[Full-disclosure] Webcast Reminder: Garage4Hackers Ranchoddas Series 2 on Reverse Engineering

2014-03-14 Thread Sandeep Kamble
Webcast Reminder Data, data, data! I can't make bricks without clay Thanks for registering for Garage4hacker'shttp://garage4hackers.us3.list-manage.com/track/click?u=3bbddc138252bc94f75024ab7id=8f7c43f38fe=672cdb4173Ranchoddas Series. Below are details for the online presentation. *Speaker*:

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Jerome Athias
Hi I concur that we are mainly discussing a terminology problem. In the context of a Penetration Test or WAPT, this is a Finding. Reporting this finding makes sense in this context. As a professional, you would have to explain if/how this finding is a Weakness*, a Violation (/Regulations,

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Michal Zalewski
Zakewski, Thank you for your e-mail. I welcome all opinions, that are backed up by evidences. I am not just a security researcher, I am also an academic in the field and lecturer. All right :-) Thank you for the overview of CIA triad. I don't think there's a good probability that our

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Mario Vilas
On Thu, Mar 13, 2014 at 10:30 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: We confirm this to be a valid vulnerability for the following reasons. The access control subsystem is defeated, resulting to arbitrary write access of any file of choice. 1. You Tube defines which file

[Full-disclosure] [CVE-2014-2339] GNUboard SQL Injection Vulnerability

2014-03-14 Thread claepo.wang
==Advisory: GNUboard SQL Injection Vulnerability Author: claepo.w...@dbappsecurity.com.cn Affected Version: GNUboard5(the latest version) Vendor URL: http://sir.co.kr/ Vendor Status: Unfixed(I know little about Korean,so i do not know how to describe this vul to the

[Full-disclosure] MacOSX Safari Firefox Kaspersky RegExp Remote/Local Denial of Service

2014-03-14 Thread [CXSEC]
MacOSX Safari Firefox Kaspersky RegExp Remote/Local Denial of Service http://cxsecurity.com/ 0. Where is the problem? Some time ago I have reported vulnerabilities in regcomp() in BSD implementation (CVE-2011-3336) and GNU libc implementation (CVE-2010-4051 CVE-2010-4052). Now is the

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Julius Kivimäki
Look, you keep calling it a vulnerability with 0 evidence that it's even exploitable. Until you can prove otherwise this is like speculating the potential security repercussions of uploading files to EC2 (Which would probably have potential to be much more severe than what you're discussing here

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
We confirm this to be a valid vulnerability for the following reasons. The access control subsystem is defeated, resulting to arbitrary write access of any file of choice. 1. You Tube defines which file types are permitted to be uploaded. 2. Exploitation is achieved by circumvention of

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Here's my evidence. Live Proof Of Concept == http://upload.youtube.com/?authuser=0upload_id=AEnB2UqVZlaog3GremriQEGDoUK3cdGGPu9MVIfyObgYajjo6i1--uQicn6jhbwsdNrqSF4ApbUbhCcwzdwe4xf_XTbL_t5-aworigin=CiNodHRwOi8vd3d3LnlvdXR1YmUuY29tL3VwbG9hZC9ydXBpbxINdmlkZW8tdXBsb2Fkcw

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Zakewski, Thank you for your e-mail. I welcome all opinions, that are backed up by evidences. I am not just a security researcher, I am also an academic in the field and lecturer. However, from an academic perspective, when it comes to certain security designs the mere existence of unvalidated

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Hi Jerome, Thank you for agreeing on access control, and separation of duties. However successful exploitation permits arbitrary write() of any file of choice. I could release an exploit code in C Sharp or Python that permits multiple file uploads of any file/types, if the Google security team

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Thanks Michal, We are just trying to improve Google's security and contribute to the research community after all. If you are still on EFNet give me a shout some time. We have done so and consulted to hundreds of clients including Microsoft, Nokia, Adobe and some of the world's biggest

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Are you a Google employee...I wonder? There is nothing else to be said regarding this. Our research for remote code execution continues and will let you and Google know once that is confirmed; through the coordinated security program. And please OWASP, is recognised worldwide. Best Regards,

