<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: MOSEB-15: Vulnerabilities at images.google.com</title>
	<link>http://websecurity.com.ua/1049/</link>
	<description></description>
	<pubDate>Mon, 13 Apr 2026 09:54:43 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1049/#comment-338163</link>
		<pubDate>Sun, 10 Oct 2010 20:29:25 +0000</pubDate>
		<guid>http://websecurity.com.ua/1049/#comment-338163</guid>
					<description>&lt;blockquote&gt;Second, the XSS attack. I seriously don’t even have a clue how I would have used that to attack a site, but regardless, it is the same thing, right?&lt;/blockquote&gt;
In case of RXI holes at images.google.com and some other sites (which I wrote about in my news), it's not possible to use XSS to attack users of that site, i.e. to steal cookies. Because code executes on other site (not target site). It's only possible to execute JS code (malicious one), e.g. for spreading of malware.

But there are other RXI holes at other sites, like in case of &lt;a href="/2534/" rel="nofollow"&gt;RXI at webpark.ru&lt;/a&gt;, where it's possible to conduct XSS attacks directly on users of this site (because code executes at this site).

&lt;blockquote&gt;I’m being accused of hacking someone’s site using the vulnerability listed on this page&lt;/blockquote&gt;
From above-mentioned you can see, that you can't use this hole to attack somes sites dirrectly with using this hole (i.e. by stealing someone's cookie and get into his account), which can be made by other RXI holes. But this vulnerability at images.google.com can be used for phishing and malware spreading ;-).</description>
		<content:encoded><![CDATA[<blockquote><p>Second, the XSS attack. I seriously don’t even have a clue how I would have used that to attack a site, but regardless, it is the same thing, right?</p></blockquote>
<p>In case of RXI holes at images.google.com and some other sites (which I wrote about in my news), it&#8217;s not possible to use XSS to attack users of that site, i.e. to steal cookies. Because code executes on other site (not target site). It&#8217;s only possible to execute JS code (malicious one), e.g. for spreading of malware.</p>
<p>But there are other RXI holes at other sites, like in case of <a href="/2534/" rel="nofollow">RXI at webpark.ru</a>, where it&#8217;s possible to conduct XSS attacks directly on users of this site (because code executes at this site).</p>
<blockquote><p>I’m being accused of hacking someone’s site using the vulnerability listed on this page</p></blockquote>
<p>From above-mentioned you can see, that you can&#8217;t use this hole to attack somes sites dirrectly with using this hole (i.e. by stealing someone&#8217;s cookie and get into his account), which can be made by other RXI holes. But this vulnerability at images.google.com can be used for phishing and malware spreading <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> .
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1049/#comment-338162</link>
		<pubDate>Sun, 10 Oct 2010 20:12:28 +0000</pubDate>
		<guid>http://websecurity.com.ua/1049/#comment-338162</guid>
					<description>&lt;blockquote&gt;Since I’m being accused of using this vulnerability&lt;/blockquote&gt;
&lt;strong&gt;John&lt;/strong&gt;

Concerning this particular vulnerability at images.google.com, which allowed Cross-Site Scripting and Content Spoofing attacks, then this hole is already fixed by Google. It was done some time ago - I found it this year. But there are way how to "resurrect" this hole and conduct these attacks again :-) (and sometime I'll write article about this method).

But there are many other Remote XSS Include (RXI) holes (aka Frame Injection) in Internet, so you can easily find such ones for your testing. Including such major sites as Google and Yahoo, as on &lt;a href="/2939/" rel="nofollow"&gt;babelfish.altavista.com and babelfish.yahoo.com&lt;/a&gt; and other sites.

