

Can we ever solve the piracy issue?
January 24, 2011
Internet Explorer CSS 0day
February 4, 2011
Can we ever solve the piracy issue?
January 24, 2011
Internet Explorer CSS 0day
February 4, 2011Exploit Database recently found an interesting vulnerability regarding Godaddy which is a leading domain and website hosting provider. The Godaddy workspace XSS vulnerability provides liberty to the attacker to send malicious JavaScript to the victim resulting in stealing of cookies and other malicious activities. This means that if you are using web interface of Godaddy workspace, a malicious attacker can obtain your session information and can even login to your account interestingly without using any credentials.
Following are the steps for exploiting Godaddy XSS vulnerability:
- Attacker logs in to the Godaddy workspace interface.
- Composes an email directed towards the targeted user.
- Uses firebug to craft malicious link using JavaScript in the email. This JavaScript is capable of capturing victim’s cookie (session id) and sending it to attacker controlled web server.
- The email is sent to the targeted user (victim) who also uses Godaddy web interface.
- The victim receives the email and opens it.
- As soon as the email is opened the victim’s session id is obtained by the malicious JavaScript and sent to the attacker controlled web server.
- To make sure that there are no credentials required to exploit this vulnerability the attacker logs out from his account and clear the cache and cookies.
- The attacker receives victim’s cookie (session id) from web server log and replays it using Live HTTP Headers (Firefox addon) to Godaddy.
- The attacker successfully logs into the victim’s Godaddy web interface.