[Full-disclosure] Trixbox all versions , Remote root exploit

2014-03-14 Thread 0u7 5m4r7
# App : Trixbox all versions # vendor : trixbox.com # Author : i-Hmx # mail : n0p1...@gmail.com # Home : security arrays inc , sec4ever.com ,exploit4arab.net Well well well , we decided to give schmoozecom a break and have a look @ fonality products do you think they have better product than the

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Mario Vilas
You're still missing the attack vector (and the point of the discussion too, but that's painfully obvious). On Fri, Mar 14, 2014 at 4:21 AM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: Here's my evidence. Live Proof Of Concept ==

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Pedro Ribeiro
On 13 Mar 2014 14:30, Nicholas Lemonias. lem.niko...@googlemail.com wrote: I suggest you to read on Content Delivery Network Architectures . YouTube.com populates and distributes stored files to multiple servers through a CDN (Content Delivery Architecture), where each video uses more than

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Mario Vilas
But do you have all the required EH certifications? Try this one from the Institute for Certified Application Security Specialists: http://www.asscert.com/ On Fri, Mar 14, 2014 at 7:41 AM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: Thanks Michal, We are just trying to improve

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
We are on a different level perhaps. We do certainly disagree on those points. I wouldn't hire you as a consultant, if you can't tell if that is a valid vulnerability.. Best Regards, Nicholas Lemonias. On Fri, Mar 14, 2014 at 10:10 AM, Mario Vilas mvi...@gmail.com wrote: But do you have all

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread antisnatchor
Nicholas Lemonias. wrote: Hi Jerome, Thank you for agreeing on access control, and separation of duties. However successful exploitation permits arbitrary write() of any file of choice. I could release an exploit code in C Sharp or Python that permits multiple file uploads of any

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Jerome of Mcafee has made a very valid point on revisiting separation of duties in this security instance. Happy to see more professionals with some skills. Some others have also mentioned the feasibility for Denial of Service attacks. Remote code execution by Social Engineering is also a

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Live Proof Of Concept == http://upload.youtube.com/?authuser=0upload_id= AEnB2UqVZlaog3GremriQEGDoUK3cdGGPu9MVIfyObgYajjo6i1-- uQicn6jhbwsdNrqSF4ApbUbhCcwzdwe4xf_XTbL_t5-aworigin= CiNodHRwOi8vd3d3LnlvdXR1YmUuY29tL3VwbG9hZC9ydXBpbxINdmlkZW8tdXBsb2Fkcw

[Full-disclosure] [ MDVSA-2014:059 ] php

2014-03-14 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2014:059 http://www.mandriva.com/en/support/security/

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Sergio 'shadown' Alvarez
Dear Nicholas Lemonias, I don't use to get in these scrapy discussions, but yeah you are in a completetly different level if you compare yourself with Mario. You are definitely a Web app/metasploit-user guy and pick up a discussion with a binary and memory corruption ninja exploit writter like

[Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Go to sleep. -- Forwarded message -- From: Nicholas Lemonias. lem.niko...@googlemail.com Date: Fri, Mar 14, 2014 at 2:16 PM Subject: Re: [Full-disclosure] Google vulnerabilities with PoC To: Sergio 'shadown' Alvarez shad...@gmail.com Go to sleep On Fri, Mar 14, 2014 at 1:50

[Full-disclosure] [ MDVSA-2014:060 ] imapsync

2014-03-14 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2014:060 http://www.mandriva.com/en/support/security/

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Sergio 'shadown' Alvarez
I will, it's late here, but I'm enjoying the show way too much. xD Instead of discussing why don't you show a client side attack with that thing that you call a vulnerability and make every one shut up?, oh wait...because you can't! ;-) A fail has thousand excuses, but success doesn't require

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Enough with this thread. On Fri, Mar 14, 2014 at 2:37 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: I am too buy researching satellite security. Been doing that since the times of TESO, probably before you were born. Have a good night's sleep. On Fri, Mar 14, 2014 at 2:33 PM,

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Mario Vilas
On Fri, Mar 14, 2014 at 12:38 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: Jerome of Mcafee has made a very valid point on revisiting separation of duties in this security instance. Happy to see more professionals with some skills. Some others have also mentioned the

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Mario Vilas
LOL, thanks for the undeserved praise! xD On Fri, Mar 14, 2014 at 2:50 PM, Sergio 'shadown' Alvarez shad...@gmail.com wrote: Dear Nicholas Lemonias, I don't use to get in these scrapy discussions, but yeah you are in a completetly different level if you compare yourself with Mario. You

[Full-disclosure] [ MDVSA-2014:061 ] oath-toolkit

2014-03-14 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2014:061 http://www.mandriva.com/en/support/security/

[Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
People can read the report if they like. Can't you even do basic things like reading a vulnerability report? Can't you see that the advisory is about writing arbitrary files. If I was your boss I would fire you. -- Forwarded message -- From: Nicholas Lemonias.

