Amazon’s Kindle Library has a cross-site scripting vulnerability (XSS), an attacker is full access to a.com account. At least that the German security researcher Benjamin Mussler who has also published on his blog a feasibility Exploit
attacker can According Mussler, insert malicious code into the metadata of a Kindle e-books, such as the title, which is executed automatically, Shobal the victim’s Kindle Library page (also known as “Content and Device Management” or “Manage Kindle”) opens on Amazon.com. “In this way, Amazon account cookies can be accessed and transferred to the attacker and compromised the Amazon account of the victim,” Mussler.
explained according to the security researchers are fundamentally all the users affected, the Amazons use Kindle library to store e-books or to transfer them to their Kindle. Particularly vulnerable users who receive their e-books from untrusted sources were instead to buy directly from Amazon.
According to the company Mussler reported the gap for the first time in November 2013 Amazon confidential. She was then closed relatively quickly. But with a later update its Web application “Manage Kindle” Amazon have introduced the bug accidentally again.
“Amazon did not respond to my following e-mail in which I explained the error, and two months later, the vulnerability is still not resolved, “said Mussler. Why he has now decided to publish the vulnerability
[with material from Zack Whittaker, ZDNet.com]
Tip:. How confident are you in safety? Check your knowledge – with 15 questions on silicon.de