Tuesday, April 9, 2013
XSS Vulnerability on Microsoft Security Response Center, found by Moroccan Researcher
POC Screen Shot:
The Security researcher told The Hackers Post that he reported XSS flaw to Microsoft. He got immediate response with appreciation and vulnerability fixed by them.
Microsoft Security Team immediately patched the XSS flaw which was reported by me. I have reported many others vulnerabilities which are not fixed yet![#] - Vulnerability Type:
XSS (Cross Site Scripting)
[#] - Vendor homepage:
http://www.microsoft.com
[#] - Tested on:
Windows 7 64 bit Firefox browser (but should have worked on other OS and browsers (not sure about IE))
[#] - Vulnerability Status:
FIXED [Critical]
[#] - Found By:
Omary Lhoussine
[#] - Vulnerable link (POC):
http://www.microsoft.com/security/msrc/report/disclosure.aspx#" onload="alert(document.cookie)See Also: Amazon vulnerable to XSS flaw found by Security Researcher
The XSS vulnerability can cause multiple damages like embedding javascript, VBScript, ActiveX, HTML, or Flash into a vulnerable dynamic page and to affect the user. A basic guide on the topic of Cross Site Scripting (XSS) can be found here.
The Security Researcher also listed on Microsoft Security Acknowledgement page .
Categories : Bug Bounty Program , Cross Site Scripting , Microsft Security Researcher , Moroccan Hackers , Moroccans , Security Researchers , XSS
About Author:
Nauman Ashraf is a security researcher, developer and blogger. He is Founder and Chief Editor of The Hackers Post. Follow him on
Twitter
0 Responses to “ XSS Vulnerability on Microsoft Security Response Center, found by Moroccan Researcher ”
Post a Comment