mailing list archives
Cookie-stealing XSS on msn.com
From: SecuriTeam Assisted Disclosure <SPAD () securiteam com>
Date: Tue, 25 Jul 2006 11:56:30 +0300
A cookie-stealing Cross-site scripting vulnerability was found on MSN's
website (msn.com). Using this vulnerability, an attacker could potentially
gain access to a victim's Inbox.
This vulnerability was discovered by: tontonq and Nir Goldshlager.
SecuriTeam was asked to assist the researchers with contacting Microsoft.
Reported to vendor: 18th of July, 2006.
Vendor response: 18th of July, 2006.
Resolved: 19th of July, 2006.
Public disclosure: 25th of July, 2006.
A cookie-stealing XSS issue was discovered on MSN's web site.
Example of the issue:
That error page gets the CB variable into a script tag.
If John Doe wanted to steal a victim's cookie, he could use this example
As such, if for example, s.php stores the cookie variable somewhere, the
attacker can set that stored cookie and "jump" to the Inbox.
For illustration, an older similar issue from 2005 on hotmail.com discovered
by Alex de Vries can be found here:
About SecuriTeam's Assisted Disclosure
Many researchers do not have the time, energy or inclination to deal with
reporting a vulnerability to vendors.
SecuriTeam is here to help. If you want us to handle the logistics of
contacting and following up with the vendor, making sure the problem is
fixed, contact: STAD () SecuriTeam com
Our end goal is Full Disclosure, preferably in coordination with the vendor,
without exposing the researcher to unnecessary risk.
We do not believe in hiding or selling vulnerabilities. Never had, never will.
All credit will be properly attributed. If asked we can act as proxies,
keeping your privacy and anonymity.
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Cookie-stealing XSS on msn.com SecuriTeam Assisted Disclosure (Jul 25)