Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: [Argeniss] Alert - Yahoo! Webmail XSS
From: Cesar <cesarc56 () yahoo com>
Date: Tue, 18 Apr 2006 07:32:58 -0700 (PDT)

It's a Yahoo! Mail XSS vulnerability.
The XSS exploit was really cool, I could identify that
something was wrong because IE status bar displayed
for a couple of seconds a weird URL, address bar
didn't change (MS please change this behaviour!), but
you can be sure that with this exploit 99% of people
would bite. Yahoo! Mail once in a while will ask you
to re login again so it's not so anormal. The exploit
could have been crafted better if it have displayed
some message about session time out or something and
not just redirecting to login page without any
I guess they wanted my password for trying on other


Morning Wood wrote: 
reflecting on this... 

the offending url you give is
which contains a fake yahoo login ( for webmail ) 
(( and other exploits embedded within the site )) 

you state this is a Yahoo Email vulnerability. 

stop me if im wrong... 
why would anyone be vulnerable to a Yahoo login
redirect phish, if in 
fact they are already logged in to read the mail in
the first place. 

Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]