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread antisnatchor
LOL you're hopeless. Good luck with your business. Brave customers! Cheers antisnatchor Nicholas Lemonias. wrote: People can read the report if they like. Can't you even do basic things like reading a vulnerability report? Can't you see that the advisory is about writing arbitrary files.

[Full-disclosure] Fwd: Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Says the script kiddie... Beg for some publicity. My customers are FTSE 100. -- Forwarded message -- From: Nicholas Lemonias. lem.niko...@googlemail.com Date: Fri, Mar 14, 2014 at 5:58 PM Subject: Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC To: antisnatchor

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
The full-disclosure mailing list has really changed. It's full of lamers nowdays aiming high. On Fri, Mar 14, 2014 at 5:58 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: Says the script kiddie... Beg for some publicity. My customers are FTSE 100. -- Forwarded message

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
You can't even find a cross site scripting on google. Find a vuln on Google seems like a dream to some script kiddies. On Fri, Mar 14, 2014 at 6:00 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: The full-disclosure mailing list has really changed. It's full of lamers nowdays

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread antisnatchor
Ahah, I don't want to loose my time with public bug bounties, it's not even cost-effective. Sei proprio un nabbo Nicholas Lemonias. wrote: You can't even find a cross site scripting on google. Find a vuln on Google seems like a dream to some script kiddies. On Fri, Mar 14, 2014 at 6:00

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Ulisses Montenegro
This is one of the most fun threads I've read in fd, and that's no small feat. Thanks for the laughs. On Fri, Mar 14, 2014 at 3:00 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: The full-disclosure mailing list has really changed. It's full of lamers nowdays aiming high. On

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Mike Hale
No, you're saying something's a vulnerability without showing any indication of how it can be abused. On Fri, Mar 14, 2014 at 11:00 AM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: The full-disclosure mailing list has really changed. It's full of lamers nowdays aiming high. On

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Quite funnily, most erratic comments originate from a @gmail.com host. Does that mean that Google and Co are attacking the researcher ? On Fri, Mar 14, 2014 at 6:06 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: Quite funnily, most erratic comments originate from a @gmail.com host.

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread antisnatchor
LOL I don't work for Google and you can easily verify that. Also, your XSS PoCs suck, they don't even trigger automatically but the victim needs to go with the mouse over the element LOL: http://packetstormsecurity.com/files/125135/Visa-Europe-Cross-Site-Scripting.html Lame Nicholas Lemonias.

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
That's why its called proof of concept, you lamer. Google and Co on the counter attack. hahaha On Fri, Mar 14, 2014 at 6:07 PM, antisnatchor antisnatc...@gmail.comwrote: LOL I don't work for Google and you can easily verify that. Also, your XSS PoCs suck, they don't even trigger

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Too bad the findings were manual.. no tools used. raw http communication. Took me less than 2 minutes to find, following an initial conv I had with Google Sec Team. On Fri, Mar 14, 2014 at 6:02 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: You can't even find a cross site

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Security vulnerabilities need to be published and reported. That's the spirit. Attacking the researcher, won't make it go away. On Fri, Mar 14, 2014 at 6:12 PM, Julius Kivimäki julius.kivim...@gmail.comwrote: Dude, seriously. Just stop. 2014-03-14 20:02 GMT+02:00 Nicholas Lemonias.

