Creating a YouTube TV that could steal your private videos - $6,000 CSRF

  Рет қаралды 4,317

Bug Bounty Reports Explained

Bug Bounty Reports Explained

Күн бұрын

📧 Subscribe to BBRE Premium: bbre.dev/premium
✉️ Sign up for the mailing list: bbre.dev/nl
📣 Follow me on Twitter: bbre.dev/tw
🖥 Get $100 in credits for Digital Ocean 🖥
m.do.co/c/cc700f81d215
This video is an explanation of a vulnerability found in Google bug bounty program. The bug was a CSRF (cross-site request forgery) that allowed stealing private and unlisted videos from KZfaq.
Report:
bugs.xdavidhu.me/google/2021/...
Reporter's twitter:
/ xdavidhu
POC script:
gist.github.com/xdavidhu/b264...
Follow me on twitter:
/ gregxsunday
00:00 Intro
00:35 Pairing YT TV with the browser
03:35 The bug
04:48 Pairing the victim with our TV
05:48 Video ID?

Пікірлер: 18
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
Hi there! Welcome to the comment section. I hope you liked the video. If you like what I'm doing, sign up for the newsletter to learn with me even more: mailing.bugbountyexplained.com/
@reo4680
@reo4680 2 жыл бұрын
awsome video! keep going man! im proud that people from my country are finding bugs like this :)
@renganathanofficial
@renganathanofficial 2 жыл бұрын
good one as always :D
@DavenSec
@DavenSec 2 жыл бұрын
Nice video like always ;)
@unurbayaramarsaikhan1362
@unurbayaramarsaikhan1362 2 жыл бұрын
Thank for your work. It help me to understand a bug. :)
@stoner6161
@stoner6161 2 жыл бұрын
Keep up the good work
@pratyakshsingh7834
@pratyakshsingh7834 2 жыл бұрын
Perfectly explained.
@mnageh-bo1mm
@mnageh-bo1mm 2 жыл бұрын
duh ... but 6k is too low for such a vuln
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
I also think it could be more
@cyberpirate007
@cyberpirate007 2 жыл бұрын
Google should hire him! 👏👏
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
yes!
@zTech300
@zTech300 2 жыл бұрын
Super
@mnageh-bo1mm
@mnageh-bo1mm 2 жыл бұрын
Hey how did he bypass cors policy that allows a site to send get requests in the browser to another site that it doesn't own ??
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
That's a good question. In this case, we send a POST request with application/x-www-form-urlencoded content-type. As per understanding of CORS rules, this is considered a "simple request". Thus, the browser does NOT send the preflight request (the OPTIONS request which the browser sends to what is the Access-Control-Allow-Origin header). Instead, straight away it sends the POST request that we want and only then observes headers in the response (ACAO in particular). In our case, the request will originate from the bad domain - one is not whitelisted by CORS policy. The browser will block us from reading the response bur the request was already sent. In case of CSRF, we don't need to read the response - sending a request is enough for us. Reference: developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests This topic is not easy - feel free to ask if you need any clarification.
@mnageh-bo1mm
@mnageh-bo1mm 2 жыл бұрын
​@@BugBountyReportsExplained oh ... i get it ... i thought that you need to read the response to get the attack to work ... thanks a lot
@BugBountyReportsExplained
@BugBountyReportsExplained 2 жыл бұрын
@@mnageh-bo1mm no problem mate, It's good to hear a good question in comments 😉
@krishg767
@krishg767 2 жыл бұрын
nice
@zbyszggo4626
@zbyszggo4626 2 жыл бұрын
This is next level shit
$2,500 Leaking parts of private Hackerone reports - timeless cross-site leaks
10:14
Bug Bounty Reports Explained
Рет қаралды 4,7 М.
$16k Stealing secrets.yaml from GitLab using stored XSS - Hackerone bug bounty
9:48
Bug Bounty Reports Explained
Рет қаралды 6 М.
СНЕЖКИ ЛЕТОМ?? #shorts
00:30
Паша Осадчий
Рет қаралды 8 МЛН
Haha😂 Power💪 #trending #funny #viral #shorts
00:18
Reaction Station TV
Рет қаралды 14 МЛН
МАМА И STANDOFF 2 😳 !FAKE GUN! #shorts
00:34
INNA SERG
Рет қаралды 3,5 МЛН
Google Data Center 360° Tour
8:29
Google Cloud Tech
Рет қаралды 5 МЛН
$31,337 Google Cloud blind SSRF + HANDS-ON labs
9:44
Bug Bounty Reports Explained
Рет қаралды 10 М.
How Microsoft Accidentally Backdoored 270 MILLION Users
14:45
Daniel Boctor
Рет қаралды 245 М.
$XX,000 Airbnb impossible XSS with 4 bypasses
9:15
Bug Bounty Reports Explained
Рет қаралды 27 М.
CRLF + XSS + cache poisoning = Access to Github private pages for $35k bounty
11:22
Bug Bounty Reports Explained
Рет қаралды 11 М.
$25,000 Facebook.com postMessage account takeover vulnerability
9:34
Bug Bounty Reports Explained
Рет қаралды 10 М.
AmazingCryptoWAF - @LiveOverflow's CTF challenge walkthrough - ALLES! CTF
14:12
Bug Bounty Reports Explained
Рет қаралды 8 М.
$25,000 Stealing GitHub API token with a malicious pull request
10:06
Bug Bounty Reports Explained
Рет қаралды 4,2 М.
Неразрушаемый смартфон
1:00
Status
Рет қаралды 1,8 МЛН
Ждёшь обновление IOS 18? #ios #ios18 #айоэс #apple #iphone #айфон
0:57