Creating a YouTube TV that could steal your private videos - $6,000 CSRF

Поделиться
HTML-код
  • Опубликовано: 21 авг 2024

Комментарии • 18

  • @BugBountyReportsExplained
    @BugBountyReportsExplained  3 года назад +2

    Hi there! Welcome to the comment section. I hope you liked the video.
    If you like what I'm doing, sign up for the newsletter to learn with me even more: mailing.bugbountyexplained.com/

  • @reo4680
    @reo4680 3 года назад +2

    awsome video! keep going man! im proud that people from my country are finding bugs like this :)

  • @renganathanofficial
    @renganathanofficial 3 года назад +2

    good one as always :D

  • @machinexa1
    @machinexa1 3 года назад

    Keep up the good work

  • @pratyakshsingh7834
    @pratyakshsingh7834 3 года назад

    Perfectly explained.

  • @DavenSec
    @DavenSec 3 года назад

    Nice video like always ;)

  • @unurbayaramarsaikhan1362
    @unurbayaramarsaikhan1362 3 года назад

    Thank for your work. It help me to understand a bug. :)

  • @zTech300
    @zTech300 3 года назад

    Super

  • @mnageh-bo1mm
    @mnageh-bo1mm 3 года назад +2

    duh ... but 6k is too low for such a vuln

  • @cyberpirate007
    @cyberpirate007 2 года назад

    Google should hire him! 👏👏

  • @mnageh-bo1mm
    @mnageh-bo1mm 3 года назад

    Hey how did he bypass cors policy that allows a site to send get requests in the browser to another site that it doesn't own ??

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад +3

      That's a good question. In this case, we send a POST request with application/x-www-form-urlencoded content-type. As per understanding of CORS rules, this is considered a "simple request". Thus, the browser does NOT send the preflight request (the OPTIONS request which the browser sends to what is the Access-Control-Allow-Origin header). Instead, straight away it sends the POST request that we want and only then observes headers in the response (ACAO in particular).
      In our case, the request will originate from the bad domain - one is not whitelisted by CORS policy. The browser will block us from reading the response bur the request was already sent. In case of CSRF, we don't need to read the response - sending a request is enough for us.
      Reference: developer.mozilla.org/en-US/docs/Web/HTTP/CORS#simple_requests
      This topic is not easy - feel free to ask if you need any clarification.

    • @mnageh-bo1mm
      @mnageh-bo1mm 3 года назад

      ​@@BugBountyReportsExplained
      oh ... i get it ... i thought that you need to read the response to get the attack to work ...
      thanks a lot

    • @BugBountyReportsExplained
      @BugBountyReportsExplained  3 года назад

      @@mnageh-bo1mm no problem mate, It's good to hear a good question in comments 😉

  • @krishg767
    @krishg767 3 года назад

    nice

  • @zbyszggo4626
    @zbyszggo4626 3 года назад

    This is next level shit