A cross-site scripting vulnerability in the social networking section of Sen. Barack Obama’s campaign site was exploited over the weekend to redirect users to the URL of his rival, Sen. Hillary Clinton. Cross-site scripting vulnerabilities, which are most commonly exploited by identity thieves and phishers, let attackers inject their own malicious code into legitimate pages. According to the U.K.-based anti-fraud company Netcraft Ltd., someone identified only as “Mox” confessed to the hack in an entry on the Community Blogs section on the Obama site Sunday. Obama, an Illinois Democrat, leads Clinton in the race for the party’s presidential nomination. The site exploit occurred just before this week’s big Pennsylvania primary.
An Obama supporter captured the cross-site scripting hack and the resulting redirect to Clinton’s campaign site on video Saturday, and posted it on YouTube. Clicking on the “Community Blogs” link, the video showed, sent users to hillaryclinton.com.
The bug, said Pagkalos, could have been used to infect Obama’s supporters and site visitors with malware, adware or identity-stealing spyware.
Obama’s campaign did not reply to a request for comment. The cross-site scripting bug has been patched.
More on CyberInsecure: