Yahoo Mail cross-site scripting flaw targets IM users

Share this article:
An application security firm on Wednesday announced the discovery of a cross-site scripting (XSS) flaw in Yahoo Mail that could allow an attacker to steal users' Yahoo credentials.

The bug was previously patched.

For the attack to occur, a malicious person must be using Yahoo's instant messenger (IM) service, Yahoo Messenger, through the desktop client while the victim deploys the service through the Yahoo Mail website, said Mandeep Khera, vice president of marketing at Cenzic, which discovered the flaw.

Under the attack scenario, the hacker would begin conversing with the victim, Khera said. Then he would change his status to "invisible," which would prompt a message of "offline" to appear in the victim's chat window.

At this time, the hacker would insert a cross-site scripting attack into the IM dialog box and send it to the victim, Khera said. The string would appear in the victim's window as the word "Online." To continue chatting with the attacker, the victim would need to click "OK," which executes the malicious script.

"You don't know I've inserted anything in there, so you click 'OK,'" Khera said. "The actual vulnerability was on the Yahoo Mail side. When they introduced this whole IM thing in the mail [service], I think they forgot to to the proper coding."

Successfully exploiting this XSS bug could lend an attacker access to the victim's session, which could allow them to steal other personal information in the victim's Yahoo account, he said.

He said similar attacks could be possible in other IM programs.

Yahoo fixed the vulnerability June 13.

A company spokesperson did not immediately respond to a request for comment.


Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.