Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Re: [Full-disclosure] [Argeniss] Alert - Yahoo! Webmail XSS
From: Cesar (cesarc56yahoo.com)
Date: Tue Apr 18 2006 - 09:32:58 CDT
It's a Yahoo! Mail XSS vulnerability.
The XSS exploit was really cool, I could identify that
something was wrong because IE status bar displayed
for a couple of seconds a weird URL, address bar
didn't change (MS please change this behaviour!), but
you can be sure that with this exploit 99% of people
would bite. Yahoo! Mail once in a while will ask you
to re login again so it's not so anormal. The exploit
could have been crafted better if it have displayed
some message about session time out or something and
not just redirecting to login page without any
I guess they wanted my password for trying on other
Morning Wood wrote:
> reflecting on this...
> the offending url you give is
> which contains a fake yahoo login ( for webmail )
> (( and other exploits embedded within the site ))
> you state this is a Yahoo Email vulnerability.
> stop me if im wrong...
> why would anyone be vulnerable to a Yahoo login
redirect phish, if in
> fact they are already logged in to read the mail in
the first place.
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/