&lt;blockquote&gt;I think this is what you’re referring to as the content spoofing attack, right?&lt;/blockquote&gt;
Creating a link which must be visited by victim is a way to trigger the attack (which concerns both XSS and Content Spoofing attacks), but it's not Content Spoofing. If one link to one site leads to another site, it's Redirector vulnerability (aka URL Redirector Abuse in WASC v.2.0). By content spoofing I mean that many parameters can be spoofed, such as small image (i.e imgurl leads to one site and imgrefurl to another).</description>
		<content:encoded><![CDATA[<blockquote><p>Since I’m being accused of using this vulnerability</p></blockquote>
<p><strong>John</strong></p>
<p>Concerning this particular vulnerability at images.google.com, which allowed Cross-Site Scripting and Content Spoofing attacks, then this hole is already fixed by Google. It was done some time ago - I found it this year. But there are way how to &#8220;resurrect&#8221; this hole and conduct these attacks again <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' />  (and sometime I&#8217;ll write article about this method).</p>
<p>But there are many other Remote XSS Include (RXI) holes (aka Frame Injection) in Internet, so you can easily find such ones for your testing. Including such major sites as Google and Yahoo, as on <a href="/2939/" rel="nofollow">babelfish.altavista.com and babelfish.yahoo.com</a> and other sites.</p>
<blockquote><p>I think this is what you’re referring to as the content spoofing attack, right?</p></blockquote>
<p>Creating a link which must be visited by victim is a way to trigger the attack (which concerns both XSS and Content Spoofing attacks), but it&#8217;s not Content Spoofing. If one link to one site leads to another site, it&#8217;s Redirector vulnerability (aka URL Redirector Abuse in WASC v.2.0). By content spoofing I mean that many parameters can be spoofed, such as small image (i.e imgurl leads to one site and imgrefurl to another).
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: John</title>
		<link>http://websecurity.com.ua/1049/#comment-338093</link>
		<pubDate>Sat, 09 Oct 2010 23:12:04 +0000</pubDate>
		<guid>http://websecurity.com.ua/1049/#comment-338093</guid>
					<description>Since I'm being accused of using this vulnerability to hack a site, let me see if I understand the vulnerabilities as you see them.

First, by putting in whatever url I want for the imagerefurl, I can make someone believe they are going to images.google.com but simply have the path go to whatever site I want them to go to.   This would require the attacked to click on a link, and for me to get them that link somehow. I think this is what you're referring to as the content spoofing attack, right?

Second, the XSS attack. I seriously don't even have a clue how I would have used that to attack a site, but regardless, it is the same thing, right? I construct a link that would be the hack, I then have to get the target to click on the link. I'm not creating a link and clicking on it myself to attack a third site?

Seriously, I'm not trying to play stupid. I'm being accused of hacking someone's site using the vulnerability listed on this page and my black hat knowledge is focused in the click fraud world (where I'm the one fighting click fraud.)</description>
		<content:encoded><![CDATA[<p>Since I&#8217;m being accused of using this vulnerability to hack a site, let me see if I understand the vulnerabilities as you see them.</p>
<p>First, by putting in whatever url I want for the imagerefurl, I can make someone believe they are going to images.google.com but simply have the path go to whatever site I want them to go to.   This would require the attacked to click on a link, and for me to get them that link somehow. I think this is what you&#8217;re referring to as the content spoofing attack, right?</p>
<p>Second, the XSS attack. I seriously don&#8217;t even have a clue how I would have used that to attack a site, but regardless, it is the same thing, right? I construct a link that would be the hack, I then have to get the target to click on the link. I&#8217;m not creating a link and clicking on it myself to attack a third site?</p>
<p>Seriously, I&#8217;m not trying to play stupid. I&#8217;m being accused of hacking someone&#8217;s site using the vulnerability listed on this page and my black hat knowledge is focused in the click fraud world (where I&#8217;m the one fighting click fraud.)
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1049/#comment-47365</link>
		<pubDate>Thu, 28 Jun 2007 18:55:14 +0000</pubDate>
		<guid>http://websecurity.com.ua/1049/#comment-47365</guid>
					<description>Alex, in this case Same Origin Policy (SOP) prevent access to sibling documents (and attacker can't get cookies). So RXI is less dangerous than other types of XSS, but don't forget about SOP bypassing methods ;) (in particular using bugs in browser to bypass SOP).

