Yahoo patches XSS flaw affecting mail users

Share this article:

Yahoo has patched a cross-site scripting (XSS) vulnerability capable of running in multiple browsers once Yahoo Mail users open spammed malicious links.

The security hole is a Document Object Model (DOM)-based XSS flaw, meaning it is found in client-side JavaScript code, as opposed to traditional XSS vulnerabilities present in server-side code.

Shahin Ramezany, a hacker and independent researcher, tweeted about the exploit on Sunday, linking to a YouTube video he created that demonstrates the hack. Ramezany also said the exploit puts 400 million users at risk.

It has not been confirmed whether the vulnerability is related to a wave of recent Yahoo Mail accounts that have been compromised, often to deliver spam to a victim's address book.

On Tuesday, received an emailed statement from Yahoo, which said the XSS vulnerability was patched, but the email hacking incidents could be a separate issue.

“We are investigating recent reports of user accounts that may have been compromised to send abusive email and will work diligently to fix any vulnerabilities that are found,” the statement said. “In general, we recommend using different passwords for online accounts, changing passwords from time to time, and choosing passwords that combine letters, numbers and symbols. Separately, we were also recently informed of an online video that demonstrated a potential security vulnerability, which has been fixed. 

Ramezany did not respond to a request for comment from The researcher tweeted Monday that he planned to post proof-of-concept code for the flaw on his site,, after Yahoo patched the issue.

After the news of Yahoo's fix, Ramezany later tweeted Tuesday that the patch was "not effective enough and users are still [at] risk," since the proof-of-concept code can be easily tweaked to continue attacks.

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters


More in News

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.

EU conducts massive cyberattack simulation on critical networks

Conducted by the European Union Agency for Network and Information Security, the simulation launched 2,000 attacks on the networks of various critical infrastructure organizations.