Hacker with XSS on Google's internal network

A young hacker from the Czech Republic discovered a security loophole in one of Google's support applications.

If someone with malicious intent exploited it could allow hackers to steal Google employees' cookies for internal applications and take over their accounts. Then they could launch highly convincing phishing attempts, which would give them access to many other parts of Google's internal network.

The security loophole was discovered by researcher Thomas Orlita in February 2019. It was fixed in mid-April, but has only just been published.

The vulnerability was a cross-site scripting (XSS), and was found in Google's invoicing portal, a public that Google redirects business users of the platform to submit invoices.

Most cross-site scripting (XSS) vulnerabilities are not considered as dangerous but there are cases that can lead to very serious problems.

One of these cases was the discovery of Orlita. The researcher said that someone The user could upload their own files to the Google Invoice Submission Portal, via Upload Invoice.hacker

Χρησιμοποιώντας κάποιο proxy ο εισβολέας θα μπορούσε να παρεμποδίσει το Google Invoice Submission Portal να αλλάξει το PDF έγγραφο (μετά τη διεξαγωγή της διαδικασίας υποβολής και επικύρωσης της φόρμας) και να το τροποποιήσει σε HTML, με φορτίο XSS.

The malicious document would be stored in Google's billing backend and wait for someone to open it.

“The XSS runs on a subdomain of googleplex.com and while the employee is logged in, the attacker can access the subdomain's control panel from where it is possible to view and of tariffs," Orlita told ZDNet.

"Depending on how cookies are configured on googleplex.com, it may be possible to access other internal applications hosted on this domain," the researcher added.

So since most of Google's internal applications are hosted on the googleplex.com domain, this gives attackers a lot of possibilities.

Of course, like most things XSS, the vulnerability of the bug depends on the skill level of the hacker, and his ability to perform more complex .

For more technical details you can read Orlita publication.

_________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).