Researcher Uncovers XSS Flaws In Twitter and Google Calendar


More flaws discovered in Twitter and Google Calender during the holiday season.

Once again XSS flaws have been discovered in popular web apps, but at least they were reported and not used nefariously this time.

Fixes have been issued promptly by both Google and Twitter so there is not much cause for concern this time round. But you can imagine if Nir Goldshlager could uncover these flaws – how many more are there

A security researcher uncovered some holes in Google Calendar and Twitter that may allow an attacker to steal cookies and user session IDs.

In a proof of concept, researcher Nir Goldshlager demonstrated cross-site scripting (XSS) vulnerabilities in Google Calendar and Twitter that he said could be used to steal cookies and session IDs. He also uncovered an HTML injection issue affecting Google Calendar as well that he said could be used to redirect a victim to an attack site any time the user viewed his or her Google Calendar agenda events.

Twitter issued a fix for the issue Dec. 30, and Google stated Dec. 31 it would examine the input validation process for the Google Calendar field to help address the situation.

XSS attack have become increasingly prevalent in the last few years and the power of harnessing them well is tarted to become more obvious.

When XSS attacks first emerged they were thought of as trivial, but as times have changed there is so much more information and valuable data stored online stealing someones login credentials can be enough to get a worthy stash of credentials.

According to Goldshlager, a penetration testing expert with Avnet Information Security Consulting in Israel, the cross-site scripting vulnerability can be exploited if a victim adds malicious code to his quick add post calendar.

“When the victim … [adds] this malicious code, his cookies [and] session ID will be stolen and will be sent to the attacker site,” he said. “Then the attacker will be able to get full control of the victim’s Google accounts like: Google Calendar account, Google Groups, iGoogle, etc.”

Goldshlager also demonstrated that the HTML injection vulnerability could be used to log a user out of his Google account, something the Google spokesman said “is of negligible security impact” and “can be avoided by not clicking on the link.”

“They should fix this immediately because an attacker can redirect a victim to any site that he wants, and [with] the XSS issue an attacker can steal the victim’s cookies and get full control of his accounts,” the researcher said.

At least the flaws were fixed quickly and disclosed responsibly. It’s an interesting start for the new year and honestly there’s been hardly any news for the past 3 days.

Let’s hope for an interesting year ahead and plenty of new interesting stories and tools.

Oh and of course, Happy New Year!

Source: eWeek

Posted in: Exploits/Vulnerabilities, Web Hacking

, , , ,


Latest Posts:


HiddenWall - Create Hidden Kernel Modules HiddenWall – Create Hidden Kernel Modules
HiddenWall is a Linux kernel module generator used to create hidden kernel modules to protect your server from attackers.
Anteater - CI/CD Security Gate Check Framework Anteater – CI/CD Security Gate Check Framework
Anteater is a CI/CD Security Gate Check Framework to prevent the unwanted merging of filenames, binaries, deprecated functions, staging variables and more.
Stardox - Github Stargazers Information Gathering Tool Stardox – Github Stargazers Information Gathering Tool
Stardox is a Python-based GitHub stargazers information gathering tool, it scrapes Github for information and displays them in a list tree view.
ZigDiggity - ZigBee Hacking Toolkit ZigDiggity – ZigBee Hacking Toolkit
ZigDiggity a ZigBee Hacking Toolkit is a Python-based IoT (Internet of Things) penetration testing framework targeting the ZigBee smart home protocol.
RandIP - Network Mapper To Find Servers RandIP – Network Mapper To Find Servers
RandIP is a nim-based network mapper application that generates random IP addresses and uses sockets to test whether the connection is valid or not with additional tests for Telnet and SSH.
Nipe - Make Tor Default Gateway For Network Nipe – Make Tor Default Gateway For Network
Nipe is a Perl script to make Tor default gateway for network, this script enables you to directly route all your traffic from your computer to the Tor network.


One Response to Researcher Uncovers XSS Flaws In Twitter and Google Calendar

  1. brain[pillow] January 14, 2010 at 4:36 am #

    Here is another Passive XSS on twitter, found by me :)

    http://search.twitter.com/search?q=%26%2339%3B)%3Balert(%26%2339%3Bxek%26%2339%3B)%3B%2F%2F

    (& click on “Tweet these results”)

    but it is almoust useless(