A self-proclaimed ethical hacker has disclosed multiple bugs affecting the eBay UK website. On their own, or combined, these flaws can facilitate different attacks such as phishing, session cookie hijacking or expose secure information.
Screenshots of several proof-of-concept attacks against ebay.co.uk have been published by a white-hat hacker, going by the online handle of Methodman. He also previously reported cross-site scripting weaknesses in other high profile websites belonging to the likes of Kaspersky, ESET (NOD32), Avira or Intel.
Methodman is a member of a group of programmers and security enthusiasts calling themselves ]['€AM€LiT€ (Team Elite). The outfit runs a chat network utilizing the IRC and Direct Connect protocols. Additionally, they develop various software such as mods and plug-ins for NMDC (NeoModus Direct Connect).
According to the provided evidence, several bugs are being exploited to instrument different attacks. The first is a cross-site scripting weakness, resulting from poor input validation that can be used to inject rogue code into the page.
"Malicious people can inject JavaScript code to redirect users to eBay scam pages (phishing attacks)," advises Methodman. Additionally, stealing session cookies, serving malware through a hidden IFrame or hijacking user mouse clicks for malicious purposes (clickjacking), is also possible by exploiting this flaw.
A second vulnerability allows for unauthorized directory traversal and local file inclusion attacks on the Web server. "Attackers use directory traversal attacks to read arbitrary files on web servers, such as SSL private keys and password files," explains the hacker, who provided screenshots with content from the /etc/hosts and /etc/passwd files, as examples.
link:softpedia