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Google is a great service, but according to our proof of concepts (images, poc's, codes) presented to Softpedia, and verified by a couple of recognised experts including OWASP - that was a serious vulnerability. Now you can say whatever you like, and argue about it. You can argue about the impact

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Google is a great service, but according to our proof of concepts (images, poc's, codes) presented to Softpedia, and verified by a couple of recognised experts including OWASP - that was a serious vulnerability. Now you can say whatever you like, and argue about it. You can argue about the impact

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Jerome of MacAfee has made a very valid point on revisiting separation of duties in this security instance. Remote code execution by Social Engineering is also a prominent scenario. If you can't tell that that is a vulnerability (probably coming from a bunch of CEH's), I feel sorry for those

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Laughing at the incompetency of some people, who wish to discredit OWASP and their reports. Say that to any serious professional, and they will laugh at you. Writing arbitrary files to a remote network is a serious risk, irrelevantly of how good and reputable that service is. Best,

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
We have many PoC's including video clips. We may upload for the security world to see. However, this is not the way to treat security vulnerabilities. Attacking the researcher and bringing you friends to do aswell, won't mitigate the problem. ___

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Google research not awarded. http://www.techworm.net/2014/03/security-research-finds-flaws-in.html ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia -

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
You are wrong, because we do have proof of concepts. If we didn't have them, then there would be no case. But if there are video clips, images demonstrating impact - in which case arbitrary file uploads (which is a write() call ) to a remote network, then it is a vulnerability. It is not about

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
We are not asking for a payment. But at least a thank you for our efforts would do. Saying that it is not an issue, to upload remotely any file of choice, that is ridiculous for the organisation they represent. On Fri, Mar 14, 2014 at 7:09 PM, Nicholas Lemonias. lem.niko...@googlemail.com

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
And I am not referring just to Google. But for those people who support that remote uploads to a trusted network is not an issue. Then that also means that firewalls and IPS systems are worthless. Why spend so much time protecting the network layers if a user can send any file of choice to a

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
And I am not referring just to Google. But for those people who support that remote uploads to a trusted network is not an issue. Then that also means that firewalls and IPS systems are worthless. Why spend so much time protecting the network layers if a user can send any file of choice to a

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Then that also means that firewalls and IPS systems are worthless. Why spend so much time protecting the network layers if a user can send any file of choice to a remote network through http... As for the uploaded files being persistent, there is evidence of that. For instance a remote admin

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
It is an example, citing that there has been a security hole on Youtube that needs patching. End of Story. On Fri, Mar 14, 2014 at 7:32 PM, Julius Kivimäki julius.kivim...@gmail.comwrote: Wait, so remote code execution by social engineering wasn't a troll? I'm confused. 2014-03-14 21:28

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
http://upload.youtube.com/?authuser=0upload_id= AEnB2UqVZlaog3GremriQEGDoUK3cdGGPu9MVIfyObgYajjo6i1-- uQicn6jhbwsdNrqSF4ApbUbhCcwzdwe4xf_XTbL_t5-aworigin= CiNodHRwOi8vd3d3LnlvdXR1YmUuY29tL3VwbG9hZC9ydXBpbxINdmlkZW8tdXBsb2Fkcw That information can be queried from the db, where the metadata are

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
My claim is now verified Cheers! On Fri, Mar 14, 2014 at 8:04 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: http://upload.youtube.com/?authuser=0upload_id= AEnB2UqVZlaog3GremriQEGDoUK3cdGGPu9MVIfyObgYajjo6i1-- uQicn6jhbwsdNrqSF4ApbUbhCcwzdwe4xf_XTbL_t5-aworigin=

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
So you can query a file that I uploaded, and you can see that is uploaded successfully and saved. That information does not require the user to be logged in. On Fri, Mar 14, 2014 at 8:08 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: My claim is now verified Cheers! On Fri,

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
You are trying to execute an sh script through a video player. That's an exec() command. So its the wrong way about accessing the file. On Fri, Mar 14, 2014 at 8:20 PM, R D rd.secli...@gmail.com wrote: No it's not. As Chris and I are saying, you don't have proof your file is accessible to

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Are you sure this json response, or this file, will be there in a month? Or in a year? Is the fact that this json response exists a threat to youtube? Can you quantify how of a threat? How much, in dollars, does it hurt their business? This file may be here if the admins don't delete it. Now they

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
So where do you think that information is coming from? The metadata and tags, and headers are contained in a database. The files are stored persistently , since they can be quoted. So the API works both ways. The main thing here is that the files are there, otherwise there metadata information

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
In my expertise, that is a vulnerability. Now if Google doesn't want to fix patch that, it's their choice. However I have already disclosed that to them. On Fri, Mar 14, 2014 at 8:25 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: So where do you think that information is coming

