TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

XSS in Google Finance

110 点作者 moonlander将近 12 年前

7 条评论

seldo将近 12 年前
Does anyone else feel that XSS on google.com is probably worth a bit more to the wrong people than $5k? Arbitrary-eval is pretty much the worst. Unless I&#x27;m missing something, somebody could steal a user&#x27;s cookie strings and post them to an arbitrary endpoint, which could then use them to log into, e.g. GMail, which an attacker could then use to trigger and retrieve password-reset links for all sorts of other sites.<p>When I worked at Yahoo, an XSS on yahoo.com (which almost never happened) was a code-red, drop-everything, holy-shit event. If I were at Google I&#x27;d probably give this guy a bonus.
评论 #6130857 未加载
评论 #6130884 未加载
sneak将近 12 年前
I wonder if emailing them and asking for e.g. a 25k reward before disclosure exposes one to criminal liability or not.<p>I mean, is there a law making it illegal to sell exploits to the black market? These bug bounty programs must know they compete with a large market for these sorts of things.
评论 #6131071 未加载
评论 #6131537 未加载
评论 #6131005 未加载
skizm将近 12 年前
Slightly off topic, but if a bug like this is discovered does the engineer who wrote it get notified?<p>It would be funny to have a sort of wall of shame for that week or something else internally. Or you could even go as far as making that engineer pay for the bug bounty (that&#x27;s a bit much though). Anyone have any experience as to what happens on Google&#x27;s end besides the obviously patching of the bug and paying of the fine?
评论 #6130721 未加载
评论 #6130711 未加载
评论 #6130883 未加载
评论 #6130833 未加载
评论 #6131107 未加载
评论 #6131420 未加载
评论 #6131018 未加载
评论 #6131230 未加载
评论 #6130809 未加载
gaborcselle将近 12 年前
Where in the code is the eval() is performed? There is not a single call to eval() in that source.<p>Maybe a listing of the Wi() function would be useful.
eli将近 12 年前
Nice one. Curious how it was discovered. Manually toying with URL parameters on google.com links?
评论 #6130744 未加载
评论 #6130619 未加载
h1fra将近 12 年前
5k is not so much for this kind of huge vulnerability.<p>I mean with a &quot;great&quot; hack this guy could have made much more in a few hour, but let say it&#x27;s a generous reward anyway :)
jayzalowitz将近 12 年前
Wasn&#x27;t this one around for ages?