Google - XSS 漏洞 - Google

Linda avatar
By Linda
at 2006-07-06T09:39

Table of Contents

Scripting Vulnerability in Google

Google is vulnerable to cross site scripting. While surfing around the
personalization section of Google I ran accross the RSS feed addition tool
which is vulnerable to XSS. The employees at Google were aware of XSS as they
protected against it as an error condition, however if you input a valid URL
(like my RSS feed) it will return with a JavaScript function containing the
URL.

If you append the URL of the valid feed with a query string that contains
your cross site scripting exploit Google will not sanitize it upon output of
the JavaScript (it will upon screen render of the main page, but at that
point it is too late). The JavaScript is not intended to be rendered
directly, but that’s irrelevant, and can be exploited directly. Because this
lives on the http://www.google.com/ domain it is not subject to cross domain
policy restrictions that have typically protected Google from these attacks
in the past.

Here is a screenshot of the vulnerability:

(click to enlarge)
If you want to see the vulnerability for yourself click here (this is a
benign proof of concept). As I said, this is using the query string from a
valid feed to inject the vector. It doesn’t work if you inject it into the
Add Content function on the page because the page itself sanitizes the
output. Unfortunately for Google this can be intercepted far earlier than the
page that does the eventual sanitization. One of the worst parts of this is
that it does not require you to be logged in to exploit this cross site
scripting vulnerability.

Additionally. in a few seconds of searching, I also found that Google has yet
another URL redirection attack in it that can be used for phishing attacks
located here (will redirect you to a benign site that demonstrates the
attack). Google has been pretty notoriously slow at fixing these sorts of
attacks in a timely manner (the last one that was actually being used by
phishers was open for nearly a month), but they are really bad, because
phishers can easily bounce their traffic off of these trusted domains. People
are far more likely to click on a website that says www.google.com than they
are to click on a site that says www.wellfsarg0.com or something equally
obvious. I understand they are used for tracking purposes, but there are ways
around this, like checking against whitelists, or checking against an
embedded hash, etc. It’s processor intensive, but it protects the internet
community.

Also in a few minutes of checking, id found a CSRF in Google (cross site
request forgery) where malicious websites can change the default map search
location. This is really not a big deal as far as I can tell besides annoying
Google and it’s users, but it’s worth mentioning. Make sure you are logged
into Google and then click on the following CSRF to change your default
location to the whitehouse. Annoying, but I doubt there is a bigger hole
here. The point is that Google definitely has not protected against CSRF, and
I am sure there are additional vulnerabilities here that I have not played
with since I only spent a few minutes looking at it.

So back to the cross site scripting vector, since that is by far the most
dangerous. What are the implications of this attack for Google? Well, for
starters, I can put a phishing site on Google. “Sign up for Google World
Beta.” I can steal cookies to log in as the user in question, I can use the
credentials of the user to screen scrape any of the content off of the www
cname, including changing options like adding my RSS feed to your page, or
deleting them, etc… I can steal your phone number from the /sendtophone
application via an XML RPC (AJAX) call via a POST method, get your address
because maps.google.com is mirrored on
http://www.google.com/maphp?hl=en&tab=wl&q= etc… the list of potential
vulnerabilities goes on and on. The vulnerabilities only grow as Google
builds out their portal experience.

Indeed this also could have massive blackhat SEO (Search Engine Optimization)
implications as Google sets itself as the authority in page rank (above other
sites with more traffic). Its own page is set as a 10 in page rank. Trusting
yourself could actually prove to be dangerous in this case, although this is
a theoretical attack. Injecting your own links and getting engines to spider
it could temporarily dramatically inflate page rank as /ig/ (where the
vulnerable function is stored) is not disallowed by Google’s robots.txt file
(again this is a theoretical attack and it is easy for Google to de-list
violators).

Ultimately, Google cannot be trusted implicitly because of these types of
holes, in the same way any major site cannot be trusted implicitly for the
same reason. There are too many potential issues in their applications, and
your information is definitely not 100% safe when entered there.

This will become particularly relevant at Jeremiah Grossman’s talk at
Blackhat next month, where he starts to go into the real issues with cross
site scripting, and how dangerous these forms of attack really can be (far
beyond what is currently well known). Can you tell I’m excited? I don’t
particularly blame Google, as all major websites are vulnerable to this, in
my experience, it’s just that with a site’s popularity it becomes
exponentially more dangerous and the responsibility to find these issues
before the security community increases at the same rate.

來源
http://ha.ckers.org/

測試
http://0rz.net/601y7

--
Tags: Google

All Comments

Google推出新服務GBuy! Orz

Kama avatar
By Kama
at 2006-07-05T21:49
搜尋引擎的龍頭Google宣佈推出新網路金流系統服務:GBuy,以供會員買賣交易,預計本 月28日可啟用,直接挑戰全球最大拍賣網站ebay的PayPal系統,進一步升高網路市場戰況 。 Google一向以推出具有破壞性創新的網路服務著稱,從高達1G容量的Gmail、衛星地圖、 學術搜尋、Google Pag ...

google還能夠搜尋BBS的文章嗎?

Wallis avatar
By Wallis
at 2006-07-05T17:15
※ 引述《allenown (只是一個過客)》之銘言: : ※ 引述《Jerusalem (耶路撒冷)》之銘言: : : 記得以前的google是可以搜尋BBS上的文章, : : 要序號一打軟體的名稱,都是從BBS上來的, : : 現在需要從BBS上找資料,google好像沒有這 : : 種功能了,openf ...

伺服器到微晶片 Google一手包

Ula avatar
By Ula
at 2006-07-05T04:34
http://0rz.net/f41xE 2006.07.04  工商時報 伺服器到微晶片 Google一手包 李鐏龍/綜合外電報導 當Google還只是學校研究所的一項計畫時,其創辦人佩吉及布林就是用廉價零件組裝 出他們所需要用到的電腦,目的是省錢。現在Google再也不必精打細算,但仍堅 ...

分析:Google堅持DIY戰略可能自己開發芯片

Sierra Rose avatar
By Sierra Rose
at 2006-07-05T04:33
http://news.sina.com.tw/articles/13/96/42/13964227.html?/tech/20060705.html 分析:Google堅持DIY戰略可能自己開發芯片 北京新浪網 (2006/07/05 01:19) 【新浪科技】 導語:國外媒體7月4日發表分析文章稱, ...

請問 google toolbar舊版哪裡有??

Hedwig avatar
By Hedwig
at 2006-07-05T02:07
※ [本文轉錄自 EZsoft 看板] 作者: fujiitsu (ふじい) 看板: EZsoft 標題: Re: [問題] 請問 google toolbar舊版哪裡有?? 時間: Wed Jul 5 02:05:48 2006 ※ 引述《fujiitsu (ふじい)》之銘言: : dear all ...