Page 1 of 1

CROSS-SITE SCRIPTING VULNERABILITY IN YAHOO E-MAIL

Posted: Fri Jan 11, 2013 7:00 pm
by Switchs
Hi, everytime I go to log into my yahoo email I get a pop up saying noscript filtered a potential cross-site scripting (xss) attempt yahoo.com, is this something I shouldn't ignore? any help is greatly appreciated

Re: Noscript Filtered cross site scripting?

Posted: Fri Jan 11, 2013 9:23 pm
by therube
Open Error Console (Ctrl+J), copy the contents of the associated XSS message from there & paste here.

Re: Noscript Filtered cross site scripting?

Posted: Sat Jan 12, 2013 7:20 pm
by Switchs
Alright I found 2 entries but when I submit this post its saying I'm trying to post spam, I guess its because the second entry is huge so I'm only posting the first entry.

[NoScript XSS] Sanitized suspicious request. Original URL [http://hsrd.yahoo.com/_ylt=Ah5s964R1wgt ... o.com%252F] requested from [http://www.yahoo.com/]. Sanitized URL: [http://hsrd.yahoo.com/_ylt%20Ah5s964R1w ... 5330013285].

Re: Noscript Filtered cross site scripting?

Posted: Mon Jan 14, 2013 5:31 am
by Tom T.
Putting the entries inside Code tags should help with the spam filter.

However, there is a known cross-site scripting vulnerability in Yahoo e-mail. Yahoo claims to have fixed it, but security researchers beg to differ.

I don't get this XSS message, because I tighten Yahoo permissions versus the default whitelist.
The default whitelist includes:

yahoo.com
yimg.com
yahooapis.com


I delete yahoo.com and yahooapis.com, and add this tighter whitelist entry:

mail.yahoo.com

-- allowing only the mail sub-domain versus the entire Yahoo universe.

and add

ymail.com

which at some time was needed for handling attachments. It may or may not be now -- they keep changing how they handle attachments. :roll:

Since I don't wish to show the "userstatus", messenger, etc., yahooapis seems to be needed only to edit account settings, address book, etc. So I Temp-Allow it for those rare occasions, then Revoke temporary permissions afterward.

This worked fine up until a week or two ago, when it became impossible to sign in to Yahoo mail without also temp-allowing
yahoo.com

So I T-A it, log in, then revoke it. Once logged in, the revoking of yahoo.com does not seem to affect anything.

A bit of a PITA, but it seems to prevent not only the exploit, but also the NoScript message about blocking it. Let's all be thankful to NS's excellent XSS protection for (apparently) preventing us from becoming victims of this widespread attack. Too bad that Yahoo can't seem to secure their site.

Changed the topic title to reflect that this is a known vulnerability.

Re: CROSS-SITE SCRIPTING VULNERABILITY IN YAHOO E-MAIL

Posted: Mon Jan 14, 2013 6:30 am
by Switchs
Awesome thanks, I removed all my yahoo entries and just kept/added yimg.com, mail.yahoo.com, and ymail.com like you said and I'm not getting the warning pop up and the site is working fine. thanks again

Re: CROSS-SITE SCRIPTING VULNERABILITY IN YAHOO E-MAIL

Posted: Mon Jan 14, 2013 6:56 am
by Tom T.
Switchs wrote:Awesome thanks, I removed all my yahoo entries and just kept/added yimg.com, mail.yahoo.com, and ymail.com like you said and I'm not getting the warning pop up and the site is working fine. thanks again
You're quite welcome.

This vulnerability affects all browsers AFAIK, so please help spread the word to everyone you know, or in any relevant forums:
Firefox or Seamonkey plus NoScript is the best protection available for this issue -- and for many others, known or future. :)