Full Disclosure mailing list archives

Re: yahoomail dom based xss vulnerability


From: pratul agrawal <pratulag () yahoo com>
Date: Tue, 15 Jun 2010 21:19:47 -0700 (PDT)

Thanks Brother,

                      See, how this occurred, Basically in most of the cases Developers  Simply design a APIs and when 
the client request for any page this APIs gets Stored in the Client side. its main task is to takes the user input and 
shows the result immediately  to the client without sending request to the server. so when this type of APIs is 
vulnerable to XSS this is called the DOM based XSS. 

Now in this case, when we click on [New Folder] for creating any new folder and provide any javascript, it directly 
took by the API stored in the client side when the inbox page is load in the client side in yahoomail, and get 
reflected. 

that's all the story Bro, hope you understand what i really want to say.

Thanks,
Pratul Agrawal  

--- On Tue, 15/6/10, Benji <me () b3nji com> wrote:

From: Benji <me () b3nji com>
Subject: Re: [Full-disclosure] yahoomail dom based xss vulnerability
To: "pratul agrawal" <pratulag () yahoo com>
Cc: "skg102 () gmail com" <skg102 () gmail com>, "full-disclosure () lists grok org uk" <full-disclosure () lists grok 
org uk>, "security () yahoo com" <security () yahoo com>, "info () cert-in org in" <info () cert-in org in>
Date: Tuesday, 15 June, 2010, 9:57 AM

Sup bro 
I waz checkin owt ur javascriptz skriptz and waz wonderin if u cud explain how diz shiz werks.
Peaze. 

Sent from my iPhone
On 15 Jun 2010, at 09:18, pratul agrawal <pratulag () yahoo com> wrote:

Its working Bro.  I think u had done some mistakes so u try it again with check that javascript execution feature is 
enable in your browser. and bro for execution of script it is must to use proper syntax that contain special 
characters. just put "><script>alert(123)<script>  in the New Folder field comes in the Move button and you will saw a 
pop up message with 123 reflected.

Have a nice time bro,
Pratul Agrawal

--- On Tue, 15/6/10, ㅤ ㅤRockey <skg102 () gmail com> wrote:

From: ㅤ ㅤRockey <skg102 () gmail com>
Subject: Re: [Full-disclosure] yahoomail dom based xss
 vulnerability
To: 
Cc: full-disclosure () lists grok org uk, security () yahoo com, info () cert-in org in
Date: Tuesday, 15 June, 2010, 5:10 AM


Tried reproducing on yahoo mail
both on the classic and new one . Error message i got in both cases were

"Sorry, but your folder name has prohibited characters (please use letters, numbers, dashes, and underscores). Please 
fix it and try again."


Cheers,
Rockey

--
It's all about Hacking and Security

http://h4ck3r.in/



-----Inline Attachment Follows-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: