Fortify warns on Ministry of Defence XSS site flaw

Richard Kirk, Fortify's european director, said that the MoD admitted to the flaw last Tuesday, after it was alerted to the XSS problem by a journalist who had been tipped off by the hacker group, Team Elite.

"XSS vulnerabilities are often found in web applications which allow code injection by malicious Internet users into the pages viewed by other users. Examples of these flaws include client-side scripts. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy", he said.

According to Kirk, research by Symantec back in 2007 showed that around 80% of documented site vulnerabilities were down to XSS security problems.

The Fortify director added that, in many cases of an XSS-driven infection, the infected user is usually unaware his/her computer has been compromised, and, as a result, is leaking information.

This, he explained, is what makes XSS flaws so insidious, as - in common with other similar security problems - the flaw on the MoD website could have re-routed users to a second, infected portal.

Kirk went on to say that the XSS flaw only appears to have affected the MoD's A to Z index, but the good news is that the MoD webmaster appears to have responded almost immediately to the Team Elite warning.

Team Elite's Maciej Bukowski posted details of the MoD site flaw late on the previous Sunday and the MoD was alerted to the problem after Bukowski contacted the ZDNet newswire last Monday.

"Since Bukowski was responsible for revealing a similar flaw on the MI5 web portal last month, it looks like the message has got through and the MoD reacted swiftly to the Team Elite posting, as soon as ZDNet alerted them to the problem", said Kirk.

What’s hot on Infosecurity Magazine?