Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: Google vulnerabilities with PoC
From: Alfredo Ortega <alfred () groundworkstech com>
Date: Fri, 14 Mar 2014 16:13:14 -0300

If he can change the mime type, then he indeed may have an attack
vector, e.g. he could upload a complete youtube-lookalike site and
snatch credentials. If you can access the fake site via HTTPS with a
youtube cert, it's an obvious vulnerability.

On 03/14/2014 07:05 AM, Mario Vilas wrote:
You're still missing the attack vector (and the point of the discussion
too, but that's painfully obvious).

On Fri, Mar 14, 2014 at 4:21 AM, Nicholas Lemonias. <
lem.nikolas () googlemail com> wrote:

Here's my evidence.

Live Proof Of Concept


"ok", "video_id":

The above proof of concept demonstrates :

1. We have bypassed the security controls in Youtube and uploaded an
unexpected file type.
2. The file is persistent and has not been deleted by YouTube.
3. It can be queried for information since it is assigned a unique
4. It's successfully uploaded to youtube.com  As you can see it give out
the total bytes written to the remote network.
5. "content_type":"text/x-sh"}]   -------> The file is a shell
script script named 'file'
6. It can be enumerated by a non-authenticated user, remotely.

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]