A couple of pretty interesting Cross Site Scripting (XSS) exploits have been launched as of late on presidential candidates Hillary Clinton and Barack Obama’s websites. Both exploits are unique in that they were highly publicized and pretty well documented online. It’s probably some good information for developers and hosting companies to take a look at, even if you aren’t developing or hosting a presidential candidates website. Here’s an excerpt from Netcraft’s website:
While Clinton and Obama are battling it out in the political arena, security researchers are continuing to find vulnerabilities in the candidates’ and supporters’ websites. Interestingly, while a typical exploit is to redirect one party’s site to their opponent’s, the reasons for seeking to discover such vulnerabilities are not always politically motivated.
Following the recent cross-site scripting attacks against Barack Obama’s website, Finnish security researcher Harry Sintonen has published an example of a cross-site scripting vulnerability on votehillary.org.
Sintonen’s example submits a POST request to the Vote Hillary website and injects an iframe, causing the site to display the contents of Barack Obama’s website. Unlike the Obama incident, which redirected the user’s web browser, Sintonen’s method retains the votehillary.org URL in the address bar while displaying the opposing website.
Sintonen told Netcraft that he was inspired by the recent Obama attacks and first examined Hillary Clinton’s official website at www.hillaryclinton.com. Sintonen did not find any cross-site scripting vulnerabilities on this site, adding that it looked quite secure, but subsequently found XSS opportunities available on the Vote Hillary website. Sintonen lives in Finland and has no strong interest in US politics.
While the example exploits have so far been relatively benign (limited to redirecting a user to the opponent’s website, for example), future cross-site scripting vulnerabilities found on political candidate sites have plenty of scope to be much more serious. Obama’s and Clinton’s websites both accept monetary contributions towards their campaigns, so cross-site scripting vulnerabilities could be leveraged to steal money and identities from supporters.
Sintonen told Netcraft he informed the webmasters of votehillary.org about this cross-site scripting vulnerability two days ago, but has not yet received a response.
Source: Clinton and Obama XSS Battle Develops – Netcraft
Questions or Comments?