Jump to content
Byte-ul

Yahoo vulnerability allows Hacker to delete 1.5 million records from Database

Recommended Posts

hacking-yahoo-password-database.png

Yahoo! The 4th most visited website on the Internet has been found vulnerable multiple times, and this time a hacker has claimed to spot a critical vulnerability in the Yahoo! sub-domain 'suggestions.yahoo.com', which could allow an attacker to delete the all the posted thread and comments on Yahoo's Suggestion Board website.

Egyptian Cyber Security Analyst, 'Ibrahim Raafat', found and demonstrated 'Insecure Direct Object Reference Vulnerability' in Yahoo's website on his blog.

Exploiting the flaw escalates the user privileges that allow a hacker to delete more than 365,000 posts and 1,155,000 comments from Yahoo! Database. Technical details of the vulnerability are as explained below:

Deleting Comments: While deleting his own comment, Ibrahim noticed the HTTP Header of POST request, i.e.

prop=addressbook&fid=367443&crumb=Q4.PSLBfBe.&cid=1236547890&cmd=delete_comment

Where parameter 'fid' is the topic id and 'cid' is the respective comment ID. While testing, he found changing the fid and cid parameter values allow him to delete other comments from the forum, that are actually posted by another user.

Deleting Posts: Next, he also tested post deletion mechanism and found a similar loophole in that. A normal HTTP Header POST request of deleting a post is:

POST cmd=delete_item&crumb=SbWqLz.LDP0

He found that, appending the fid (topic id) variable to the URL allows him to delete the respective post, that was not posted by himself i.e.

POST cmd=delete_item&crumb=SbWqLz.LDP0&fid=xxxxxxxx

Ibrahim has reported the flaw to Yahoo Security team and also provided a Video Demonstration, as shown below:

A potential attacker with little knowledge of programming could write an automated script to delete all the comments and posts using 'for loop' or 'while loop'.

The vulnerability hunter claimed that he had received the Bug Bounty for reporting this security flaw to yahoo and which now has been fixed by the company.

  • Upvote 1
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...