Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - Now 20% Geekier.

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » November 2012 » Yahoo XSS exploits going for $700

Yahoo XSS exploits going for $700


Contributed by: Email on 11/28/2012 04:06 PM [ comments Comments ]


The latest discovery of a cross-site scripting (XSS) vulnerability on Yahoo is not particularly uncommon, but gives some insight into how exploits for vulnerabilities are priced. According to security blogger Brian Krebs, an exploit being sold by an Egyptian hacker targets an XSS vulnerability in a Yahoo service.

The Egyptian hacker is holding a sale, offering the exploit for $700 where he claims it is usually sold for $1,100 to $1,500 dollars. The hacker is able to sell the exploit several times but does say that he expects the hole it targets to be closed soon. The vulnerability in question has been exploited to allow attackers to steal cookies from Yahoo webmail users. Cookies can then be used to help attackers see the emails of victims or send emails from the hijacked account.

The hacker points out that this is a "stored XSS" which "works with all browsers". Stored XSS means that the injected code is being permanently stored on the targeted server – in this case at Yahoo. This is possible if, for example, it was stored in the input fields of a comment in a user forum which was later sent to the user without filtering. Because the XSS is on the target server, XSS filters on the browser need not be circumvented as it appears to come from the correct site. This is pointed out by the Egyptian hacker who demonstrates this in a video:



Since the script for the XSS is on Yahoo servers, Yahoo has to actively find the compromised Yahoo.com URL through which the XSS is loaded. Director of Security at Yahoo, Ramses Martinez, told Krebs that once the company had figured out the URL it could deploy code to fix the problem in a few hours.

While this seems simple and fast, it doesn't always work this way, at least not for Yahoo. Krebs refers to web sites that collect information about cross-site scripting vulnerabilities, specify whether an XSS is open or closed, and let users index them by Google PageRank. On XSSed.com he found it easy to discover several recently patched or unfixed XSS flaws on Yahoo.com or associated properties. OSVDB, the Open Source Vulnerability Database, now also indexes vulnerabilities by vendor, making this easier still.

Krebs points out that Yahoo, unlike many companies, has no bug bounty program to reward vulnerability hunters for finding problems and responsibly informing the site owners of the problem. The severity of the problem often affects the scale of the bounty which can therefore rise into the tens of thousands of dollars. It's unclear why Yahoo has not adopted such a model when competitors report good results with it.






« Yo, I’m gonna pop a cap in your... cat? [Mugshot] · Yahoo XSS exploits going for $700 · Hackers break into UN atomic agency »




Comments
comments powered by Disqus

MajorGeeks.Com » News » November 2012 » Yahoo XSS exploits going for $700

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition