[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC



<html><head>
<meta content="text/html; charset=ISO-8859-1" http-equiv="Content-Type">
</head><body bgcolor="#FFFFFF" text="#000000"><br>
You have a Googlemail account. How do we know you don't work for Google 
too...<br>
<br>
Inception type stuff going on here.<br>
<blockquote style="border: 0px none;" 
cite="mid:CA+CewVA5+3Z8UJPMYOy-v-bVkK8x5rY7dJt_X254Agt8=zg0AA@xxxxxxxxxxxxxx"
 type="cite">
  <div style="margin:30px 25px 10px 25px;" class="__pbConvHr"><div 
style="display:table;width:100%;border-top:1px solid 
#EDEEF0;padding-top:5px">       <div 
style="display:table-cell;vertical-align:middle;padding-right:6px;"><img
 photoaddress="lem.nikolas@xxxxxxxxxxxxxx" photoname="Nicholas 
Lemonias." src="cid:part1.03010601.07010203@tmacuk.co.uk" 
name="compose-unknown-contact.jpg" height="25px" width="25px"></div>   <div
 
style="display:table-cell;white-space:nowrap;vertical-align:middle;width:100%">
        <a moz-do-not-send="true" href="mailto:lem.nikolas@xxxxxxxxxxxxxx"; 
style="color:#737F92 
!important;padding-right:6px;font-weight:bold;text-decoration:none 
!important;">Nicholas Lemonias.</a></div>   <div 
style="display:table-cell;white-space:nowrap;vertical-align:middle;">   
  <font color="#9FA2A5"><span style="padding-left:6px">14 March 2014 
18:17</span></font></div></div></div>
  <div style="color:#888888;margin-left:24px;margin-right:24px;" 
__pbrmquotes="true" class="__pbConvBody"><div dir="ltr"><div>Google is a
 great service, but according to our proof of concepts (images, poc's, 
codes) presented to Softpedia, and verified</div><div>by&nbsp;a couple of 
recognised experts including OWASP - that was a serious vulnerability.</div>
<div>&nbsp;</div><div>Now you can say whatever you like, and argue about it. 
You can argue about the impact and whatsoever&nbsp;, but that's not the way 
to deal with security issues.&nbsp;</div></div><div class="gmail_extra"><br><br>
<br></div>

<div>_______________________________________________<br>Full-Disclosure -
 We believe in it.<br>Charter: 
<a class="moz-txt-link-freetext" 
href="http://lists.grok.org.uk/full-disclosure-charter.html";>http://lists.grok.org.uk/full-disclosure-charter.html</a><br>Hosted
 and 
sponsored by Secunia - <a class="moz-txt-link-freetext" 
href="http://secunia.com/";>http://secunia.com/</a></div></div>
  <div style="margin:30px 25px 10px 25px;" class="__pbConvHr"><div 
style="display:table;width:100%;border-top:1px solid 
#EDEEF0;padding-top:5px">       <div 
style="display:table-cell;vertical-align:middle;padding-right:6px;"><img
 photoaddress="lem.nikolas@xxxxxxxxxxxxxx" photoname="Nicholas 
Lemonias." src="cid:part1.03010601.07010203@tmacuk.co.uk" 
name="compose-unknown-contact.jpg" height="25px" width="25px"></div>   <div
 
style="display:table-cell;white-space:nowrap;vertical-align:middle;width:100%">
        <a moz-do-not-send="true" href="mailto:lem.nikolas@xxxxxxxxxxxxxx"; 
style="color:#737F92 
!important;padding-right:6px;font-weight:bold;text-decoration:none 
!important;">Nicholas Lemonias.</a></div>   <div 
style="display:table-cell;white-space:nowrap;vertical-align:middle;">   
  <font color="#9FA2A5"><span style="padding-left:6px">14 March 2014 
18:16</span></font></div></div></div>
  <div style="color:#888888;margin-left:24px;margin-right:24px;" 
__pbrmquotes="true" class="__pbConvBody"><div dir="ltr"><div>Google is a
 great service, but according to our proof of concepts (images, poc's, 
codes) presented to Softpedia, and verified</div><div>by&nbsp;a couple of 
recognised experts including OWASP - that was a serious vulnerability.</div>
<div>&nbsp;</div><div>Now you can say whatever you like, and argue about it. 
You can argue about the impact and whatsoever&nbsp;, but that's not the way 
to deal with security 
issues.&nbsp;</div><div>&nbsp;</div><div>&nbsp;</div></div><div 
class="gmail_extra">
<br><br><br></div>

<div>_______________________________________________<br>Full-Disclosure -
 We believe in it.<br>Charter: 
<a class="moz-txt-link-freetext" 
href="http://lists.grok.org.uk/full-disclosure-charter.html";>http://lists.grok.org.uk/full-disclosure-charter.html</a><br>Hosted
 and 
sponsored by Secunia - <a class="moz-txt-link-freetext" 
href="http://secunia.com/";>http://secunia.com/</a></div></div>
  <div style="margin:30px 25px 10px 25px;" class="__pbConvHr"><div 
style="display:table;width:100%;border-top:1px solid 
#EDEEF0;padding-top:5px">       <div 
style="display:table-cell;vertical-align:middle;padding-right:6px;"><img
 photoaddress="lem.nikolas@xxxxxxxxxxxxxx" photoname="Nicholas 
Lemonias." src="cid:part1.03010601.07010203@tmacuk.co.uk" 
name="compose-unknown-contact.jpg" height="25px" width="25px"></div>   <div
 
style="display:table-cell;white-space:nowrap;vertical-align:middle;width:100%">
        <a moz-do-not-send="true" href="mailto:lem.nikolas@xxxxxxxxxxxxxx"; 
style="color:#737F92 
!important;padding-right:6px;font-weight:bold;text-decoration:none 
!important;">Nicholas Lemonias.</a></div>   <div 
style="display:table-cell;white-space:nowrap;vertical-align:middle;">   
  <font color="#9FA2A5"><span style="padding-left:6px">14 March 2014 
18:13</span></font></div></div></div>
  <div style="color:#888888;margin-left:24px;margin-right:24px;" 
__pbrmquotes="true" class="__pbConvBody"><div dir="ltr"><div>Security 
vulnerabilities need to be published and reported. That's the 
spirit.</div><div>&nbsp;</div><div>Attacking
 the researcher, won't make it go away.</div></div><div 
class="gmail_extra"><br><br>
<br></div>

<div>_______________________________________________<br>Full-Disclosure -
 We believe in it.<br>Charter: 
<a class="moz-txt-link-freetext" 
href="http://lists.grok.org.uk/full-disclosure-charter.html";>http://lists.grok.org.uk/full-disclosure-charter.html</a><br>Hosted
 and 
sponsored by Secunia - <a class="moz-txt-link-freetext" 
href="http://secunia.com/";>http://secunia.com/</a></div></div>
  <div style="margin:30px 25px 10px 25px;" class="__pbConvHr"><div 
style="display:table;width:100%;border-top:1px solid 
#EDEEF0;padding-top:5px">       <div 
style="display:table-cell;vertical-align:middle;padding-right:6px;"><img
 photoaddress="mvilas@xxxxxxxxx" photoname="Mario Vilas" 
src="cid:part4.02040405.00090109@tmacuk.co.uk" 
name="postbox-contact.jpg" height="25px" width="25px"></div>   <div 
style="display:table-cell;white-space:nowrap;vertical-align:middle;width:100%">
        <a moz-do-not-send="true" href="mailto:mvilas@xxxxxxxxx"; 
style="color:#737F92 
!important;padding-right:6px;font-weight:bold;text-decoration:none 
!important;">Mario Vilas</a></div>   <div 
style="display:table-cell;white-space:nowrap;vertical-align:middle;">   
  <font color="#9FA2A5"><span style="padding-left:6px">14 March 2014 
15:55</span></font></div></div></div>
  <div style="color:#888888;margin-left:24px;margin-right:24px;" 
__pbrmquotes="true" class="__pbConvBody"><div dir="ltr"><div 
class="gmail_extra"><div class="gmail_quote">On Fri, Mar 14, 2014 at 
12:38 PM, Nicholas Lemonias. <span dir="ltr">&lt;<a 
moz-do-not-send="true" target="_blank" 
href="mailto:lem.nikolas@xxxxxxxxxxxxxx";>lem.nikolas@xxxxxxxxxxxxxx</a>&gt;</span>
 wrote:<br>

<blockquote style="margin:0 0 0 .8ex;border-left:1px #ccc 
solid;padding-left:1ex" class="gmail_quote"><div dir="ltr"><div>Jerome 
of Mcafee&nbsp;has made a very valid point on revisiting&nbsp;&nbsp;separation 
of 
duties in this security instance. </div>

<div>&nbsp;</div><div>Happy to see more professionals with some skills.&nbsp; 
Some
 others have also mentioned the feasibility for Denial of Service 
attacks. Remote code execution by Social Engineering is also a prominent
 scenario.</div>

</div></blockquote><div><br></div><div>Actually, people have been 
pointing out exactly the opposite. But if you insist on believing you 
can DoS an EC2 by uploading files, good luck to you 
then...</div><div>&nbsp;</div><blockquote
 style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex" 
class="gmail_quote"><div dir="ltr">
<div>&nbsp;</div><div>If you can't tell that that is a vulnerability 
(probably coming from a bunch of CEH's), I feel sorry for those 
consultants.</div></div></blockquote><div><br></div><div>You're the only
 one throwing around certifications here. I can no longer tell if you're
 being serious or this is a massive prank.</div>

<div>&nbsp;</div><blockquote style="margin:0 0 0 .8ex;border-left:1px #ccc 
solid;padding-left:1ex" class="gmail_quote"><div dir="ltr"><span 
class="HOEnZb"><font 
color="#888888"><div>&nbsp;</div><div>Nicholas.</div></font></span></div>

<div class="HOEnZb"><div class="h5"><div class="gmail_extra"><br>
<br><div class="gmail_quote">On Fri, Mar 14, 2014 at 10:45 AM, Nicholas 
Lemonias. <span dir="ltr">&lt;<a moz-do-not-send="true" target="_blank" 
href="mailto:lem.nikolas@xxxxxxxxxxxxxx";>lem.nikolas@xxxxxxxxxxxxxx</a>&gt;</span>
 wrote:<br><blockquote style="margin:0 0 0 .8ex;border-left:1px #ccc 
solid;padding-left:1ex" class="gmail_quote"><div dir="ltr"><div 
class="gmail_extra">We are on a different level perhaps. We do certainly
 disagree on those points.</div><div class="gmail_extra">I wouldn't hire
 you as a consultant, if you can't tell if that is a valid 
vulnerability..</div>



<div class="gmail_extra">&nbsp;</div><div class="gmail_extra">&nbsp;</div><div 
class="gmail_extra">Best Regards,</div><div class="gmail_extra">Nicholas
 Lemonias.</div><div><div><div class="gmail_extra">&nbsp;</div><div 
class="gmail_quote">


On Fri, Mar 14, 2014 at 10:10 AM, Mario Vilas <span dir="ltr">&lt;<a 
moz-do-not-send="true" target="_blank" 
href="mailto:mvilas@xxxxxxxxx";>mvilas@xxxxxxxxx</a>&gt;</span>
 wrote:<br>

<blockquote style="margin:0px 0px 0px 
0.8ex;padding-left:1ex;border-left-color:rgb(204,204,204);border-left-width:1px;border-left-style:solid"
 class="gmail_quote"><div dir="ltr">But do you have all the required EH 
certifications? Try this one from the Institute for&nbsp;<div>



Certified Application Security Specialists:&nbsp;<a moz-do-not-send="true" 
target="_blank" href="http://www.asscert.com/";>http://www.asscert.com/</a></div>
<div class="gmail_extra"><div><div>

