Shop OBEX P1 Docs P2 Docs Learn Events
eBay has no plans to fix ‘severe’ vulnerability that could infect users with malware — Parallax Forums

eBay has no plans to fix ‘severe’ vulnerability that could infect users with malware

http://thenextweb.com/insider/2016/02/03/ebay-has-no-plans-to-fix-severe-vulnerability-that-could-infect-users-with-malware/

In mid-December, researchers at security firm Check Point Software reported a security vulnerability to EBay. This vulnerability is an appropriately-named (JSF**K) exploit that bypasses restrictions by eBay on how it handles hosted JavaScript within its listings.
Using JSF**K, attackers can bypass this safeguard and run malicious code that targets eBay’s users.

http://blog.checkpoint.com/2016/02/02/ebay-platform-exposed-to-severe-vulnerability/
To exploit this vulnerability, all an attacker needs to do is create an online eBay store. In his store details, he posts a maliciously crafted item description. eBay prevents users from including scripts or iFrames by filtering out those HTML tags. However, by using JSF**k, the attacker is able to create a code that will load an additional JS code from his server. This allows the attacker to insert a remote controllable JavaScript that he can adjust to, for example, create multiple payloads for a different user agent.

Comments

  • If ebay have no plan to fix after they found that vulnerability issue then, they have permission to let this software in their site.
  • I should add this to the Official JavaScript war thread as evidence of how broken it is. The attack vector uses obfuscated JavaScript via the JSF**k tool to produce code that bypasses sanitation checks because it doesn't look like code.
Sign In or Register to comment.