The Tech Herald

XSS flaw discovered on Twitter

by Steve Ragan - Jun 25 2010, 14:00

Praetorian Prefect has a write-up focused on a persistent Cross-Site Script (XSS) flaw discovered on Twitter by a user known only as '0wn3d_5ys'. The discovery, while first reported via the Prefect blog, was made on June 21.

The flaw itself resides in the application name field within the form used to register a new Twitter application. For example, when you see a post on Twitter that came from TweetDeck, the post tells you so, and lists TweetDeck by name.

Last August, James Slater discovered an XSS flaw in the Twitter Application form within the field used to register the URL used by the application. This is what will send you to the TweetDeck website, if you stick with our example and click the name of the application.

“Imagine that for a moment. Simply by seeing one of these tweets, code can be run inside your browser impersonating you and doing anything that your browser can do,” Slater explained at the time, pointing out why the XSS flaw was something serious.

“Perhaps it may simply redirect you to a pornographic website? Or maybe delete all of your tweets? Send a message to all of your friends? Maybe it would delete all of your followers, or worse still, just send the details needed to log in to your account off to another website for someone to use at their leisure,” he added.

Twitter said it had fixed the flaw Slater disclosed, but when he checked, it turned out that all Twitter did was prevent spaces from being added to the Application Website field where the XSS was first discovered.

This was seen as a partial fix at best, leading to the claim from Slater that Twitter completely missed the point of the disclosure.

In May, Twitter was forced to react and close a bug that allowed anyone to be forced to follow another user by sending a message with the word "accept" followed by the Twitter username without the @ symbol (i.e., accept SteveD3).

Earlier this afternoon, The Tech Herald reached out to Twitter to check on the status of the recent XSS flaw - It said it is aware of the issue, and has fixed it for new applications. From there, the micro-blogging service said it is still working to fix the flaw for all applications.

“This might be Twitter’s first serious cross site scripting vulnerability since the beginning of this year. Twitter has to correct this quickly as it was public knowledge before this post, and has been for days,” the Prefect blog noted.

More details from the Praetorian Prefect can be viewed here.

Around the Web

Comment on this Story

comments powered by Disqus

From Autosaur.com

Shelby GT350 Mustang Pictures

We have added a bunch of pictures of the all-new Shelby GT350 Mustang from Ford. The ne...

All-new Shelby GT350 Mustang

Ford have revealed details of the new Shelby GT350 Mustang. First introduced in 1965 the new...

Best Cars To Buy In 2015

Leading vehicle research company Kelley Blue Book has released its list of the best cars to ...

A.C. Milan Take On Audi R8

Five A.C. Milan stars take on an Audi R8 in a game of street soccer in a new ad for Toyo Tir...

Jaguar 2016 F-TYPE R Coupe All-Wheel-Drive

Jaguar has unveiled the 2016 F-TYPE R Coupe, the first to feature all-wheel-drive. The 2016 ...