<br><br><div class="gmail_quote">On Fri, Mar 14, 2014 at 7:41 AM, 
Nicholas Lemonias. <span dir="ltr">&lt;<a moz-do-not-send="true" 
target="_blank" 
href="mailto:lem.nikolas@xxxxxxxxxxxxxx";>lem.nikolas@xxxxxxxxxxxxxx</a>&gt;</span>
 wrote:<br>
<blockquote style="margin:0px 0px 0px 
0.8ex;padding-left:1ex;border-left-color:rgb(204,204,204);border-left-width:1px;border-left-style:solid"
 class="gmail_quote"><div dir="ltr"><div>Thanks 
Michal,</div><div>&nbsp;</div><div>






We are just trying to improve Google's security and contribute to the 
research community after all. If you are still on EFNet give me a shout 
some time.</div>
<div>
&nbsp;</div><div>&nbsp;We have done so and consulted&nbsp;to hundreds of 
clients 
including Microsoft, Nokia, Adobe and some of the world's biggest 
corporations. We are also strict supporters of the ACM code of 
conduct.</div><div>&nbsp;</div>








<div>Regards,</div><div>Nicholas Lemonias.</div><div>AISec 
</div></div><div><div><div
 class="gmail_extra"><br><br><div class="gmail_quote">On Fri, Mar 14, 
2014 at 6:29 AM, Nicholas Lemonias. <span dir="ltr">&lt;<a 
moz-do-not-send="true" target="_blank" 
href="mailto:lem.nikolas@xxxxxxxxxxxxxx";>lem.nikolas@xxxxxxxxxxxxxx</a>&gt;</span>
 wrote:<br>








<blockquote style="margin:0px 0px 0px 
0.8ex;padding-left:1ex;border-left-color:rgb(204,204,204);border-left-width:1px;border-left-style:solid"
 class="gmail_quote"><div dir="ltr"><div>Hi 
Jerome,</div><div>&nbsp;</div><div>Thank
 you for agreeing on access control, and separation of duties. </div>








<div>&nbsp;</div><div>However successful exploitation permits arbitrary 
write() of any file of choice. </div>
<div>&nbsp;</div><div>I could&nbsp;release an exploit code in C Sharp or Python 
that permits multiple file uploads of any file/types, if the Google 
security team feels that this would be necessary. This is unpaid work, 
so we are not&nbsp;so keen on that job.&nbsp;</div>









<div><code></code>&nbsp;</div></div><div><div><div 
class="gmail_extra"><br><br><div
 class="gmail_quote">On Fri, Mar 14, 2014 at 6:04 AM, Jerome Athias <span
 dir="ltr">&lt;<a moz-do-not-send="true" target="_blank" 
href="mailto:athiasjerome@xxxxxxxxx";>athiasjerome@xxxxxxxxx</a>&gt;</span>
 wrote:<br>









