Security researchers say a patch released by Yahoo earlier this week for a serious email vulnerability did not fix the problem, leaving users at risk.
The cross-site scripting flaw was found by Shahin Ramezany, who goes by the nickname "Abysssec." The vulnerability can allow an attacker to harvest a victim's cookie for their Yahoo account if the victim is successfully tricked into clicking on a malicious link.
[ The Web browser is your portal to the world -- and the gateway for security threats. InfoWorld's expert contributors show you how to secure your Web browsers. Download the free PDF today! | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]
The vulnerability was patched by Yahoo on Monday, but penetration testing company Offensive Security and Ramezany say that the patch did not fix the problem.
"With little modification to the original proof-of-concept code written by Abysssec, it is still possible to exploit the original Yahoo vulnerability, allowing an attacker to completely take over a victim's account," Offensive Security wrote on its blog.
A Yahoo spokeswoman did not have an immediate comment when contacted Wednesday.
Offensive Security hosted a video showing how the attack works but left out details that might allow attackers to replicate it. The company said XSS filters provide little defense against an attack and warned that people should be wary of clicking on links within emails until Yahoo fixes the vulnerability.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk.