Yahoo Messenger 11.x $InlineAction parameter iFrame flaw


A zero-day exploit has been seen to be present in Yahoo Messenger 11.x, including the latest released version which allows a remote attack to hijack your status update. The attacker will simulate sending a file to a user when changing the status update. This can be done in part to the '$InlineAction parameter' flaw which is responsible for the way the Messenger form displays the accept or deny the transfer. The attack vector uses an iFrame which loads and then swaps the status message for the custom text. Remote attackers can use the status update to post URL updates which then redirect users to fake malicious websites. The attacker does not need to be included in the victims contact list.

December 5, 2011
Notify of
1 Comment
Oldest Most Voted
Inline Feedbacks
View all comments
Amanda Franky
6 months ago

A great hacker is really worthy of good recommendation , Henry
really help to get all the evidence i needed against my husband and
and i was able to confront him with this details from this great hacker
to get an amazing service done with the help ,he is good with what he does and the charges are affordable, I think all I owe him is publicity for a great work done via, Henryclarkethicalhacker at g mail com, and you can text, call him on whatsapp him on +12014305865, or +17736092741, 

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.