Security hole on Twitter.com exploited, links forced on mouseover

Though Twitter recently launched a newly redesigned site, users of the popular microblog are advised to use only third-party Twitter clients Tuesday morning to avoid a newly-exploited security hole.

The hole comes from the onMouseOver JavaScript code, which lets websites launch in your browser simply by mousing over a link in your Twitter feed. So far, the flaw has been used to redirect users to third-party sites, to pop up unwanted messages, and to have messages retweet themselves.

The "worm" variety of this exploit launches a modal overlay that turns the entire browser screen into an onMouseOver field, which then retweets the malicious message when the user touches any part of the browser screen with his mouse pointer.

Though the current exploits are still mostly harmless in nature, this hole can easily be used to redirect Twitter users to sites containing malware.

Users are advised to stay away from Twitter.com and use third-party clients, or to disable JavaScript on Twitter.

UPDATE: At 9:50 AM EST, the Twitter status blog claimed that the cross-site scripting exploit was fully patched.

9 Responses to Security hole on Twitter.com exploited, links forced on mouseover

Why Trust Us



At BetaNews.com, we don't just report the news: We live it. Our team of tech-savvy writers is dedicated to bringing you breaking news, in-depth analysis, and trustworthy reviews across the digital landscape.

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.