Yahoo fixes a severe security vulnerability in Yahoo Mail
Security researcher uncovers new flaw in Yahoo Mail
A Yahoo Mail bug woud have allowed hackers to read people's email or create a virus infecting accounts, according to a security researcher who flagged the flaw to the company.
Yahoo paid Jouko Pynnonen of Klikki Oy, Finland, $10,000 for privately disclosing the flaw through its HackerOne bug bounty.
According to Pynnonen, the flaw was a cross-site scripting (XSS) attack and allowed an attacker to read a victim's email or create a virus infecting Yahoo Mail accounts, among other things.
"The attack required the victim to view an email sent by the attacker. No further interaction (such as clicking on a link or opening an attachment) was required," Pynnonen explained, adding that the flaw was similar to last year's Yahoo Mail bug, which similarly let an attacker compromise a user's account.
"I decided to take another shot at it," he said. "I felt that finding another bug in basic HTML filtering seemed unlikely. However in the email composing view I noticed various attachment options to which I didn't give much attention last year."
Pynnonen composed an email containing different kinds of attachments and sent it to an external mailbox so he could inspect the 'raw' HTML this kind of email contains.
"I tried creating an email with "abusive" data-* attributes and bingo!, found a pathological case pretty quickly."
By inserting a quote symbol in the data-url value, he caused a broken HTML in the share button.
"As long as the URL pointed to a white-listed website such as YouTube, it was not further sanity checked or encoded. The value was used as is for setting a div innerHTML to create the button."
The flaw was reported to Yahoo Security via HackerOne on 12 November and fixed on 29 November. It's not the only time Yahoo Mail has been in the news this year, after a hacker offered the details of 200 million Mail accounts on the dark web in August.
What you need to know about migrating to SAP S/4HANA
Factors to assess how and when to begin migrationDownload now
Your enterprise cloud solutions guide
Infrastructure designed to meet your company's IT needs for next-generation cloud applicationsDownload now
Testing for compliance just became easier
How you can use technology to ensure compliance in your organisationDownload now
Best practices for implementing security awareness training
How to develop a security awareness programme that will actually change behaviourDownload now