XSS on Gmail

I just read these two blog posts today, it's really interesting.

First one is, XSS on Gmail via Google Chrome.

     Briefly description is, the author found a very severe exploits in 10 minutes. It's an exploit that allows an attacker to use javascript or html as an attached file name and it will be rendered in Google Chrome in every version.

Example of the file name we are talking about is this (without any spaces)
"><img src="" onload="alert(String.fromCharCode(88,83,83))"/>.txt

Second one is, XSS on Gmail via Android Gmail App

     During the time he was finding out the restriction of email address name on Gmail, the author discovered an XSS vulnerability on Gmail App on his Android phone. He investigated further and found that he can also download all e-mails, add a any person to contact list, automatically sending spam to any person, or the worst, download and run/render external file.

Examples of exploited email address


" onload=window.location=''"

Other than these,
      I also found 2 interesting websites from the posts: - this reminds me that you can get some money by finding Google Chrome's vulnerability, and you can get into the hall of fame. - various patterns of how to use XSS

No comments:

Post a Comment