Latest YouTube Video

Thursday, May 11, 2017

[FD] DefenseCode ThunderScan SAST Advisory: GOOGLE google-api-php-client Multiple Security Vulnerabilities

DefenseCode ThunderScan SAST Advisory GOOGLE google-api-php-client Multiple Security Vulnerabilities Advisory ID: DC-2017-04-012 Advisory Title: google-api-php-client Multiple XSS Vulnerabilities Advisory URL: http://ift.tt/2pASUCR Software: google-api-php-client Software Language: PHP Version: 2.1.3 and below Vendor Status: Vendor contacted, vulnerability confirmed Release Date: 2017-05-10 Risk: Medium 1. General Overview =================== During the security audit of google-api-php-client (Google's PHP client library for accessing Google APIs) multiple XSS vulnerabilities were discovered using DefenseCode ThunderScan SAST application source code security analysis platform. More information about ThunderScan SAST is available at URL: http://ift.tt/Vn2J4r 2. Software Overview ==================== According to the API developers, the Google API Client Library enables you to work with Google APIs such as Google+, Drive, or YouTube on your server. The developers further noted: "This client library is in beta. We will make an effort to support the library and maintain backwards compatibility in the future, but we reserve the right to make incompatible changes when necessary." Homepage: http://ift.tt/ZIdowR http://ift.tt/1aHqxFd 3. Brief Vulnerability Description ================================== During the security analysis, ThunderScan SAST discovered Cross Site Scripting vulnerability in Google's PHP client library for accessing Google APIs (google-api-php-client). The vulnerabilities were found in the sample code for using the Google's URL Shortener. The Cross-Site Scripting vulnerability can enable the attacker to construct the URL that contains malicious JavaScript code. If the administrator of the site makes a request to such an URL, the attacker's code will be executed, with unrestricted access to the site in question. The attacker can entice the administrator to visit the URL in various ways, including sending the URL by email, posting it as a part of the comment on the vulnerable site or another forum. Once the unsuspecting user has visited such an URL, the attacker can proceed to send requests to the API on the behalf of the victim from his JavaScript. 3.1. Cross-Site Scripting Vulnerable Function: Variable: $_SERVER['PHP_SELF'] Vulnerable URL: http://ift.tt/2po72nZ File: google-api-php-client\examples\url-shortener.php

Source: Gmail -> IFTTT-> Blogger

No comments: