Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
The social network Menshn has been reported to have been rife with security flaws and "is being exploited left right and centre".
After its high-profile launch last week by British MP Louise Mensch, Menshn.com co-founder Luke Bozier has been forced to issue a series of statements to reconfirm the security of the social network.
However according to research by UK-based mobile applications developer Nick Shearer, the site has had ‘several major cross-site scripting (XSS) vulnerabilities', despite denials by Bozier.
He said that a very simple XSS attack was visible if the user is running Firefox or Chrome and contains some additional client-side protection.
He also said that he responsibly disclosed the vulnerability to Menshn.com via email and Twitter to Bozier, yet in less than an hour, the flaws were being publicly disclosed – particularly after Bozier began tweeting denials about the flaws.
“One of the problems with Luke's tweets was that they invited people to find flaws. You should never claim your site is 'safe, clean and secure' - because the chances are it isn't. Sure enough, it turned out that somebody had already found the exact same vulnerability and tweeted about it.”
“Since the exploit is out in the wild there's really no point me responsibly disclosing it. People have subsequently found even worse security holes that work across all browsers, including Chrome. In fact, it turns out other Twitter users had already tried to responsibly disclose, but to no avail.”
He warned users to avoid the website until the security issues were fully resolved, saying it was ‘just too unsafe'.
When asked if Menshn was working on fixing the flaws, Bozier said that people were simply ‘claiming' that they had found flaws. He said that the server had not crashed, that no XSS or SQL injection attacks had succeeded. “Menshn is a safe, clean and secure environment,” he said.
“Reported security issues around Menshn are unfounded. Your information (i.e. your password) is safe unless your own computer has been hacked.
“But I appreciate all the feedback from the tech community, and we are dealing with real issues that do arise.”
Bozier later said that Menshn runs on a completely encrypted HTTPS connection and said that he was ‘still waiting for somebody to prove Menshn passwords can be stolen' and said that until then, ‘perhaps best not to publish spurious claims'.
Menshn has been approached for comment, and had not responded at the time of publication.
This article originally appeared at scmagazineuk.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.