exploit the possibilities

Daily Mail Unvalidated Redirect / Cross Site Scripting

Daily Mail Unvalidated Redirect / Cross Site Scripting
Posted Nov 3, 2015
Authored by Jing Wang

Various Daily Mail sites suffered from unvalidated redirect and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | bd8af27dea033a9e4e53fe5370ce1b5a

Daily Mail Unvalidated Redirect / Cross Site Scripting

Change Mirror Download
*Daily Mail Registration Page Unvalidated Redirects and Forwards & XSS Web
Security Problem*

*Website Description:*
"The Daily Mail is a British daily middle-market tabloid newspaper owned by
the Daily Mail and General Trust. First published in 1896 by Lord
Northcliffe, it is the United Kingdom's second biggest-selling daily
newspaper after The Sun. Its sister paper The Mail on Sunday was launched
in 1982. Scottish and Irish editions of the daily paper were launched in
1947 and 2006 respectively. The Daily Mail was Britain's first daily
newspaper aimed at the newly-literate "lower-middle class market resulting
from mass education, combining a low retail price with plenty of
competitions, prizes and promotional gimmicks", and was the first British
paper to sell a million copies a day. It was at the outset a newspaper for
women, the first to provide features especially for them, and as of the
second-half of 2013 had a 54.77% female readership, the only British
newspaper whose female readers constitute more than 50% of its demographic.
It had an average daily circulation of 1,708,006 copies in March 2014.
Between July and December 2013 it had an average daily readership of
approximately 3.951 million, of whom approximately 2.503 million were in
the ABC1 demographic and 1.448 million in the C2DE demographic. Its website
has more than 100 million unique visitors per month." (Wikipedia)

One of its website's Alexa rank is 93 on January 01 2015. The website is
one of the most popular websites in the United Kingdom.

The Unvalidated Redirects and Forwards problem has not been patched, while
the XSS problem has been patched.

Discover and Reporter:
Wang Jing, Division of Mathematical Sciences (MAS), School of Physical and
Mathematical Sciences (SPMS), Nanyang Technological University (NTU),
Singapore. (@justqdjing)

*(1) Daily mail Registration Page Unvalidated Redirects and Forwards Web
Security Problem*

*(1.1) Vulnerability Description:*
Daily online websites have a cyber security problem. Hacker can exploit it
by Open Redirect (Unvalidated Redirects and Forwards) attacks. During the
tests, all Daily mail websites (Daily Mail, Mail on Sunday & Metro media
group) use the same mechanism. These websites include dailymail.co.uk,
thisismoney.co.uk, and mailonsunday.co.uk.

Google Dork:
"Part of the Daily Mail, The Mail on Sunday & Metro Media Group"

The vulnerability occurs at "&targetUrl" parameter in "logout.html?" page,

*(1.2.1) *Use the following tests to illustrate the scenario painted above.

The redirected webpage address is "http://diebiyi.com/articles". Can
suppose that this webpage is malicious.

Vulnerable URLs:

POC Code:

*POC Video:*

*Blog Details:*

*(1.2.2)* The program code flaw can be attacked without user login. Tests
were performed on Microsoft IE (9 9.0.8112.16421) of Windows 8, Mozilla
Firefox (37.0.2) & Google Chromium 42.0.2311 (64-bit) of Ubuntu
(14.04.2),and Apple Safari 6.1.6 of Mac OS X v10.9 Mavericks.

These bugs were found by using URFDS (Unvalidated Redirects and Forwards
Detection System).

*(1.2) Description of Open Redirect:*
Here is the description of Open Redirect: "A web application accepts a
user-controlled input that specifies a link to an external site, and uses
that link in a Redirect. This simplifies phishing attacks. An http
parameter may contain a URL value and could cause the web application to
redirect the request to the specified URL. By modifying the URL value to a
malicious site, an attacker may successfully launch a phishing scam and
steal user credentials. Because the server name in the modified link is
identical to the original site, phishing attempts have a more trustworthy
appearance." (From CWE)

*(1.3) Vulnerability Disclosure:*
These vulnerabilities have not been patched.

*(2) Daily Mail Website XSS Cyber Security Zero-Day Vulnerability*

*(2.1) Vulnerability description:*
DailyMail has a security problem. Criminals can exploit it by XSS attacks.

The vulnerability occurs at "reportAbuseInComment.html?" page with
"&commentId" parameter, i.e.

POC Code:
src=x onerror=prompt('justqdjing')>

The vulnerability can be attacked without user login. Tests were performed
on Mozilla Firefox (34.0) in Ubuntu (14.04) and Microsoft IE (9.0.15) in
Windows 7.

*POC Video:*

*Blog Detail:*

*(2.2) What is XSS?*
"Cross-site scripting (XSS) is a type of computer security vulnerability
typically found in web applications. XSS enables attackers to inject
client-side script into web pages viewed by other users. A cross-site
scripting vulnerability may be used by attackers to bypass access controls
such as the same-origin policy. Cross-site scripting carried out on
websites accounted for roughly 84% of all security vulnerabilities
documented by Symantec as of 2007. Their effect may range from a petty
nuisance to a significant security risk, depending on the sensitivity of
the data handled by the vulnerable site and the nature of any security
mitigation implemented by the site's owner." (Wikipedia)

*(2.3) Vulnerability Disclosure:*
This vulnerability has been patched.

Blog Details:

Jing Wang,
Division of Mathematical Sciences (MAS),
School of Physical and Mathematical Sciences (SPMS),
Nanyang Technological University (NTU), Singapore.

Login or Register to add favorites

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    6 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By