rozab 2 days ago

Would like to highlight that this webpage, interactive 'screenshots' and all, is 31kb

  • altbdoor 2 days ago

    Ah I see, it makes sense now that they aren't screenshots, and are instead interactive HTML/CSS/JS(?) bits.

    Was suspicious of how high quality the screenshots were in mobile, but didn't bother to click on them. Neat!

    • rebane2001 2 days ago

      No JS on the page, only HTML/CSS :)

      • efskap 7 hours ago

        The checkbox trick for the clickable Review button is so cool! Loved the easter egg links to various videos too

Goofy_Coyote 9 hours ago

Absolutely loved everything about this.

The attack, the explanation, the webpage, the writing.

It’s an easy 10.

Huge thanks for writing your whole thought process, including things that you tried and didn’t work.

I’m going to use this post as an example for how a great writeup should be done.

pcthrowaway 2 days ago

Weird to see so little traction on this novel attack.

Honestly, considering this allows anyone to access anyone else's private drive files, I would have expected the payout to be much higher

  • echoangle 2 days ago

    You have to trick someone into opening your presentation and clicking a specific button, that’s not something a random person knowing my email could easily do. It’s a problem but I wouldn’t exactly say it allows anyone to access anyone else’s private drive files.

    • a012 2 days ago

      My company IT sec person sent a presentation and asked everybody to follow a link inside the slide to go to the training website. So never underestimate a attack vector, also security is just a joke.

    • az226 2 days ago

      One click is all it takes. That’s the lowest on the totem pole of social engineering.

    • dredmorbius 2 days ago

      It is the sort of direct targeted attack one might expect a motivated adversary to undertake.

      And perhaps those who are cultivating botnets or other widespread attacks.

    • fragmede 2 days ago

      A random person knowing your email isn't totally random though. a normal person's email address is enough to track down some known associates. Spoof the email as coming from a business partner as the new deck for a side hustle, and the target has been phished. Multiply across every email leaked in recent mega leaks and it's a good thing it was patched!

ravishar313 a day ago

This was so good. Never thought things so trivial can be made into such attacks.

0dayz 2 days ago

One major reason I either only watch Youtube on no account or dedicated Youtube Google account.

  • sushid a day ago

    This specific security vulnerability was the main reason you watched Youtube on a dedicated account?

  • rebane2001 2 days ago

    I'm not sure how that'd save you here unless you go out of your way to block the youtube domain entirely.

Jerrrry 19 hours ago

This was impressive beyond what I can ingest before a full pot of coffee.

Bravo

  • changexd 4 hours ago

    I think comparing to other system vulnerability such as "if you make X library do Y thing(...10 more steps skipped), you can do RCE", this is fairly understandable for me, at least I know how it works, i guess this also means this exploit can be easily accessed?

nullc 2 days ago

How can you tell if your root folder has been shared this way? Doesn't look like the root folder's sharing settings are accessible via the normal UI.

  • rebane2001 2 days ago

    You cannot share your Root folder, I just threw it in there as a fun bit of unrelated trivia about Drive :). If you attempt to share it (you can try!) you'll just get an error.