Yahoo DOM XSS 0day – Not fixed yet!
With little modification to the original proof of concept code written by Abysssec, it is still possible to exploit the original Yahoo vulnerability, allowing an attacker to completely take over a victim’s account. The victim has to be lured to click a link which contains malicious XSS code for the attack to succeed. This can be demonstrated as shown in the video we have created just this morning (10:23 AM EST, Jan 8th, 2013) after Shahin kindly shared proof of concept code with us.
Yahoo mail users should be on guard against clicking any links for the foreseeable future. Due to the nature of the vulnerability, XSS filters and similar protections provide little defense against this attack. Please note that technical details have been stripped from the demo movie and will be published on Abysssec.com once Yahoo issues an effective patch. Best viewed in full screen.