Members
  • Total Members: 14176
  • Latest: toxxxa
Stats
  • Total Posts: 43035
  • Total Topics: 16219
  • Online Today: 6022
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)









Author Topic: New worm spread across Twitter - "onMouseOver" issue  (Read 3588 times)

0 Members and 2 Guests are viewing this topic.

Samker

  • SCF Administrator
  • *****
  • Posts: 7528
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum
New worm spread across Twitter - "onMouseOver" issue
« on: 22. September 2010., 18:59:13 »


The online world was all aflutter yesterday with news of a worm spreading through Twitter. The "onMouseOver" issue--which presented pop-up boxes and redirected users to porn sites--was quickly handled by Twitter, but the events that led up to it hold some valuable lessons for IT.

A blog post from the official Twitter blog explains the worm incident in more detail. "Early this morning, a user noticed the security hole and took advantage of it on Twitter.com. First, someone created an account that exploited the issue by turning tweets different colors and causing a pop-up box with text to appear when someone hovered over the link in the Tweet. This is why folks are referring to this an "onMouseOver" flaw -- the exploit occurred when someone moused over a link. Other users took this one step further and added code that caused people to retweet the original Tweet without their knowledge": http://blog.twitter.com/

The flaw in question was a hole that allowed cross-site scripting. Cross-site scripting vulnerabilities allow attackers to insert code from untrusted or malicious Web sites in the context of another--in this case Twitter. The Twitter flaw enabled users to submit JavaScript code as plain text within a tweet, and have that code be executed by the viewing browser.

There is nothing all that mystical about cross-site scripting (XSS) vulnerabilities. In terms of Web attacks, XSS is fairly common and doesn't require any significant skill. IT admins and Web developers should already be aware of the potential risks and should be inspecting Web code to ensure such holes aren't left open.

That brings us to the lesson part of the Twitter incident. The fact is, Twitter did know about the XSS hole. In fact, Twitter knew a month prior to this worm incident, and actually patched the hole to prevent attackers from exploiting it.

If that is the case, how was the XSS hole still open? Well, it wasn't "still" open, it was open again. Twitter explains, "We discovered and patched this issue last month. However, a recent site update (unrelated to new Twitter) unknowingly resurfaced it."

Therein lies the lesson. It is an old one, but obviously worth reiterating in light of the Twitter worm incident. IT needs to have effective patch management and change control procedures in place--in addition to secure coding practices--to ensure that subsequent patches, changes, or modifications to servers or Web sites don't expose new holes, or--as happened with Twitter--re-open previously identified and patched vulnerabilities.

Thankfully, the Twitter worm was more mischievous than malicious, and the nature of the Twitter community led to quick discovery and resolution of the issue. But, a similar XSS flaw on your Web server might not be so lucky, so learn from Twitter's mistake and be more vigilant.

(PCW)

Samker's Computer Forum - SCforum.info

New worm spread across Twitter - "onMouseOver" issue
« on: 22. September 2010., 18:59:13 »

bugmenot

  • SCF Member
  • **
  • Posts: 33
  • KARMA: 2
Re: New worm spread across Twitter - "onMouseOver" issue
« Reply #1 on: 19. October 2010., 10:18:51 »
i am not using social sites like that for security

amitraina

  • SCF Member
  • **
  • Posts: 86
  • KARMA: 14
Re: New worm spread across Twitter - "onMouseOver" issue
« Reply #2 on: 21. October 2010., 05:48:33 »
i am also not using social sites

Samker's Computer Forum - SCforum.info

Re: New worm spread across Twitter - "onMouseOver" issue
« Reply #2 on: 21. October 2010., 05:48:33 »

 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising