T11:30:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/"},"wordCount":648,"commentCount":0,"publisher":{"@id":"https:\/\/www.one-it.ro\/blog\/#organization"},"keywords":["securitate facebook"],"articleSection":["Diverse"],"inLanguage":"ro-RO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/","url":"https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/","name":"Vulnerabilitate \u00een procesul de autentificare al Facebook. Atacatorii puteau avea acces la conturi care permit conectarea prin Facebook - One-IT blog","isPartOf":{"@id":"https:\/\/www.one-it.ro\/blog\/#website"},"datePublished":"2016-04-26T11:30:33+00:00","dateModified":"2016-04-26T11:30:33+00:00","inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.one-it.ro\/blog\/vulnerabilitate-procesul-de-autentificare-al-facebook-atacatorii-puteau-avea-acces-la-conturi-care-permit-conectarea-prin-facebook\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.one-it.ro\/blog\/#website","url":"https:\/\/www.one-it.ro\/blog\/","name":"One-IT blog","description":"Mai mult dec\u00e2t un expert, un prieten!","publisher":{"@id":"https:\/\/www.one-it.ro\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.one-it.ro\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/www.one-it.ro\/blog\/#organization","name":"ONE-IT","url":"https:\/\/www.one-it.ro\/blog\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.one-it.ro\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2019\/10\/logo_OneIT.png","contentUrl":"https:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2019\/10\/logo_OneIT.png","width":255,"height":230,"caption":"ONE-IT"},"image":{"@id":"https:\/\/www.one-it.ro\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OneIT","https:\/\/twitter.com\/oneitro","https:\/\/www.instagram.com\/oneit.ro\/","https:\/\/www.linkedin.com\/company\/oneit\/","https:\/\/www.youtube.com\/oneit"]},{"@type":"Person","@id":"https:\/\/www.one-it.ro\/blog\/#\/schema\/person\/22bc65c3ffb17647f9457adc941ab683","name":"One-IT","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.one-it.ro\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/719951a327fa9ba9d20500d1492b2dfe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/719951a327fa9ba9d20500d1492b2dfe?s=96&d=mm&r=g","caption":"One-IT"},"description":"ONE-IT - Smart technologies, Cyber Security, Cloud, integrated IT solutions for business productivity. Detalii despre noi: echipa One-IT","sameAs":["http:\/\/www.one-it.ro"],"url":"https:\/\/www.one-it.ro\/blog\/author\/one-it\/"}]}},"_links":{"self":[{"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/posts\/2863"}],"collection":[{"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/comments?post=2863"}],"version-history":[{"count":2,"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/posts\/2863\/revisions"}],"predecessor-version":[{"id":2866,"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/posts\/2863\/revisions\/2866"}],"wp:attachment":[{"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/media?parent=2863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/categories?post=2863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/tags?post=2863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}