And there are many others attacks vectors, than cookies stealing. Like XSS for remote controlling, redirecting (as I show in the post) for phishing and others attacks, and especially code execution as I said before. By code execution I mean that bad guys can execute malicious code in user's browser (while hiding behind other site) - it can be used for malware, spyware, viruses, trojans and exploits execution.

So number of attacks is limited for RHI/RXI, but still wide. Therefore this type of vulns are dangerous and web developers need to be aware of it.</description>
		<content:encoded><![CDATA[<p>Alex, in this case Same Origin Policy (SOP) prevent access to sibling documents (and attacker can&#8217;t get cookies). So RXI is less dangerous than other types of XSS, but don&#8217;t forget about SOP bypassing methods <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_wink.gif' alt=';)' class='wp-smiley' />  (in particular using bugs in browser to bypass SOP).</p>
<p>And there are many others attacks vectors, than cookies stealing. Like XSS for remote controlling, redirecting (as I show in the post) for phishing and others attacks, and especially code execution as I said before. By code execution I mean that bad guys can execute malicious code in user&#8217;s browser (while hiding behind other site) - it can be used for malware, spyware, viruses, trojans and exploits execution.</p>
<p>So number of attacks is limited for RHI/RXI, but still wide. Therefore this type of vulns are dangerous and web developers need to be aware of it.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Alex</title>
		<link>http://websecurity.com.ua/1049/#comment-39176</link>
		<pubDate>Sun, 17 Jun 2007 07:09:09 +0000</pubDate>
		<guid>http://websecurity.com.ua/1049/#comment-39176</guid>
					<description>Malicious code doesn't have access to sibling documents in the frameset because of Single Origin Policy, nor to cookies. That limits the number of attacks which are possible with such XSS.</description>
		<content:encoded><![CDATA[<p>Malicious code doesn&#8217;t have access to sibling documents in the frameset because of Single Origin Policy, nor to cookies. That limits the number of attacks which are possible with such XSS.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/1049/#comment-39163</link>
		<pubDate>Sat, 16 Jun 2007 23:20:21 +0000</pubDate>
		<guid>http://websecurity.com.ua/1049/#comment-39163</guid>
					<description>Yes, Alex, Remote HTML Include (RHI) is perfect phishing tool :-). Using a frame in a frameset of other site (for malicious purposes) is hole by design. But in case of malicious purposes this become a real security hole. It is Abuse of Functionality by WASC classification (for RHI), or it is Abuse of Functionality + XSS (for RXI).

In case of Remote XSS Include (RXI) it is possible to execute malicious code in browser when user is at another site (so attack is hidden). Two mentioned  redirectors are just for an example, that bad guys can redirect visitors. But others attacks are possible, so on the whole it is code execution vulnerability.</description>
		<content:encoded><![CDATA[<p>Yes, Alex, Remote HTML Include (RHI) is perfect phishing tool <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' /> . Using a frame in a frameset of other site (for malicious purposes) is hole by design. But in case of malicious purposes this become a real security hole. It is Abuse of Functionality by WASC classification (for RHI), or it is Abuse of Functionality + XSS (for RXI).</p>
<p>In case of Remote XSS Include (RXI) it is possible to execute malicious code in browser when user is at another site (so attack is hidden). Two mentioned  redirectors are just for an example, that bad guys can redirect visitors. But others attacks are possible, so on the whole it is code execution vulnerability.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Alex</title>
		<link>http://websecurity.com.ua/1049/#comment-37747</link>
		<pubDate>Fri, 15 Jun 2007 23:04:13 +0000</pubDate>
		<guid>http://websecurity.com.ua/1049/#comment-37747</guid>
					<description>This Remote HTML Include just hijacks a frame in a foreign frameset, doesn't it? Perfect phishing tool. And a funny one, because it's not a bug, it's by design. Good catch!</description>
		<content:encoded><![CDATA[<p>This Remote HTML Include just hijacks a frame in a foreign frameset, doesn&#8217;t it? Perfect phishing tool. And a funny one, because it&#8217;s not a bug, it&#8217;s by design. Good catch!
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
