The Channel logo


By | Dan Goodin 10th February 2009 02:10

XSS bug crawls all over PayPal page

'Fugitif' strikes again

Online payments site PayPal has been bitten by yet another cross-site scripting (XSS) bug that could be exploited by black hats to phish user passwords or possibly steal authentication cookies.

At time of writing, opening the link revealed a tainted page that opened a javascript window that read: "Fugitif was here another time." It worked flawlessly on Internet Explorer and Firefox. Using the excellent Firefox NoScript plug-in automatically blocks the page from loading, however.

screenshot of PayPal XSS page

XSS bugs remain one of the easier ways to subvert website security measures. They use manipulated URLs to inject unauthorized code or content into a trusted website to change its behavior. XSS exploits are able to bypass the so-called same-origin policy, which prevents cookies and other types of content set by one domain from being access or manipulated by a different address.

PayPal squashed the bug late Monday evening, several hours after this article was originally published. "As you know, PayPal's highest priority is the security of its payment service," a spokesman said. He said the company encourages people to responsibly disclose bugs. Guidelines are here. ®

comment icon Read 10 comments on this article alert Send corrections


Frank Jennings

What do you do? Use manual typwriters or live in a Scottish croft? Our man advises
A rusty petrol pump at an abandoned gas station. Pic by Silvia B. Jakiello via shutterstock

Trevor Pott

Among other things, Active Directory needs an overhaul
Baby looks taken aback/shocked/affronted. Photo by Shutterstock

Kat Hall

Plans for 2 million FTTP connections in next four years 'not enough'
Microsoft CEO Satya Nadella


League of gentlemen poster - Tubbs and Edward at the local shop. Copyright BBC
One reselling man tells his tale of woe