India Times Cross Site Scripting

Credit: Wang Jing
Risk: Low
Local: No
Remote: Yes

*All Links in **Two Topics of Indiatimes ( <>) Are Vulnerable to XSS (cross site scripting) Attacks * *Domain Description:* "According to the Indian Readership Survey (IRS) 2012, the Times of India is the most widely read English newspaper in India with a readership of 7.643 million. This ranks the Times of India as the top English daily in India by readership." ( <>) *Vulnerability description:* The vulnerability occurs at Indiatimes's URL links. Indiatimes only filter part of the filenames in its website. All URLs under Indiatimes's "photogallery" and "top-llists" topics are affected. Indiatimes uses part of the links under "photogallery" and "top-llists" topics to construct its website content without any checking of those links at all. This mistake is very popular in nowaday websites. Developer is not security expert. The vulnerability can be attacked without user login. Tests were performed on Firefox (26.0) in Ubuntu (12.04) and IE (9.0.15) in Windows 7. *POC Codes:*"><img src=x onerror=prompt('justqdjing')>"><img src=x onerror=prompt('justqdjing')>"><img src=x onerror=prompt('justqdjing')>"><img src=x onerror=prompt('justqdjing')> *POC Video:* *Blog Details:* The vulnerabilities were reported to Indiatimes in early September, 2014. However they are still unpatched. Reported by: Wang Jing, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore.


Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019,


Back to Top