All Links in Two Topics of Indiatimes (indiatimes.com) Are Vulnerable to XSS (cross site scripting) Attacks

All Links in Two Topics of Indiatimes (indiatimes.com) Are Vulnerable to XSS (cross site scripting) Attacks 



Domain Description:
“According to the Indian Readership Survey (IRS) 2012, the Times of India is the most widely read English newspaper in India with a readership of 7.643 million. This ranks the Times of India as the top English daily in India by readership.” (en.Wikipedia.org)

Vulnerability description:
The vulnerability occurs at Indiatimes’s URL links. Indiatimes only filter part of the filenames in its website. All URLs under Indiatimes’s “photogallery” and “top-llists” topics are affected.
Indiatimes uses part of the links under “photogallery” and “top-llists” topics to construct its website content without any checking of those links at all. This mistake is very popular in nowaday websites. Developer is not security expert.
The vulnerability can be attacked without user login. Tests were performed on Firefox (33.0) in Ubuntu (14.04) and IE (8.0. 7601) in Windows 7.





POC Codes:
http://www.indiatimes.com/photogallery/“><img src=x onerror=prompt(‘justqdjing’)>
http://www.indiatimes.com/top-lists/“><img src=x onerror=prompt(‘justqdjing’)>
http://www.indiatimes.com/photogallery/lifestyle/“><img src=x onerror=prompt(‘justqdjing’)>
http://www.indiatimes.com/top-lists/technology/“><img src=x onerror=prompt(‘justqdjing’)>




POC Video:
The vulnerabilities were reported to Indiatimes in early September, 2014. However they are still unpatched.
Reported by:
Wang Jing, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore.

Related Articles:
http://www.techworm.net/2014/12/times-india-website-vulnerable-cross-site-scripting-xss-attacks.html
http://seclists.org/fulldisclosure/2014/Nov/91
http://www.tetraph.com/blog/web-security/times-of-india-website-vulnerable-to-cross-site-scripting-xss-attacks/
https://cxsecurity.com/issue/WLB-2014120004
http://vulnerabilitypost.wordpress.com/2014/12/04/all-links-in-two-topics-of-indiatimes-indiatimes-com-are-vulnerable-to-xss-cross-site-scripting-attacks/
http://whitehatpost.blog.163.com/blog/static/2422320542014114750445/#
http://user.qzone.qq.com/2519094351/blog/1417685447

Google Covert Redirect Vulnerability Based on Googleads.g.doubleclick.net

Google Covert Redirect Vulnerability Based on Googleads.g.doubleclick.net

Bypass Google Open Redirect Filter Based on Googleads.g.doubleclick.net
— Google Covert Redirect Vulnerability Based on Googleads.g.doubleclick.net

The vulnerability exists at “Logout?” page with “&continue” parameter, i.e.
The vulnerability can be attacked without user login. Tests were performed on Firefox (26.0) in Ubuntu (12.04) and IE (9.0.15) in Windows 7.

(1) When a user is redirected from Google to another site, Google will check whether the redirected URL belongs to domains in Google’s whitelist (The whitelist usually contains websites belong to Google), e.g.
If this is true, the redirection will be allowed.
However, if the URLs in a redirected domain have open URL redirection  vulnerabilities themselves, a user could be redirected from Google to a vulnerable URL in that domain first and later be redirected from this vulnerable site to a malicious site. This is as if being redirected from Google directly.
One of the vulnerable domain is,
googleads.g.doubleclick.net (Google’s Ad System)

(2) Use one webpage for the following tests. The webpage address is “http://www.inzeed.com/kaleidoscope“. We can suppose that this webpage is malicious.
Vulnerable URL:

POC:

POC Video:
Reporter:
Wang Jing, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore.
Related Articles: