lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CA+CewVCj6aA-VBs4oTYF8sUL0PW2s95iF21nye1M7AmK95+Ejg@mail.gmail.com>
Date: Thu, 6 Mar 2014 22:23:43 +0000
From: "Nicholas Lemonias." <lem.nikolas@...glemail.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Live PoC - Confirming completion of arbitrary
 file uploads to You Tube's Servers

   _____  .___  _________
  /  _  \ |   |/   _____/
 /  /_\  \|   |\_____  \
/    |    \   |/        \
\____|__  /___/_______  /

        \/            \/  Corporation



 Google's YouTube Arbitrary File Upload Vulnerability Report
 ##################################################

 Author: Mr Nicholas Lemonias. (Information Security Specialist)

 Credits: Advanced Information Security Corporation, (USA)
  Type: Web Application / Unrestricted File Upload


 (Upload of other file-formats not supported by default function)



########################################################



Live PoC - Confirming completion of arbitrary uploads to Google's Servers,
as of today.


############################################################



http://upload.youtube.com/?authuser=0&upload_id=AEnB2UqVZlaog3GremriQEGDoUK3cdGGPu9MVIfyObgYajjo6i1--uQicn6jhbwsdNrqSF4ApbUbhCcwzdwe4xf_XTbL_t5-aw&origin=CiNodHRwOi8vd3d3LnlvdXR1YmUuY29tL3VwbG9hZC9ydXBpbxINdmlkZW8tdXBsb2Fkcw

PoC Image: http://oi59.tinypic.com/fdg4mu.jpg




File Uploads in PoC: Bash Script Upload


Full report can be found at:
http://dl.packetstormsecurity.net/1403-exploits/Google-Report2702.pdf











Thanks,





















Disclaimer

 ##################################
 The views expressed in the publications do not imply endorsement. Advanced
 Information Security Corporation is not responsible, and will not be held
 liable for any damages results from the use or distribution of
  such information in any way. All information are posted on an " AS IS "
 condition, under the FOI.
 All material on these pages, including without limitation text, logos,
 icons, photographs and all other artwork, is copyright material of
  Advanced Information Security Corporation, unless otherwise stated.

 Unauthorised copy, distribution or reproduction of information, contained
 in this report, is strictly prohibited.
 Therefore use of this material may only be made with the express, prior
  written permission of Advanced Information Security Corporation who is the
 author of this advisory;

 Material provided by any third party, including material obtained through
 links to other websites, is likely to be the copyright material of the
  author. Permission to copy or otherwise use such material must be obtained
 from the author.
 Advanced Information Security seeks to ensure that information contained in
 these pages is accurate at all times.
  However, no liability or responsibility is accepted arising from reliance
 upon the information contained in these pages or any other information
 accessed via this site, including without limitation for information
  reached via links on this site to external sites.

 This vulnerability report is always posted for the wider benefit of the
 security community, to help mature the practise and for education
 purposes, again on an "AS IS" condition and without any warranties.
  Advanced Information Security disclaims all warranties, including the
 warranty of merchantability and capability fit for a particular purpose;
 Please note that information contained are posted under the FOI, on an 'AS
  IS condition', and as per best security practise.
 ####################################################################


 * Copyrights Advanced Information Security Corp (c), 2014 *

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