<blockquote style="margin:0px 0px 0px 
0.8ex;padding-left:1ex;border-left-color:rgb(204,204,204);border-left-width:1px;border-left-style:solid"
 class="gmail_quote">Hi<br>
<br>
I concur that we are mainly discussing a terminology problem.<br>
<br>
In the context of a Penetration Test or WAPT, this is a Finding.<br>
Reporting this finding makes sense in this context.<br>
<br>
As a professional, you would have to explain if/how this finding is a<br>
Weakness*, a Violation (/Regulations, Compliance, Policies or<br>
Requirements[1])<br>
* I would say Weakness + Exposure = Vulnerability. Vulnerability +<br>
Exploitability (PoC) = Confirmed Vulnerability that needs Business<br>
Impact and Risk Analysis<br>
<br>
So I would probably have reported this Finding as a Weakness (and not<br>
Vulnerability. See: OWASP, WASC-TC, CWE), explaining that it is not<br>
Best Practice (your OWASP link and Cheat Sheets), and even if<br>
mitigative/compensative security controls (Ref Orange Book), security<br>
controls like white listing (or at least black listing. see also<br>
ESAPI) should be 1) part of the [1]security requirements of a proper<br>
SDLC (Build security in) as per Defense-in-Depth security principles<br>
and 2) used and implemented correctly.<br>
NB: A simple Threat Model (i.e. list of CAPEC) would be a solid<br>
support to your report<br>
This would help to evaluate/measure the risk (e.g. CVSS).<br>
Helping the decision/actions around this risk<br>
<br>
PS: interestingly, in this case, I'm not sure that the Separation of<br>
Duties security principle was applied correctly by Google in term of<br>
Risk Acceptance (which could be another Finding)<br>
<br>
So in few words, be careful with the terminology. (don't always say<br>
vulnerability like the media say hacker, see RFC1392) Use a CWE ID<br>
(e.g. CWE-434, CWE-183, CWE-184 vs. CWE-616)<br>
<br>
My 2 bitcents<br>
Sorry if it is not edible :)<br>
Happy Hacking!<br>
<br>
/JA<br>
<a moz-do-not-send="true" target="_blank" 
href="https://github.com/athiasjerome/XORCISM";>https://github.com/athiasjerome/XORCISM</a><br>
<br>
2014-03-14 7:19 GMT+03:00 Michal Zalewski &lt;<a moz-do-not-send="true" 
target="_blank" 
href="mailto:lcamtuf@xxxxxxxxxxx";>lcamtuf@xxxxxxxxxxx</a>&gt;:<br>
<div><div>&gt; Nicholas,<br>
&gt;<br>
&gt; I remember my early years in the infosec community - and sadly, so 
do<br>
&gt; some of the more seasoned readers of this list :-) Back then, I<br>
&gt; thought that the only thing that mattered is the ability to find 
bugs.<br>
&gt; But after some 18 years in the industry, I now know that there's an<br>
&gt; even more important and elusive skill.<br>
&gt;<br>
&gt; That skill boils down to having a robust mental model of what<br>
&gt; constitutes a security flaw - and being able to explain your 
thinking<br>
&gt; to others in a precise and internally consistent manner that 
convinces<br>
&gt; others to act. We need this because the security of a system can't 
be<br>
&gt; usefully described using abstract terms: even the academic 
definitions<br>
&gt; ultimately boil down to saying "the system is secure if it doesn't 
do<br>
&gt; the things we *really* don't want it to do".<br>
&gt;<br>
&gt; In this spirit, the term "vulnerability" is generally reserved for<br>
&gt; behaviors that meet all of the following criteria:<br>
&gt;<br>
&gt; 1) The behavior must have negative consequences for at least one of<br>
&gt; the legitimate stakeholders (users, service owners, etc),<br>
&gt;<br>
&gt; 2) The consequences must be widely seen as unexpected and 
unacceptable,<br>
&gt;<br>
&gt; 3) There must be a realistic chance of such a negative outcome,<br>
&gt;<br>
&gt; 4) The behavior must introduce substantial new risks that go beyond<br>
&gt; the previously accepted trade-offs.<br>
&gt;<br>
&gt; If we don't have that, we usually don't have a case, no matter how<br>
&gt; clever the bug is.<br>
&gt;<br>
&gt; Cheers (and happy hunting!),<br>
&gt; /mz<br>
&gt;<br>
</div></div><div><div>&gt; 
_______________________________________________<br>
&gt; Full-Disclosure - We believe in it.<br>
&gt; Charter: <a moz-do-not-send="true" target="_blank" 
href="http://lists.grok.org.uk/full-disclosure-charter.html";>http://lists.grok.org.uk/full-disclosure-charter.html</a><br>
&gt; Hosted and sponsored by Secunia - <a moz-do-not-send="true" 
target="_blank" href="http://secunia.com/";>http://secunia.com/</a><br>
</div></div></blockquote></div><br></div>
</div></div></blockquote></div><br></div>
</div></div><br>_______________________________________________<br>
Full-Disclosure - We believe in it.<br>
Charter: <a moz-do-not-send="true" target="_blank" 
href="http://lists.grok.org.uk/full-disclosure-charter.html";>http://lists.grok.org.uk/full-disclosure-charter.html</a><br>
Hosted and sponsored by Secunia - <a moz-do-not-send="true" 
target="_blank" 
href="http://secunia.com/";>http://secunia.com/</a><br></blockquote></div><br><br
 clear="all"><div><br></div></div></div><div>-- <br><span 
style="font-family:arial,sans-serif;font-size:13px;border-collapse:collapse">&#8220;There's
 a reason we separate military and the police: one fights the&nbsp;enemy of 
the state, the other serves and protects the people. When the&nbsp;military 
becomes both, then the enemies of the state tend to become&nbsp;the 
people.&#8221;<br>







