GreyMagic Security Advisory GM#006-MCBy GreyMagic Software, Israel.
03 Jun 2004.
Topic: Simple Yahoo! Mail Cross-Site Scripting.
Discovery date: 16 May 2004.Affected applications:
Yahoo! web-based email service.Introduction:
Web-based email services and Yahoo! specifically make tremendous efforts to sanitize incoming emails from potentially unsafe HTML content. Flawed filtering of such unsafe content may result in severe consequences that would occur as soon as a user opens an email for reading, including:
- Theft of login and password.
- Content disclosure of any email in the mailbox.
- Automatically send emails from the mailbox.
- Exploitation of known vulnerabilities in the browser to access the user's file system and eventually take over the machine.
- Distribution of a web-based email worm.
- Disclosure of all contacts within the address book.
GreyMagic discovered that by sending a maliciously formed email to a Yahoo user it is possible to circumvent the filter and execute script in the context of a logged-in Yahoo! user.
The following HTML embedded in an email would show a Yahoo! user's cookie when opened:
GreyMagic informed Yahoo! of the vulnerability on 20-May-2004. Yahoo! responded promptly and reported that it patched the vulnerability on 24-May-2004.Tested on:
Yahoo! web-based email service.
The information in this security advisory and any of its demonstrations is provided "as is" without warranty of any kind.
Vulnerability details are provided strictly for educational and defensive purposes.
GreyMagic Software is not liable for any direct or indirect damages caused as a result of using the information or demonstrations provided in any part of this advisory.Stay informed:
Subscribe to GreyMagic's early notification email service and be informed of new vulnerabilities and updates as soon as they appear on the site.
Press here to subscribe.
Your privacy is important to us, read our Privacy Statement.