Jump to content
b3hr0uz

XSS in 100+ Y! Domains. (one vulnerability)

Recommended Posts

Hello. Normally I don’t write a write-up for XSS vulnerability; however this XSS was a bit different because it affects 100s of Yahoo! subdomains. After my SQL Injection on the HK sub-domains, I decided to actually start focusing on the more major sub-domains of Yahoo, and as a result I was able to XSS quite a few of Yahoo’s services.

Here are a few to name:

Travel

Food

Autos

Security

Developer

News

Weather

Shine

Shopping

Celebrity

TV

Voices

Homes

Music

Finance

Cricket

The list doesn’t stop there. This vulnerability affects all of Yahoo’s services where a user is able to make a comment including the list above in other languages as well.

Now the question is: Was this a self XSS or did it get stored somewhere and get presented to other users? The answer to that question is… BOTH!

The Research:

Now how is this possible and what was the process for all of this?

So in the beginning of the research I decided to poke around the “Tech” services of Yahoo, found a comment section and decided to comment on thispost:

and give it the following string:

“><img src=x onerror=prompt(1);>

Which left with me the execution of an IMG ( “> ) tag but no prompt. So I decided to try a few more other strings and that led me onto using HTML entities and changing it to the following format:

"><img src=x onerror=confirm(1);>

Now what? Voila! We get the famous confirm(1) to popup:

But how does this explain the XSS on all of Yahoo services listed and more?! Well the tech blog wasn’t the only place that had a comment section. Many of Yahoo’s services have a comment section. Some use the same exact comment platform as the one on “Tech” and “Travel” and some have a different comment platform, like the one on Sports, weather, and finance, BUT they both store the comments in a tab under “My Comments” -> “All Comments” and you will see the stored self XSS there. The “Self XSS” could also be engineered to be seen in the “Most recent” or “Most discussed” topics to execute an run the specific XSS string.

Why is this a critical vulnerability?

(Attack Vector)

The websites which use the same platform as the attached video (same as the one on the tech, food, and the travel services) will store the string and present it to anyone visiting the post containing the comment. So with a sample bot and as easy copy/paste, we could post a comment containing a malicious code to hijack the visitors/emails’ session/cookie. We could also simply target a specific user by linking them to a post containing a comment with a malicious code by the attacker.

Who’s affected by this Vulnerability?

Thousands (if not millions) of users use Yahoo and Yahoo Mail in 65 countries supported by Yahoo. Each Yahoo International/country domain (Such as Hong Kong, Taiwan, Netherlands, India) uses one of the 2 comment platforms in their daily blog such as (news, food, tech,sports, and etc) which get thousands of Yahoo and Non-Yahoo member visitors daily and could have been a target to this vulnerability.

Demo:

Here’s a short video describing the attack just to show a few other sub-domains that were effected by this vulnerability:

https://www.youtube.com/watch?v=3E80IDj0X_E

Behrouz Sadeghipour

5/25/2014

Timeline:

04/29/2014 – Initial Report

04/29/2014 – Triaged

04/30/2014 – Comments section disabled on Y! Services

05/02/2014 – Patched but no update

05/16/2014 – Resolved and granted permission to publish

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...