</span>
</div></div></div>
<br>_______________________________________________<br>
Full-Disclosure - We believe in it.<br>
Charter: <a moz-do-not-send="true" target="_blank" 
href="http://lists.grok.org.uk/full-disclosure-charter.html";>http://lists.grok.org.uk/full-disclosure-charter.html</a><br>
Hosted and sponsored by Secunia - <a moz-do-not-send="true" 
target="_blank" 
href="http://secunia.com/";>http://secunia.com/</a><br></blockquote></div><div
 class="gmail_extra"><br></div></div></div></div></blockquote></div><br></div>
</div></div></blockquote></div><br><br clear="all"><div><br></div>-- <br><span
 
style="font-family:arial,sans-serif;font-size:13px;border-collapse:collapse">&#8220;There's
 a reason we separate military and the police: one fights the&nbsp;enemy of 
the state, the other serves and protects the people. When the&nbsp;military 
becomes both, then the enemies of the state tend to become&nbsp;the 
people.&#8221;<br>

</span>
</div></div>

<pre wrap="">_______________________________________________
Full-Disclosure - We believe in it.
Charter: <a class="moz-txt-link-freetext" 
href="http://lists.grok.org.uk/full-disclosure-charter.html";>http://lists.grok.org.uk/full-disclosure-charter.html</a>
Hosted and sponsored by Secunia - <a class="moz-txt-link-freetext" 
href="http://secunia.com/";>http://secunia.com/</a></pre></div>
  <div style="margin:30px 25px 10px 25px;" class="__pbConvHr"><div 
style="display:table;width:100%;border-top:1px solid 
#EDEEF0;padding-top:5px">       <div 
style="display:table-cell;vertical-align:middle;padding-right:6px;"><img
 photoaddress="lem.nikolas@xxxxxxxxxxxxxx" photoname="Nicholas 
Lemonias." src="cid:part1.03010601.07010203@tmacuk.co.uk" 
name="compose-unknown-contact.jpg" height="25px" width="25px"></div>   <div
 
style="display:table-cell;white-space:nowrap;vertical-align:middle;width:100%">
        <a moz-do-not-send="true" href="mailto:lem.nikolas@xxxxxxxxxxxxxx"; 
style="color:#737F92 
!important;padding-right:6px;font-weight:bold;text-decoration:none 
!important;">Nicholas Lemonias.</a></div>   <div 
style="display:table-cell;white-space:nowrap;vertical-align:middle;">   
  <font color="#9FA2A5"><span style="padding-left:6px">14 March 2014 
11:38</span></font></div></div></div>
  <div style="color:#888888;margin-left:24px;margin-right:24px;" 
__pbrmquotes="true" class="__pbConvBody"><div dir="ltr"><div>Jerome of 
Mcafee&nbsp;has made a very valid point on revisiting&nbsp;&nbsp;separation of 
duties 
in this security instance. </div><div>&nbsp;</div><div>Happy to see more 
professionals with some skills.&nbsp; Some others have also mentioned the 
feasibility for Denial of Service attacks. Remote code execution by 
Social Engineering is also a prominent scenario.</div>
<div>&nbsp;</div><div>If you can't tell that that is a vulnerability 
(probably coming from a bunch of CEH's), I feel sorry for those 
consultants.</div><div>&nbsp;</div><div>Nicholas.</div></div><div 
class="gmail_extra"><br>
<br><br></div>

<div>_______________________________________________<br>Full-Disclosure -
 We believe in it.<br>Charter: 
<a class="moz-txt-link-freetext" 
href="http://lists.grok.org.uk/full-disclosure-charter.html";>http://lists.grok.org.uk/full-disclosure-charter.html</a><br>Hosted
 and 
sponsored by Secunia - <a class="moz-txt-link-freetext" 
href="http://secunia.com/";>http://secunia.com/</a></div></div>
</blockquote>
</body></html>

JPEG image

JPEG image

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/