Researchers Get $10,000 for Hacking Google Server with Malicious XML

Source: National Cyber Security – Produced By Gregory Evans

A critical vulnerability has been uncovered in Google that could allow an attacker to access the internal files of Google’s production servers. Sounds ridiculous but has been proven by the security researchers from Detectify.The vulnerability resides in the Toolbar Button Gallery (as shown). The team of researchers found a loophole after they noticed that Google Toolbar Button Gallery allows users to customize their toolbars with new buttons. So, for the developers, it is easy to create their own buttons by uploading XML files containing metadata for styling and other such properties.This feature of Google search engine is vulnerable to XML External Entity (XXE).   It is an XML injection that allows an attacker to force a badly configured XML parser to “include” or “load” unwanted functionality that can compromise the security of a web application.“The root cause of XXE vulnerabilities is naive XML parsers that blindly interpret the DTD of the user supplied XML documents. By doing so, you risk having your parser doing a bunch of nasty things. Some issues include: local file access, SSRF and remote file includes, Denial of Service and possible remote code execution. If you want to know how to patch these issues, check out the OWASP […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Researchers Get $10,000 for Hacking Google Server with Malicious XML appeared first on National Cyber Security.

View full post on National Cyber Security