Advisory: Gmail – Google Docs Cookie Hijacking through PDF Repurposing

Google docs network was vulnerable to PDF re purposing attacks. The vulnerability was disclosed to Google with a discretion. This is done to mitigate the risk . Google has worked over it and patched it with in a period of 5 days. The Google doc has been refined and support for adobe plugin is removed. The user security is the prime issue because millions of user were at risk if this attack persisted in the open environment. Integrated accounts were more susceptible as certain credentials could be used to access other accounts. Thanks to Google for considering the recommendation and changing the working behavior of specific components at risk.

The detailed advisory is released here:

By |2011-04-08T13:43:11-05:00May 9, 2009|Hackers For Charity, Informer Blog, Long Journey To Africa|Comments Off on Advisory: Gmail – Google Docs Cookie Hijacking through PDF Repurposing

Hot packet-on-packet 0day action!!! Okay, simply more old 0day…

WARNING - POSSIBLE IMMATURE CURSING AHEAD. OK *ACTUAL* IMMATURE CURSING, WTF... Well, apparently it was a real popular thing to give away a couple of 0day exploits, so more 0day is being given away! Again this is from the good old days at BindView when your buddy SN was on the RAZOR team.

By |2011-04-08T13:43:11-05:00May 8, 2009|Hackers For Charity, Informer Blog, Long Journey To Africa|Comments Off on Hot packet-on-packet 0day action!!! Okay, simply more old 0day…

WhitePaper – PDF Silent HTTP Form Repurposing Attacks

This paper sheds light on the modified approach to trigger web attacks through JavaScript protocol handler in the context of browser when a PDF is opened in it. As we have seen, the kind of security mechanism implemented by Adobe in order to remove the insecurities that originate directly from the standalone PDF document in order to circumvent cross domain access. The attack is targeted on the web applications that allow PDF documents to be uploaded on the web server.

Go to Top