TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

This link says it's from YouTube but it's not

277 点作者 Phantom大约 15 年前

13 条评论

kleevr大约 15 年前
My first computer job as a teen was working at a small SEO shop (3 people) writing little cgi/perl scripts for this and that.<p>Yahoo's http server at that time used to take redirect URLs in this format: "<a href="http://yahoo/url/*http://exiturl/" rel="nofollow">http://yahoo/url/*http://exiturl/</a>. They were using these URLs on all search results, I'm guessing to track click-throughs to improve rankings. So I set up a script on our site to load an image using this format with the img src in the exit-url, and for the yahoo-url and we would round robin 'client' links though. Essentially spoofing legitimate search&#38;clicks on yahoo from unique IPs from our site visitors. Over the next two weeks all our sites started bubbling up in the results. This worked for about a month before Yahoo changed something (I'd guess they started validating the http-referrer or the exit-url), and it all stopped working.<p>But, for that brief window of time when it was working, I was the king of the high fives.<p>(FWIW, I don't do SEO work of any kind anymore, and I certainly don't advocate 'blackhat seo'.)
tednaleid大约 15 年前
This is a common exploit. So common that it's #8 on the 2010 OWASP top 10 most critical web application security risks: "Unvalidated Redirects and Forwards".<p><a href="http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project" rel="nofollow">http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Projec...</a><p>Every web app developer should review these vulnerabilities before releasing their code to the world.
评论 #1259882 未加载
sparkiegeek大约 15 年前
<a href="https://www.google.com/accounts/CheckCookie?continue=http%3A%2F%2Fwww.youtube.com%2Fredirect%3Fusername%3Ddigitalhook%26q%3Dhttp%253A%252F%252Fsecuritytube.net%252FSocial-Engineering-Attacks-using-Simple-Redirections-video.aspx%26video_id%3DVgc3NVVpb8c%26event%3Durl_redirect%26url_redirect%3DTrue%26usg%3DUE0DOmwjBRK-mgheFtW1hMTEvh4%3D%2F&#38;chtml=LoginDoneHtml" rel="nofollow">https://www.google.com/accounts/CheckCookie?continue=http%3A...</a><p>This link looks like it's from google.com but it's not.<p>Incidentally I think this only works if you're currently signed in to a Google account, oh yeah it's bouncing from an HTTPS address as well.
chacha102大约 15 年前
It is technically a YouTube link, but it is redirecting to securitytube.net. I know this because the Internet I am on blocks YouTube, but not SecurityTube, so going directly to the redirect link works, but the YouTube link does not.<p>At least that is what my browser says:<p><a href="http://www.youtube.com/redirect?username=digitalhook&#38;q=http%3A%2F%2Fsecuritytube.net%2FSocial-Engineering-Attacks-using-Simple-Redirections-video.aspx&#38;video_id=Vgc3NVVpb8c&#38;event=url_redirect&#38;url_redirect=True&#38;usg=UE0DOmwjBRK-mgheFtW1hMTEvh4=" rel="nofollow">http://www.youtube.com/redirect?username=digitalhook&#38;q=h...</a><p>Looks like someone found a YouTube exploit.
评论 #1259775 未加载
mrcharles大约 15 年前
I don't know a single non-technical but non-internet-ignorant user who wouldn't be suckered in by this. I've taught people how to scan for valid links, and now they can't even trust that.
评论 #1260988 未加载
评论 #1260229 未加载
jrockway大约 15 年前
URLs are not a security mechanism. They are a non-canonical resource locator, where each part is resolved by a different server. It's a way to write a "program" that does a DNS lookup and HTTP query in a simple way.<p>Nothing more, nothing less.<p>If you want security, start a CA, give each site you like its own SSL cert (signed by you), and enjoy.
评论 #1261985 未加载
pchristensen大约 15 年前
Wow, I don't like this. My usual tactic of looking for the / after the .tld isn't a general solution anymore. I hope my bank doesn't implement this functionality.
评论 #1259864 未加载
评论 #1259780 未加载
dotBen大约 15 年前
This is hardly new, but I agree it is an issue.<p>The answer to this security issue is either:<p>1) The bit.ly route - store off-site urls your organization wants to link to as a value and give the user an url with just the key in it.<p>2) Create a secret salted hash of the url and include that with the url in the args. Upon request, the receiver would re-hash the url and compare it to the hash given. Unless someone reverse engineered your hash this system prevents someone casually manipulating a url.
评论 #1260288 未加载
bcl大约 15 年前
This is not new. Various 'recognized' websites have redirect urls that are not protected. Once the redirect is complete the site it properly identified.<p>If you have to be afraid of what links you click on you are running the wrong software.
评论 #1259885 未加载
评论 #1259899 未加载
johnrob大约 15 年前
I wonder how many sites have a similar redirect feature for post-login pages instead of outbound click tracking. This feature makes it easy to login from any page, and immediately return to the page upon success. How many sites don't validate the full url before redirecting? Scary thought...
duck大约 15 年前
This title makes me definitely <i>not</i> want to click it.
评论 #1259764 未加载
kwamenum86大约 15 年前
This is a case where the web is only as secure as its most insecure link. Even if your site uses a hash to prevent abusing redirects people can still abuse them. They need only find a site that uses hashless redirects, generate some redirect link using that site, and then create a legit redirect link using your site. Blacklisting certain domain strings in the url would not solve this- new domains are too easy to obtain. Whitelisting would help but may be prohibitive depending on what you are building...
franck大约 15 年前
This is why I'm using the RequestPolicy addon on Firefox : <a href="http://www.requestpolicy.com/" rel="nofollow">http://www.requestpolicy.com/</a><p>It asks for confirmation when a page tries to redirect unexpectedly like this.