[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] yahoomail dom based xss vulnerability
- To: Benji <me@xxxxxxxxx>
- Subject: Re: [Full-disclosure] yahoomail dom based xss vulnerability
- From: pratul agrawal <pratulag@xxxxxxxxx>
- Date: Tue, 15 Jun 2010 21:19:47 -0700 (PDT)
Thanks Brother,
See, how this occurred, Basically in most of the cases
Developers Simply design a APIs and when the client request for any page this
APIs gets Stored in the Client side. its main task is to takes the user input
and shows the result immediately to the client without sending request to the
server. so when this type of APIs is vulnerable to XSS this is called the DOM
based XSS.
Now in this case, when we click on [New Folder] for creating any new folder and
provide any javascript, it directly took by the API stored in the client side
when the inbox page is load in the client side in yahoomail, and get reflected.
that's all the story Bro, hope you understand what i really want to say.
Thanks,
Pratul Agrawal
--- On Tue, 15/6/10, Benji <me@xxxxxxxxx> wrote:
From: Benji <me@xxxxxxxxx>
Subject: Re: [Full-disclosure] yahoomail dom based xss vulnerability
To: "pratul agrawal" <pratulag@xxxxxxxxx>
Cc: "skg102@xxxxxxxxx" <skg102@xxxxxxxxx>, "full-disclosure@xxxxxxxxxxxxxxxxx"
<full-disclosure@xxxxxxxxxxxxxxxxx>, "security@xxxxxxxxx" <security@xxxxxxxxx>,
"info@xxxxxxxxxxxxxx" <info@xxxxxxxxxxxxxx>
Date: Tuesday, 15 June, 2010, 9:57 AM
Sup bro
I waz checkin owt ur javascriptz skriptz and waz wonderin if u cud explain how
diz shiz werks.
Peaze.
Sent from my iPhone
On 15 Jun 2010, at 09:18, pratul agrawal <pratulag@xxxxxxxxx> wrote:
Its working Bro. I think u had done some mistakes so u try it again with check
that javascript execution feature is enable in your browser. and bro for
execution of script it is must to use proper syntax that contain special
characters. just put "><script>alert(123)<script> in the New Folder field
comes in the Move button and you will saw a pop up message with 123 reflected.
Have a nice time bro,
Pratul Agrawal
--- On Tue, 15/6/10, ㅤ ㅤRockey <skg102@xxxxxxxxx> wrote:
From: ㅤ ㅤRockey <skg102@xxxxxxxxx>
Subject: Re: [Full-disclosure] yahoomail dom based xss
vulnerability
To:
Cc: full-disclosure@xxxxxxxxxxxxxxxxx, security@xxxxxxxxx, info@xxxxxxxxxxxxxx
Date: Tuesday, 15 June, 2010, 5:10 AM
Tried reproducing on yahoo mail
both on the classic and new one . Error message i got in both cases were
"Sorry, but your folder name has prohibited characters (please use letters,
numbers, dashes, and underscores). Please fix it and try again."
Cheers,
Rockey
--
It's all about Hacking and Security
http://h4ck3r.in/
-----Inline Attachment Follows-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/