• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / News / Hacker with XSS on Google's internal network

Hacker with XSS on Google's internal network

15/06/2019 16:42 by giorgos

A young hacker from the Czech Republic discovered a security loophole in one of Google's support applications.

If maliciously exploited, the error could allow hackers to steal cookies from Google employees for internal applications and seize their accounts. Extremely compelling e-fishing attempts could be launched, which would give them access to many other parts of Google's internal network.

The security loophole was discovered by researcher Thomas Orlita in February 2019. It was fixed in mid-April, but has only just been published.

google data 1024x576 - Hacker with XSS on Google's internal network

The vulnerability was cross-site scripting (XSS), and was found in Google's billing portal, a public domain that redirects Google to the business users of the billing platform.

Most cross-site scripting (XSS) vulnerabilities are not considered as dangerous but there are cases that can lead to very serious problems.

One of these cases was the discovery of Orlita. The researcher said that a malicious user could upload his own files to the Google Invoice Submission Portal, via Upload Invoice.google invoice - Hacker with XSS on Google's internal network

Using a proxy the attacker could prevent the Google Invoice Submission Portal from changing the PDF document (after the submission and validation of the form) and modifying it into HTML, with malicious XSS load.

The malicious document would be stored in Google's billing backend and wait for someone to open it.

google - Hacker with XSS on Google's internal network

"XSS runs on a googleplex.com subdomain and while the employee is logged in, the attacker can access the subdomain control panel from where invoices can be viewed and managed," Orlita told ZDNet.

"Depending on how cookies are configured on googleplex.com, it may be possible to access other internal applications hosted on this domain," the researcher added.

So since most of Google's internal applications are hosted on the googleplex.com domain, this gives attackers a lot of possibilities.

Of course, like most security vulnerabilities XSS, the risk of error depends on the hacker's skill level, and his ability to carry out more complex attacks.

For more technical details you can read Orlita publication.

_________________

  • Windows 10 build 18917 ISO with Microsoft's first Linux kernel
  • Windows 10 20H1 download the official ISO images
  • Check Point: Top Malware in Greece April 2019
  • How dangerous is 5G for human health?
Hacker with XSS on Google's internal network was last modified: 15 June, 2019, 4: 42 mm by giorgos

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: NewsDay: build, cross-site, googleplex, hackers, XSS

You May Also Like

SolarWinds Hackers stole Microsoft source code
The technique of a MAC flooding attack
Microsoft: 1000 hackers in SolarWinds attack

About Us giorgos

George still wonders what he's doing here ...

Previous Post: « Q4OS 3.7 Centaurus for Windows users who do not want Windows
Next Post: Facebook Anti-social rules of domination »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.