Description

Salt Labs, the research division of API security firm Salt Security, has discovered a cross-site scripting (XSS) vulnerability that could affect millions of websites worldwide. This vulnerability stems from the improper integration of OAuth, a widely used tool for social logins, rather than from central product vulnerabilities. The issue arises from the way web code incorporates OAuth, leading to potential security flaws. Despite numerous mitigations over the years, XSS remains a significant threat, worsened by developers' reliance on easily implemented social login applications. This familiarity often results in overlooked security protocols. The core problem is not OAuth itself, but its incorrect implementation on websites. Salt Labs found that flawed integration can create new XSS pathways, bypassing existing defenses and potentially resulting in account takeovers. Major companies like HotJar and Business Insider, which handle vast amounts of personally identifiable information (PII), were highlighted by Salt Labs. Despite robust security measures, their OAuth implementations were found to be flawed, suggesting a widespread issue. Yaniv Balmas, Salt’s VP of research, noted that similar vulnerabilities were found on websites such as Booking.com, Grammarly, and OpenAI, indicating the extensive scope of the problem. HotJar, used by millions of websites, collects significant user data, making the potential impact of this vulnerability severe. The attack method involves exploiting the OAuth login process through a crafted link that tricks users into revealing login credentials, allowing attackers full control of the victim's account. To address this, Salt Labs offers a free scanner to help websites identify flaws in their OAuth implementation, encouraging proactive security measures. While it doesn't guarantee complete protection, this tool can highlight critical vulnerabilities, prompting organizations to secure their systems before larger issues arise.