{"id":1147,"date":"2020-12-29T17:14:13","date_gmt":"2020-12-29T17:14:13","guid":{"rendered":"https:\/\/zerothcode.com\/blog\/?p=1147"},"modified":"2020-12-29T17:14:13","modified_gmt":"2020-12-29T17:14:13","slug":"google-bug-docs","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/google-bug-docs\/","title":{"rendered":"A Google Docs Bug Could Have Allowed Hackers See Your Private Documents"},"content":{"rendered":"<p>google bug Google has patched a bug in its feedback tool incorporated across its services that could be exploited by an attacker to potentially steal screenshots of sensitive Google Docs documents simply by embedding them in a malicious website.<\/p>\n<h4>The flaw was discovered on July 9 by security researcher Sreeram KL, google bug<\/h4>\n<h4>for which he was awarded $3133.70 as part of Google&#8217;s Vulnerability Reward Program. google bug<\/h4>\n<p>Many of Google&#8217;s products, including Google Docs, come with a &#8220;Send feedback&#8221; or &#8220;Help Docs improve&#8221; option that allows users to send feedback along with an option to include a screenshot<\/p>\n<p>\u2014 something that&#8217;s automatically loaded to highlight specific issues.<\/p>\n<p>But instead of having to duplicate the same functionality across its services,<\/p>\n<p>the feedback feature is deployed in Google&#8217;s main website (&#8220;www.google.com&#8221;) and integrated to other domains via an iframe element that loads the pop-up&#8217;s content from &#8220;feedback.googleusercontent.com.&#8221;<\/p>\n<div class=\"separator\"><a href=\"https:\/\/thehackernews.com\/images\/-dmL-1cxlprI\/X-sEvFXKjBI\/AAAAAAAABX4\/Zm8vrtysTXgnME2Uq3czPvPmR6Wt7IHxgCLcBGAsYHQ\/s0\/google-doc.jpg\"><img decoding=\"async\" src=\"https:\/\/thehackernews.com\/images\/-dmL-1cxlprI\/X-sEvFXKjBI\/AAAAAAAABX4\/Zm8vrtysTXgnME2Uq3czPvPmR6Wt7IHxgCLcBGAsYHQ\/s0\/google-doc.jpg\" alt=\"\" border=\"0\" data-original-height=\"519\" data-original-width=\"728\" \/><\/a><\/div>\n<p>This also means that whenever a screenshot of the Google Docs window is included,<\/p>\n<p>rendering the image necessitates the transmission of RGB values of every pixel to the parent domain (www.google.com), which then redirects those RGB values to the feedback&#8217;s domain,<\/p>\n<p>which ultimately constructs the image and sends it back in Base64 encoded format.<\/p>\n<p>Sreeram, however, identified a bug in the manner these\u00a0messages\u00a0were passed to &#8220;feedback.googleusercontent.com,&#8221; thus allowing an attacker to modify the frame to an arbitrary,<\/p>\n<p>external website, and in turn, steal and hijack Google Docs screenshots which were meant to be uploaded to Google&#8217;s servers.<\/p>\n<p>Notably, the flaw stems from a lack of\u00a0X-Frame-Options\u00a0header in the Google Docs domain,<\/p>\n<p>which made it possible to change the target origin of the message and exploit the cross-origin communication between the page and the frame contained in it.<\/p>\n<div class=\"video-container\">\n<p><iframe loading=\"lazy\" title=\"A Google Docs Bug Could Have Allowed Hackers See Your Private Documents\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/3yvdqUCE9Oo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<p>While the attack requires some form of user interaction<\/p>\n<p>\u2014 i.e. clicking the &#8220;Send feedback&#8221; button<\/p>\n<p>\u2014 an exploit could easily leverage this weakness to capture the URL of the uploaded screenshot and exfiltrate it to a malicious site.<\/p>\n<p>This can be achieved by embedding a Google Docs file in an iFrame on a rogue website and hijacking the feedback pop-up frame to redirect the contents to a domain of the attacker&#8217;s choice.<\/p>\n<p>Failing to provide a target origin during cross-origin communication raises security concerns in that it discloses the data that&#8217;s sent to any website.<\/p>\n<p>&#8220;Always specify an exact target origin, not *, when you use postMessage to send data to other windows,&#8221;<\/p>\n<p>Mozilla\u00a0documentation\u00a0states. &#8220;A malicious site can change the location of the window without your knowledge, and therefore it can intercept the data sent using postMessage.&#8221;<\/p>\n<p>&nbsp;<\/p>\n<p>You May Also Like to Read: <a href=\"https:\/\/zerothcode.com\/blog\/google-discloses\/\">https:\/\/zerothcode.com\/blog\/google-discloses\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>google bug Google has patched a bug in its feedback tool incorporated across its services that could be exploited by<\/p>\n","protected":false},"author":1,"featured_media":1148,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[37],"tags":[],"yst_prominent_words":[306,265,71,681,115,709,121],"class_list":["post-1147","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hackers-news"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/1147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=1147"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/1147\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/1148"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=1147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=1147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=1147"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=1147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}