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Mario Vilas
Try learning how to properly send emails before critizicing anyone, pal. ;) On Fri, Mar 14, 2014 at 6:44 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: People can read the report if they like. Can't you even do basic things like reading a vulnerability report? Can't you see that

Re: [Full-disclosure] Fwd: Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Mario Vilas
Not to mention imaginary. On Fri, Mar 14, 2014 at 6:58 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: Says the script kiddie... Beg for some publicity. My customers are FTSE 100. -- Forwarded message -- From: Nicholas Lemonias. lem.niko...@googlemail.com Date:

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Mario Vilas
[image: Inline image 1] On Fri, Mar 14, 2014 at 7:07 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: Quite funnily, most erratic comments originate from a @gmail.com host. Does that mean that Google and Co are attacking the researcher ? On Fri, Mar 14, 2014 at 6:06 PM, Nicholas

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Mario Vilas
So if you can upload a file to Google Drive and trick someone to run it, you'd call that a vulnerability too? Hey, I've got another one. I can upload a video on Youtube telling people to download and install a virus. I'll claim a prize too! Keep at it man, you're hilarious! xDDD /me goes grab

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Mario Vilas
Please provide an attack scenario. Can you do that? On Fri, Mar 14, 2014 at 9:23 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: Are you sure this json response, or this file, will be there in a month? Or in a year? Is the fact that this json response exists a threat to youtube?

[Full-disclosure] CosmoShop unprotected admin-script pwd.cgi probably in all versions 8.0

2014-03-14 Thread Rene Fischer
*) Author: l0om ( http://l0om.org ) *) Date: 10.03.2014 *) Overview: Cosmoshop is installed with a lot of admin scripts which should be only accessible as the logged-in admin. The script pwd.cgi is not protected and will create a .htaccess file for the admin-directory with any content. This

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Julius Kivimäki
Dude, seriously. Just stop. 2014-03-14 20:02 GMT+02:00 Nicholas Lemonias. lem.niko...@googlemail.com: You can't even find a cross site scripting on google. Find a vuln on Google seems like a dream to some script kiddies. On Fri, Mar 14, 2014 at 6:00 PM, Nicholas Lemonias.

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Thomas MacKenzie
You have a Googlemail account. How do we know you don't work for Google too... Inception type stuff going on here. Nicholas Lemonias. 14 March 2014 18:17 Google is a great service, but according to our proof of concepts (images, poc's, codes) presented to Softpedia,

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Alfredo Ortega
Mario has years of experience (more than 10 in fact) in exploit writing and vulnerability assessment. I would consider his position on the subject. If you don't believe me, Argentina extended me certifications that proves that I can tell who has vulnerability assesment skills and who does not.

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Alfredo Ortega
Oh and this guy Shadown seems pretty knowledgeable too. BTW now I have to read what is this about,lets see... Alright, from TFA: That means that a door was open for anyone to upload any file of choice. Whether this is a security vulnerability or not, I will leave that to your discretion Not

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Krzysztof Kotowicz
Nicholas, seriously, just stop. You have found an 'arbitrary file upload' in a file hosting service and claim it is a serious vulnerability. With no proof that your 'arbitrary file' is being used anywhere in any context that would lead to code execution - on server or client side. You cite OWASP

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread J. Tozo
congrats for your discover, get you prize [image: 24167992.jpg (1024×768)] On Fri, Mar 14, 2014 at 3:56 PM, Nicholas Lemonias. lem.niko...@googlemail.com wrote: Google research not awarded. http://www.techworm.net/2014/03/security-research-finds-flaws-in.html

Re: [Full-disclosure] Google vulnerabilities with PoC

2014-03-14 Thread Alfredo Ortega
If he can change the mime type, then he indeed may have an attack vector, e.g. he could upload a complete youtube-lookalike site and snatch credentials. If you can access the fake site via HTTPS with a youtube cert, it's an obvious vulnerability. On 03/14/2014 07:05 AM, Mario Vilas wrote:

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Krzysztof Kotowicz
Care to report the same to Dropbox and Pastebin? It's a gold mine, you know... 2014-03-14 20:09 GMT+01:00 Nicholas Lemonias. lem.niko...@googlemail.com: You are wrong, because we do have proof of concepts. If we didn't have them, then there would be no case. But if there are video clips,

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Julius Kivimäki
Wait, so remote code execution by social engineering wasn't a troll? I'm confused. 2014-03-14 21:28 GMT+02:00 Nicholas Lemonias. lem.niko...@googlemail.com: Then that also means that firewalls and IPS systems are worthless. Why spend so much time protecting the network layers if a user can

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread R D
Then that also means that firewalls and IPS systems are worthless. Why spend so much time protecting the network layers if a user can send any file of choice to a remote network through http... well, if you are running a file upload system, or any webserver, you really should block any incoming

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Chris Thompson
Hi Nicholas, Again, you hypothesize that you are getting a response from the database, but you really don't know that. You have no idea when the code is doing behind the endpoint. upload.youtube.com is simple an endpoint that you are sending a request to and getting a response from - Can you

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread R D
No it's not. As Chris and I are saying, you don't have proof your file is accessible to others, only that is was uploaded. Now, you see, when you upload a video to youtube, you get the adress where it will be viewable in the response. In your case :

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Yvan Janssens
Does anybody still have some popcorn left? They ran out of it in the tax free zone in here due to this thread... Kind regards, Yvan Janssens Sent from my PDA - excuse me for my brevity On 14 Mar 2014, at 18:40, Nicholas Lemonias. lem.niko...@googlemail.com wrote: We have many PoC's

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread R D
I'm going to try to spell it out clearly. You don't have unrestricted file upload[1]. Keep in mind you're trying to abuse youtube, which is essentially a video file upload service. So the fact that you can upload files is not surprising. Now you're uploading non-video files. Cool. But not

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Chris Thompson
Hi Nikolas, Please do read (and understand) my entire email before responding - I understand your frustration trying to get your message across but maybe this will help. Please put aside professional pride for the time being - I know how it feels to be passionate about something yet have others

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Krzysztof Kotowicz
2014-03-14 20:28 GMT+01:00 Nicholas Lemonias. lem.niko...@googlemail.com: Then that also means that firewalls and IPS systems are worthless. Why spend so much time protecting the network layers if a user can send any file of choice to a remote network through http... No, they are not

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread J. Tozo
Hey dude just give up! You can convince a lot of journalists without professional skills but if you cant convince Google or at least the community, so you doing it wrong. by the way you can upload everything to youtube just tricking the file's magic number but you cant retrieve it back. so what?

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Go to sleep. You have absolutely no understanding of the vulnerability, nor you have the facts. If you want a full report ask Softpedia, because we aint releasing them. On Fri, Mar 14, 2014 at 8:39 PM, R D rd.secli...@gmail.com wrote: You are trying to execute an sh script through a video

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Happy trolling... On Fri, Mar 14, 2014 at 7:49 PM, R D rd.secli...@gmail.com wrote: Then that also means that firewalls and IPS systems are worthless. Why spend so much time protecting the network layers if a user can send any file of choice to a remote network through http... well, if you

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Michal Zalewski
Oh, wow :-) To put things in perspective, it probably helps to understand that virtually all video hosting sites perform batch, queue-based conversions of uploaded content. There is a good reason for this design: video conversions are extremely CPU-intensive - and an orderly, capped-throughput

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
If you wish to talk seriously about the problem, please send me an email privately. And we can talk about what we have found so far, and perhaps present some more proof of concepts for this on going research. This is between the researcher and Google. People who do not have the facts have been,

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
You are too vague. Please keep this to a level. Thank you. *Best Regards,* *Nicholas Lemonias* *Advanced Information Security Corporation.* On Sat, Mar 15, 2014 at 5:06 AM, Colette Chamberland cjchamberl...@gmail.com wrote: Omg please for the love of all things human STFU!!! Sent from

Re: [Full-disclosure] Fwd: Google vulnerabilities with PoC

2014-03-14 Thread Nicholas Lemonias.
Correct. The mime type can be circumvented. We can confirm this to be a valid vulnerability. For the PoC's : http://news.softpedia.com/news/Expert-Finds-File-Upload-Vulnerability-in-YouTube-Google-Denies-It-s-a-Security-Issue-431489.shtml On Fri, Mar 14, 2014 at 8:40 PM, Krzysztof Kotowicz