Indian engineer gets $12,500 bounty for finding a Facebook bug that let anyone delete pictures

Advertisement
By Anupam Saxena | Updated: 3 September 2013 13:55 IST
Facebook had a security bug that could be exploited to delete any image on the social networking site posted by anyone, without the original poster's knowledge and approval.

Interestingly, an Indian electronics and communications engineer, Arul Kumar, discovered this vulnerability and shared it with Facebook under its Whitehat bug reporting program, winning a $12,500 bounty in the process.

The 21-year old engineer from Tamil Nadu, discovered that the mobile version of Facebook's Support Dashboard, which allows users to flag and report a picture for removal, could be exploited to remove any photograph posted by any Facebook user.

When a user sends a photo removal request through the Support Dashboard, usually Facebook takes a look and decides if it should be removed or not. If Facebook decides not to remove it, then the user has the option of sending a message to the user who has posted the picture with a request to remove the same picture. The request also contains a link, clicking on which leads to the removal of the photo.

Advertisement

Kumar discovered that while sending a removal request, a user can manually modify the Photo_id and the photo owner's Profile_id parameters, following which the photo removal link can be sent to one's own Facebook ID and used to delete the photo without the original uploader's knowledge. Using the same method, any picture on Facebook could be deleted without the involvement of the user who originally posted the picture.

Advertisement

As per Kumar, the same exploit could have been used for removing photos posted by even verified users, fan pages and groups and from status updates, photo albums, suggested posts and comments.

When Kumar first shared the vulnerability with Facebook, it was dismissed, with the Facebook security team unable to delete any pictures through the suggested hack. Following this, Kumar sent Facebook a proof of concept video demonstrating the bug through a dummy account. The second attempt was fruitful and the Facebook security team was able to see the vulnerability.
 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: Arul Kumar, Facebook, Facebook bug
Advertisement
Popular Mobile Brands
  1. Motorola Edge 70 Ultra Camera Configuration, Other Key Features Leaked
  2. Dominic and the Ladies' Purse OTT Release Date: When and Where to Watch it Online?
  3. Hogwarts Legacy Is Currently Free on Epic Games Store: How to Redeem
  4. The Game Awards 2025: See the Full List of Winners
  5. Nothing Phone 4a Series Price and Key Specs Tipped
  6. WhatsApp Brings a Voicemail-like Feature for Missed Voice and Video Calls
  7. The Rookie Season 7 OTT Release Date: When and Where to Watch it Online?
  8. Galaxy Mergers Can Switch On Supermassive Black Holes, Euclid Finds
  1. Astronomers Observe Star’s Wobbling Orbit, Confirming Einstein’s Frame-Dragging
  2. Galaxy Collisions Found to Activate Supermassive Black Holes, Euclid Data Shows
  3. JWST Detects Oldest Supernova Ever Seen, Linked to GRB 250314A
  4. Chandra’s New X-Ray Mapping Exposes the Invisible Engines Powering Galaxy Clusters
  5. Blue Origin to Fly First Wheelchair User to Space on New Shepard NS-37
  6. Chandra’s New X-Ray Mapping Exposes the Invisible Engines Powering Galaxy Clusters
  7. Sasivadane Now Streaming on Amazon Prime Video: Everything You Need to Know
  8. Kuttram Purindhavan Now Streaming Online: What You Need to Know?
  9. Lyne Lancer 19 Pro With 2.01-Inch Display, SpO2 Monitoring Launched in India
  10. OpenAI and Disney Reach Licensing Agreement to Bring Its Characters to the Sora App
Gadgets 360 is available in
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2025. All rights reserved.