When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Security Researcher Goes Public with MSN and Amazon Flaws

Frustrated with what he calls a lack of response from Microsoft and Amazon.com, a security researcher has gone public with details of flaws on the two companies' Web sites.

The flaws could be used by attackers to steal "cookie" data files that would allow them to access Amazon.com and MSN accounts, or to display a fake login page that could be used in phishing attacks, according to Yash Kadakia, the independent security researcher who discovered the flaws.

Although the cross-site scripting flaws he discovered are generally considered to be low-risk problems, Kadakia's attack involves a technique called CRLF (Carriage Return Line Feed) injection, which can be used in a more serious and widespread attack, he said.

Kadakia said he first notified Microsoft of the problem about a year ago. But he said he was not taken seriously until late last week, when he posted screen shots of the flaw being exploited on his Web site.

The Amazon.com flaw was discovered in December, but after some initial discussions with the Web retailer, the vulnerability remained unpatched, Kadakia said. "The conversations got dropped off somewhere," he said.

A spokesman for Microsoft's public relations agency said the flaws were now being investigated. Amazon.com executives were unable to comment for this story.

Though Microsoft has made much of its focus on security, the company appears to be slower at dealing with security issues relating to its Web properties than with its software products, said Stefano Zanero, the co-founder and chief technology officer at security consultancy Secure Network SRL.

View: Full Article
News source: PCWorld

Report a problem with article
Next Article

Nullsoft Installation System 2.18

Previous Article

D-Link Leaves Critical Hole Open for 5 Months, And Counting