Yahoo Mail cross-site scripting flaw targets IM users

Share this article:
An application security firm on Wednesday announced the discovery of a cross-site scripting (XSS) flaw in Yahoo Mail that could allow an attacker to steal users' Yahoo credentials.

The bug was previously patched.

For the attack to occur, a malicious person must be using Yahoo's instant messenger (IM) service, Yahoo Messenger, through the desktop client while the victim deploys the service through the Yahoo Mail website, said Mandeep Khera, vice president of marketing at Cenzic, which discovered the flaw.

Under the attack scenario, the hacker would begin conversing with the victim, Khera said. Then he would change his status to "invisible," which would prompt a message of "offline" to appear in the victim's chat window.

At this time, the hacker would insert a cross-site scripting attack into the IM dialog box and send it to the victim, Khera said. The string would appear in the victim's window as the word "Online." To continue chatting with the attacker, the victim would need to click "OK," which executes the malicious script.

"You don't know I've inserted anything in there, so you click 'OK,'" Khera said. "The actual vulnerability was on the Yahoo Mail side. When they introduced this whole IM thing in the mail [service], I think they forgot to to the proper coding."

Successfully exploiting this XSS bug could lend an attacker access to the victim's session, which could allow them to steal other personal information in the victim's Yahoo account, he said.

He said similar attacks could be possible in other IM programs.

Yahoo fixed the vulnerability June 13.

A company spokesperson did not immediately respond to a request for comment.


Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in News

Reported breaches involving zero-day bug at JPMorgan Chase, other banks

Reported breaches involving zero-day bug at JPMorgan Chase, ...

Hackers exploited a zero-day vulnerability and gained access to sensitive information from JPMorgan Chase and at least four other financial institutions, reports indicate.

Data on 97K Bugzilla users posted online for about three months

During a migration of the testing server for test builds of Bugzilla software, data on about 97,000 Bugzilla users was inadvertently posted publicly online.

Chinese national had access to data on 5M Arizona drivers, possible breach ...

Although Lizhong Fan left the U.S. in 2007, the agencies responsible for giving him access to Americans' personal information have yet to disclose the details of the case to the public.