{"id":5541,"date":"2018-09-18T17:07:45","date_gmt":"2018-09-18T21:07:45","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/?p=5541"},"modified":"2018-09-18T17:07:45","modified_gmt":"2018-09-18T21:07:45","slug":"facebook-offers-rewards-for-access-token-exposure-flaws","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/2018\/09\/18\/facebook-offers-rewards-for-access-token-exposure-flaws\/","title":{"rendered":"Facebook Offers Rewards for Access Token Exposure Flaws"},"content":{"rendered":"<p>Facebook has announced expansion of its bug bounty program to include third-party apps and websites that let people use their Facebook accounts to log in. \u00a0The company has declared that it will pay at least $500 to anyone who reports vulnerabilities that involve \u201cimproper exposure of Facebook user access tokens.\u201d Access tokens allow users to log into third \u2013 party applications and websites through Facebook. One condition that the company has put forth is that the bug should be discovered by passively viewing data sent to or from a device while the affected application is in use.<\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/facebook-offers-rewards-access-token-exposure-flaws\">https:\/\/www.securityweek.com\/facebook-offers-rewards-access-token-exposure-flaws<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facebook has announced expansion of its bug bounty program to include third-party apps and websites that let people use their Facebook accounts to log in. \u00a0The company has declared that it will pay at least $500 to anyone who reports vulnerabilities that involve \u201cimproper exposure of Facebook user access tokens.\u201d Access tokens allow users to [&hellip;]<\/p>\n","protected":false},"author":19015,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[714426],"tags":[],"class_list":{"0":"post-5541","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-01-it-governance","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/users\/19015"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/comments?post=5541"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5541\/revisions"}],"predecessor-version":[{"id":5542,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5541\/revisions\/5542"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/media?parent=5541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/categories?post=5541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/tags?post=5541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}