测试想法

测试需要的功能
技术
是否工作

Google Covert Redirect Vulnerability Based on Goog

行者路上有風有雨有彩虹:

谷雨 醉心 冬小麦:

白帽子安全文章:

Bypass Google Open Redirect Filter Based on Googleads.g.doubleclick.net

-- Google Covert Redirect Vulnerability Based on Googleads.g.doubleclick.net



The vulnerability exists at "Logout?" page with "&continue" parameter, i.e.

https://www.google.com/accounts/Logout?service=writely&continue=https://googleads.g.doubleclick.net

The vulnerability can be attacked without user login. Tests were performed on Firefox (26.0) in Ubuntu (12.04) and IE (9.0.15) in Windows 7.










(1) When a user is redirected from Google to another site, Google will check whether the redirected URL belongs to domains in Google's whitelist (The whitelist usually contains websites belong to Google), e.g.

docs.google.com

googleads.g.doubleclick.net

If this is true, the redirection will be allowed.

However, if the URLs in a redirected domain have open URL redirection  vulnerabilities themselves, a user could be redirected from Google to a vulnerable URL in that domain first and later be redirected from this vulnerable site to a malicious site. This is as if being redirected from Google directly.

One of the vulnerable domain is,

googleads.g.doubleclick.net (Google's Ad System)



(2) Use one webpage for the following tests. The webpage address is "http://www.inzeed.com/kaleidoscope". We can suppose that this webpage is malicious.


Vulnerable URL:

https://www.google.com/accounts/Logout?service=writely&continue=https://google.com/




POC:

https://www.google.com/accounts/Logout?service=wise&continue=http%3A%2F%2Fgoogleads.g.doubleclick.net%2Faclk%3Fsa%3DL%26ai%3DCtHoIVxn3UvjLOYGKiAeelIHIBfLQnccEAAAQASAAUNTx5Pf4_____wFgvwWCARdjYS1wdWItMDQ2NjU4MjEwOTU2NjUzMsgBBOACAKgDAaoE5AFP0NHr5cHwFmWgKNs6HNTPVk7TWSV-CDHX83dKdGSWJ2ADoZNIxUHZwjAODRyDY_7nVtpuqSLOTef4xzVxDQ2U22MNbGak33Ur7i2jDB8LdYt9TbC3ifsXmklY5jl3Zpq4_lP7wagVfjt0--tNPPGTR96NGbxgPvfHMq9ZsTXpjhc_lPlnyGjlWzF8yn437iaxhGRwYLt_CymifLO2YaJPkCm9nLpONtUM-mstUSpKQrP2VjjaZkbDtuK0naLLBV37aYEY4TzWQi8fQGN47z4XgpinBCna91zQayZjn2wxccDCl0zgBAGgBhU%26num%3D0%26sig%3DAOD64_3Qi4qG3CRVHRI5AHSkSGuL7HJqSA%26client%3Dca-pub-0466582109566532%26adurl%3Dhttp%3A%2F%2Fwww.inzeed.com%2Fkaleidoscope




POC Video:

https://www.youtube.com/watch?v=btuSq89khcQ&feature=youtu.be




Reporter:

Wang Jing, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore.

http://www.tetraph.com/wangjing









Related Articles:

http://computerobsess.blogspot.com/2014/11/google-covert-redirect-vulnerability.html

       http://www.hotforsecurity.com/blog/googles-doubleclick-advertising-platform-vulnerable-to-open-redirect-attacks-10822.html      
       http://seclists.org/fulldisclosure/2014/Nov/29      
       http://cxsecurity.com/issue/WLB-2014110106      
       http://securityrelated.blogspot.sg/2014/11/covert-redirect-vulnerability-based-on.html      
       http://tetraph.com/security/covert-redirect/google-covert-redirect-vulnerability-based-on-googleads-g-doubleclick-net/        http://lifegrey.tumblr.com/post/103787782054/whitehatview-googles-doubleclick-advertising   

评论

热度(18)

  1. 白帽子安全行者路上有風有雨有彩虹 转载了此文字  到 测试想法
  2. 计算机网络技术谷雨 醉心 冬小麦 转载了此文字  到 行者路上有風有雨有彩虹
  3. 计算机网络技术IT 计算机信息网络安全技术 转载了此文字  到 IT 计算机&信息网络 技术
  4. 琐事,日常之事计算机网络技术 转载了此文字  到 IT 计算机信息网络安全技术
  5. 计算机网络技术白帽子安全 转载了此文字
  6. 琐事,日常之事白帽子安全 转载了此文字
  7. 點滴的記錄白帽子安全 转载了此文字