TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

XSS in Google Finance

110 pointsby moonlanderalmost 12 years ago

7 comments

seldoalmost 12 years ago
Does anyone else feel that XSS on google.com is probably worth a bit more to the wrong people than $5k? Arbitrary-eval is pretty much the worst. Unless I&#x27;m missing something, somebody could steal a user&#x27;s cookie strings and post them to an arbitrary endpoint, which could then use them to log into, e.g. GMail, which an attacker could then use to trigger and retrieve password-reset links for all sorts of other sites.<p>When I worked at Yahoo, an XSS on yahoo.com (which almost never happened) was a code-red, drop-everything, holy-shit event. If I were at Google I&#x27;d probably give this guy a bonus.
评论 #6130857 未加载
评论 #6130884 未加载
sneakalmost 12 years ago
I wonder if emailing them and asking for e.g. a 25k reward before disclosure exposes one to criminal liability or not.<p>I mean, is there a law making it illegal to sell exploits to the black market? These bug bounty programs must know they compete with a large market for these sorts of things.
评论 #6131071 未加载
评论 #6131537 未加载
评论 #6131005 未加载
skizmalmost 12 years ago
Slightly off topic, but if a bug like this is discovered does the engineer who wrote it get notified?<p>It would be funny to have a sort of wall of shame for that week or something else internally. Or you could even go as far as making that engineer pay for the bug bounty (that&#x27;s a bit much though). Anyone have any experience as to what happens on Google&#x27;s end besides the obviously patching of the bug and paying of the fine?
评论 #6130721 未加载
评论 #6130711 未加载
评论 #6130883 未加载
评论 #6130833 未加载
评论 #6131107 未加载
评论 #6131420 未加载
评论 #6131018 未加载
评论 #6131230 未加载
评论 #6130809 未加载
gaborcsellealmost 12 years ago
Where in the code is the eval() is performed? There is not a single call to eval() in that source.<p>Maybe a listing of the Wi() function would be useful.
elialmost 12 years ago
Nice one. Curious how it was discovered. Manually toying with URL parameters on google.com links?
评论 #6130744 未加载
评论 #6130619 未加载
h1fraalmost 12 years ago
5k is not so much for this kind of huge vulnerability.<p>I mean with a &quot;great&quot; hack this guy could have made much more in a few hour, but let say it&#x27;s a generous reward anyway :)
jayzalowitzalmost 12 years ago
Wasn&#x27;t this one around for ages?