Full Disclosure mailing list archives
RE: Google and Yahoo search engine zero-day code
From: "Edward Pearson" <Ed () unityitservices co uk>
Date: Wed, 5 Jul 2006 09:22:22 +0100
"Google and Yahoo did not take our original seriously" This seems to be your tagline n3td3v. There's a damn good reson nothing you do is taken seriously, the quicker you learn why, the easier life is going to be for you. -----Original Message----- From: full-disclosure-bounces () lists grok org uk [mailto:full-disclosure-bounces () lists grok org uk] On Behalf Of n3td3v Sent: 04 July 2006 19:00 To: full-disclosure () lists grok org uk Subject: [Full-disclosure] Google and Yahoo search engine zero-day code Exploit: Zero-day Status: High Type: Hi-Jack corporate crawler machines which have vulnerable robot cahcing software installed We've issued two zero-day warnings so far, OneCare and Cisco Systems Today's disclosure involves Google and Yahoo search engines: All you need to do is put in the code to a web page, when Google and Yahoo visit it, then the code exploits the software they use and makes them start caching 'other' pages. Including 'no index' pages, where sites have setup a robot text file on their server to protect corporate and consumer interests. We already gave an example of this earlier.... http://groups.google.com/group/n3td3v/browse_thread/thread/542b78eaabea0 15a/5b1c58ab92b11c4f The exploit allows you to insert 'arbitrary' code, which also means denial of service or 'crash' for short. This means the profit of GOOG and YHOO are compromised, but MOREOVER (Hi robert lemos) this means you can get Google and Yahoo to cache sensitive data. The cached data isn't avaiable to the public per say, because in the 'arbitrary' code, you assign a special encryption to the cache, that only the hacker knows. This means specific users use the search engine, with a robot to automatically harvest the exploited data..... this part of the attack is possible because Google and Yahoo don't have 'word verfication' on all search queries. MOREOVER (Hi robert lemos), the compromised data, to which we exploit is used to break into Google and Yahoo, ebcause we have a list of all the corporate users logged in. However, all web servers are vulnerable, but our focus is Google and Yahoo employees.... you can use the exploit to get credit cards and other evils. Take care n3td3v research branch Google and Yahoo did not take our original seriously, so we re-allocate their memory today. This is ciritcal, but Henri and Mark don't talk to me anymore on Yahoo Messenger, so we can't pass info across to the vendor... and the security () yahoo-inc com address you get no reply, so, its upto the international security community now for Google and Yahoo to get this patched once and for all. http us today at n3td3v.googlepages.com We work our wicked ways...... _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Google and Yahoo search engine zero-day code n3td3v (Jul 04)
- Re: Google and Yahoo search engine zero-day code n3td3v (Jul 04)
- RE: Google and Yahoo search engine zero-day code Edward Pearson (Jul 05)
- Re: Google and Yahoo search engine zero-day code Denis Jedig (Jul 05)
- Re: Google and Yahoo search engine zero-day code Dave "No, not that one" Korn (Jul 05)
- Re: Re: Google and Yahoo search engine zero-day code Patrick Fitzgerald (Jul 07)
- Re: Google and Yahoo search engine zero-day code Dave "No, not that one" Korn (Jul 05)
- <Possible follow-ups>
- Re: Re: Google and Yahoo search engine zero-day code ninjadaito (Jul 10)