<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Andmp | A blog about infosec, bug hunting and more!</title><description>&amp;quot;Good artists copy; great artists steal.&amp;quot;
&lt;br&gt;
&lt;br&gt;
Just another web hacking and vulnerability research blog that details how I use existing knowledge and old ways to discover new vulns ;)</description><managingEditor>noreply@blogger.com (Unknown)</managingEditor><pubDate>Sat, 5 Jul 2025 03:49:11 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">10</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>https://www.andmp.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:summary>&amp;quot;Good artists copy; great artists steal.&amp;quot; Just another web hacking and vulnerability research blog that details how I use existing knowledge and old ways to discover new vulns ;)</itunes:summary><itunes:subtitle>&amp;quot;Good artists copy; great artists steal.&amp;quot; Just another web hacking and vulnerability research blog that details how I use existing knowledge and old ways to discover new vulns ;)</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>[Advisory] Unpatched URL Address Bar Spoofing Vulnerability in UC Browser 12.11.2.1184  and UC Browser Mini 12.10.1.1192: With the same old one-liner payload...</title><link>https://www.andmp.com/2019/05/advisory-unpatched-url-address-bar-vulnerability-in-latest-versions-of-UC-browers.html</link><category>android security</category><category>mobile security</category><category>security vulnerability</category><category>UC Browser</category><category>UC Browser Security Advisory</category><category>UC Browser security vulnerability</category><category>unpatched vulnerability</category><category>URL Address Bar Spoofing</category><author>noreply@blogger.com (Unknown)</author><pubDate>Wed, 8 May 2019 00:40:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8166728817383736132.post-1181173079156084628</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: left;"&gt;
Brief&lt;/h2&gt;
&lt;div&gt;
I discovered an &lt;i&gt;URL Address Bar spoofing vulnerability&lt;/i&gt; in the latest version of the &lt;i&gt;UC Browser 12.11.2.1184&amp;nbsp; and UC Browser Mini 12.10.1.1192 that have over 500mn and 100mn installs each respectively, as per Playstore.&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
This &lt;b&gt;vulnerability allows any attacker to pose (his phishing domain) as the targeted site, for example, a domain blogspot.com can pretend to be facebook.com, by simply making an user visit www.google.com.blogspot.com/?q=www.facebook.com&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
Description&lt;/h2&gt;
&lt;div&gt;
Previously, &lt;a href="https://www.andmp.com/search/label/Xiaomi?&amp;amp;max-results=6" target="_blank"&gt;I wrote about this issue affecting Xiaomi Mi and Mint browsers&lt;/a&gt;, but now UC Browsers (only latest versions) share the same behavior much to my surprise. I find it worth mentioning that some old and other versions of UC Browsers are still not vulnerable to this,&amp;nbsp;which puts me into confusion, which points at the fact that &lt;i&gt;a new feature might have been added to this browser sometime back which is causing this issue.&amp;nbsp;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I have seen a lot of mobile (android) browsers show this behavior, Xiaomi browsers for instance. The main reason behind it is, I guess, these browsers are trying to enhance the User Experience by just displaying the search term for certain URL patterns (search engines and websites like that of Yahoo!, Google).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
However, while they are trying to display only the content or, data passed by the query parameter, an attacker can leverage this behavior to achieve &lt;b&gt;URL Address Bar spoofing&lt;/b&gt;&amp;nbsp;which can lead to efficient phishing attacks at ease.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The fact that their regex rules just match the URL string, or, the URL any user is trying to visit to a whitelist pattern but only check if the URL begins with a string like www.google.com can enable an attacker to bypass this regex check by simply using a subdomain on his domain like www.google.com.blogspot.com and attach the target domain name (which he wants to pose as) to the query portion of this subdomain like ?q=www.facebook.com&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
The payload being just a one-liner, this can lead to flawless phishing attacks, which is nearly undetectable and is very easy to execute.&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;b&gt;Products affected (Versions)&lt;/b&gt;&lt;/h4&gt;
&lt;div&gt;
UC Browser 12.11.2.1184&amp;nbsp; and UC Browser Mini 12.10.1.1192&lt;/div&gt;
&lt;h3 style="text-align: left;"&gt;
CVE&lt;/h3&gt;
&lt;div&gt;
Not assigned yet. A request has been sent to Mitre for the same.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
Proof of Concept(s)&lt;/h2&gt;
&lt;div&gt;
Payload: www.google.com.attacker.domain/?q=www.facebook.com&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
UC Browser:&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/vOdj7zdYm0I/0.jpg" frameborder="0" height="266" src="https://www.youtube.com/embed/vOdj7zdYm0I?feature=player_embedded" width="320"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
UC Mini:&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/6jf_G9tD62A/0.jpg" frameborder="0" height="266" src="https://www.youtube.com/embed/6jf_G9tD62A?feature=player_embedded" width="320"&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style="text-align: left;"&gt;
Reporting Timeline&lt;/h3&gt;
&lt;div&gt;
Issue has been disclosed to their security team sometime back (more than a week ago) but they have now simply simply put an &lt;b&gt;Ignore status on the report.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiduS47HEue2k7aER5A5na8datii_NUZ2Vpa312tJ-yIEITuMe8uXIYzV4uZw8eOHKdVcyxyljLJnFUB82urkqr8QOe0PFAhMUU3VLOn4JWS9RIE6X8dNjemcmrIbE7OLUww_j_MusVKHBJ/s1600/Untitled+drawing+%25283%2529.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="720" data-original-width="960" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiduS47HEue2k7aER5A5na8datii_NUZ2Vpa312tJ-yIEITuMe8uXIYzV4uZw8eOHKdVcyxyljLJnFUB82urkqr8QOe0PFAhMUU3VLOn4JWS9RIE6X8dNjemcmrIbE7OLUww_j_MusVKHBJ/s320/Untitled+drawing+%25283%2529.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I have not been given any &lt;i&gt;ETA &lt;/i&gt;for a fix from their end.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Taking all this into consideration, I decided to write up on this issue. Interested people can take a look at &lt;b&gt;&lt;a href="https://www.andmp.com/p/responsible-disclosure-policy.html" target="_blank"&gt;My Vulnerability Disclosure Policy to learn more about my Vulnerability Disclosure process.&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style="text-align: left;"&gt;
Rewards&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;
$ 0.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style="text-align: left;"&gt;
Fixed&lt;/h3&gt;
&lt;div&gt;
No, no patches have been released so far to addressed this issue.&lt;/div&gt;
&lt;h3 style="text-align: left;"&gt;
Solution&lt;/h3&gt;
&lt;div&gt;
Use stronger regex checks if you want to show search strings in this format in URL bar, or, just remove this feature/behavior entirely so that it doesn't show up in another form later (Mint browser patches were bypassed several times by a fellow researcher because they decided to still keep that feature but with some minor enhancements).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/vOdj7zdYm0I/default.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>This is how (easily) Indiamart gave away access to their Internal corporate secrets and Dev Instances</title><link>https://www.andmp.com/2019/04/this-is-how-easily-indiamart-gave-me-access-to-their-corporate-secrets.html</link><category>corporate secrets</category><category>data leak</category><category>Indiamart</category><category>internal panel</category><category>security breach</category><category>security vulnerability</category><category>vulnerability</category><author>noreply@blogger.com (Unknown)</author><pubDate>Tue, 23 Apr 2019 08:45:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8166728817383736132.post-319085002284455755</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;strike&gt;I tried to reach out to the &lt;i&gt;IndiaMart&lt;/i&gt;&amp;nbsp;folks regarding the security issues I found there but sadly didn't find a proper channel to report them.&amp;nbsp;&lt;/strike&gt;&amp;nbsp;(with the help of &lt;b&gt;Mohit Kumar&lt;/b&gt;, editor of &lt;b&gt;THN,&lt;/b&gt; a contact was established with the company today, after all my efforts to reach out to them went in vain) As a result, I 'm taking to Twitter and using this blog post as a medium to reach out to all those top companies who have a large number of users but apparently don't care about&amp;nbsp;&lt;b&gt;secure practices. &lt;/b&gt;I hope this blog post raises awareness about such issues, since many companies continue to expose sensitive parts of their infrastructure and customer data, and as such this may serve as an eye-opener for them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Another interesting point to note here is that AFAIK the Indian NCIIPC&lt;b&gt;&lt;i&gt;&amp;nbsp;or, CERT-IN don't&lt;/i&gt;&lt;/b&gt;&amp;nbsp;have any full disclosure/even proper responsible disclosure guidelines for reporting issues to private companies, or,&amp;nbsp; any guidelines concerning the time frame that both parties should follow/agree to before disclosing a (reported) issue. In my opinion, they should implement some policies for large companies to follow/adhere to while dealing with security incidents or, reporting security vulnerabilities in their products/infrastructure. So, I would say this way of fully disclosing issues is currently the best option to get things resolved/fixed until some policies regarding the same are brought into effect. This is how I would justify the ethics of this disclosure, if one likes to take that into account. (although this issue was hastily fixed by the company just before publication of this blog post)&lt;br /&gt;
&lt;br /&gt;
Numerous such cases of breach and violent full disclosures can be referred to, to learn from. The most recent being that of Justdial who had an access control bug in an API, where the researcher failed to find a way to responsibly report and disclose the issue to the company which obliged him to publicly fully disclose it. Thus, proper policies and guidelines are needed speaking of reporting and coordinated disclosure of security issues.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
Intro&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;Indiamart&lt;/b&gt; is a popular Indian e-commerce platform for B2B as well as B2C sales. It holds an &lt;i&gt;Alexa rank of&amp;nbsp; ~&lt;b&gt;742 (as of writing this)&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/i&gt;
&lt;i&gt;(From Wikipedia&lt;/i&gt;)&lt;br /&gt;
&lt;br /&gt;
&lt;div class="mf-section-0" id="mf-section-0" style="-webkit-text-stroke-width: 0px; background: none rgb(255, 255, 255); border: 0px; color: #222222; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Lato, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-style: normal; font-variant-caps: normal; font-variant-east-asian: inherit; font-variant-ligatures: normal; font-variant-numeric: inherit; font-weight: 400; letter-spacing: normal; line-height: inherit; margin: 0px; orphans: 2; padding: 0px; text-align: start; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 2; word-spacing: 0px;"&gt;
&lt;div style="background: none; border: 0px; font-family: inherit; font-size: 16px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0.5em 0px 1em; padding: 0px; vertical-align: baseline;"&gt;
In 2014, IndiaMART's portal handled 200 crore in revenue&lt;sup class="reference" id="cite_ref-6" style="background: none; border: 0px; font-family: inherit; font-size: 0.75em; font-stretch: inherit; font-style: normal; font-variant: inherit; font-weight: normal; line-height: 1; margin: 0px; padding: 0px; unicode-bidi: isolate; vertical-align: super; white-space: nowrap;"&gt;&lt;a href="https://en.m.wikipedia.org/wiki/IndiaMART#cite_note-6" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-size: 12px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline; white-space: nowrap;"&gt;[6]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;and 20,000 crore in sales.&lt;sup class="reference" id="cite_ref-7" style="background: none; border: 0px; font-family: inherit; font-size: 0.75em; font-stretch: inherit; font-style: normal; font-variant: inherit; font-weight: normal; line-height: 1; margin: 0px; padding: 0px; unicode-bidi: isolate; vertical-align: super; white-space: nowrap;"&gt;&lt;a href="https://en.m.wikipedia.org/wiki/IndiaMART#cite_note-7" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-size: 12px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline; white-space: nowrap;"&gt;[7]&lt;/a&gt;&lt;/sup&gt;&lt;sup class="reference" id="cite_ref-8" style="background: none; border: 0px; font-family: inherit; font-size: 0.75em; font-stretch: inherit; font-style: normal; font-variant: inherit; font-weight: normal; line-height: 1; margin: 0px; padding: 0px; unicode-bidi: isolate; vertical-align: super; white-space: nowrap;"&gt;&lt;a href="https://en.m.wikipedia.org/wiki/IndiaMART#cite_note-8" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-size: 12px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline; white-space: nowrap;"&gt;[8]&lt;/a&gt;&lt;/sup&gt;According to a news in&amp;nbsp;&lt;a class="mw-redirect" href="https://en.m.wikipedia.org/wiki/Indiatimes.com" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-size: 16px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;" title="Indiatimes.com"&gt;Economic Times&lt;/a&gt;, as of 2012 IndiaMART was India's largest&amp;nbsp;&lt;a href="https://en.m.wikipedia.org/wiki/Online_marketplace" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-size: 16px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;" title="Online marketplace"&gt;online marketplace&lt;/a&gt;&lt;sup class="reference" id="cite_ref-9" style="background: none; border: 0px; font-family: inherit; font-size: 0.75em; font-stretch: inherit; font-style: normal; font-variant: inherit; font-weight: normal; line-height: 1; margin: 0px; padding: 0px; unicode-bidi: isolate; vertical-align: super; white-space: nowrap;"&gt;&lt;a href="https://en.m.wikipedia.org/wiki/IndiaMART#cite_note-9" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-size: 12px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline; white-space: nowrap;"&gt;[9]&lt;/a&gt;&lt;/sup&gt;&lt;sup class="reference" id="cite_ref-10" style="background: none; border: 0px; font-family: inherit; font-size: 0.75em; font-stretch: inherit; font-style: normal; font-variant: inherit; font-weight: normal; line-height: 1; margin: 0px; padding: 0px; unicode-bidi: isolate; vertical-align: super; white-space: nowrap;"&gt;&lt;a href="https://en.m.wikipedia.org/wiki/IndiaMART#cite_note-10" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-size: 12px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline; white-space: nowrap;"&gt;[10]&lt;/a&gt;&lt;/sup&gt;&amp;nbsp;and world's second-largest B2B marketplace after&amp;nbsp;&lt;a href="https://en.m.wikipedia.org/wiki/Alibaba_Group" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-size: 16px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;" title="Alibaba Group"&gt;Alibaba&lt;/a&gt;.&lt;sup class="reference" id="cite_ref-11" style="background: none; border: 0px; font-family: inherit; font-size: 0.75em; font-stretch: inherit; font-style: normal; font-variant: inherit; font-weight: normal; line-height: 1; margin: 0px; padding: 0px; unicode-bidi: isolate; vertical-align: super; white-space: nowrap;"&gt;&lt;a href="https://en.m.wikipedia.org/wiki/IndiaMART#cite_note-11" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-size: 12px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline; white-space: nowrap;"&gt;[11]&lt;/a&gt;&lt;/sup&gt;&lt;sup class="reference" id="cite_ref-12" style="background: none; border: 0px; font-family: inherit; font-size: 0.75em; font-stretch: inherit; font-style: normal; font-variant: inherit; font-weight: normal; line-height: 1; margin: 0px; padding: 0px; unicode-bidi: isolate; vertical-align: super; white-space: nowrap;"&gt;&lt;a href="https://en.m.wikipedia.org/wiki/IndiaMART#cite_note-12" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-size: 12px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline; white-space: nowrap;"&gt;[12]&lt;/a&gt;&lt;/sup&gt;IndiaMART's e-commerce portal Tolexo was launched in 2014.&lt;/div&gt;
&lt;/div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;span style="background-color: white; color: #222222; font-family: , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;lato&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;In early 2009, the firm received 50 crore&amp;nbsp;&lt;/span&gt;&lt;a href="https://en.m.wikipedia.org/wiki/Series_A_round" style="background: none rgb(255, 255, 255); border: 0px; color: #6b4ba1; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Lato, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" title="Series A round"&gt;Series A round&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;lato&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;&amp;nbsp;funding from&amp;nbsp;&lt;/span&gt;&lt;a href="https://en.m.wikipedia.org/wiki/Intel_Capital" style="background: none rgb(255, 255, 255); border: 0px; color: #6b4ba1; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Lato, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" title="Intel Capital"&gt;Intel Capital&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;lato&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;, a part of which was invested in IndiaMART, One97 Communications and Global Talent Track.&lt;/span&gt;&lt;sup class="reference" id="cite_ref-t_1-2" style="background: none rgb(255, 255, 255); border: 0px; color: #222222; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Lato, Helvetica, Arial, sans-serif; font-size: 0.75em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1; margin: 0px; padding: 0px; unicode-bidi: isolate; white-space: nowrap;"&gt;&lt;a href="https://en.m.wikipedia.org/wiki/IndiaMART#cite_note-t-1" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;"&gt;[1]&lt;/a&gt;&lt;/sup&gt;&lt;sup class="reference" id="cite_ref-24" style="background: none rgb(255, 255, 255); border: 0px; color: #222222; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Lato, Helvetica, Arial, sans-serif; font-size: 0.75em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1; margin: 0px; padding: 0px; unicode-bidi: isolate; white-space: nowrap;"&gt;&lt;a href="https://en.m.wikipedia.org/wiki/IndiaMART#cite_note-24" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;"&gt;[24]&lt;/a&gt;&lt;/sup&gt;&lt;sup class="reference" id="cite_ref-25" style="background: none rgb(255, 255, 255); border: 0px; color: #222222; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Lato, Helvetica, Arial, sans-serif; font-size: 0.75em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1; margin: 0px; padding: 0px; unicode-bidi: isolate; white-space: nowrap;"&gt;&lt;a href="https://en.m.wikipedia.org/wiki/IndiaMART#cite_note-25" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;"&gt;[25]&lt;/a&gt;&lt;/sup&gt;&lt;sup class="reference" id="cite_ref-26" style="background: none rgb(255, 255, 255); border: 0px; color: #222222; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Lato, Helvetica, Arial, sans-serif; font-size: 0.75em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1; margin: 0px; padding: 0px; unicode-bidi: isolate; white-space: nowrap;"&gt;&lt;a href="https://en.m.wikipedia.org/wiki/IndiaMART#cite_note-26" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;"&gt;[26]&lt;/a&gt;&lt;/sup&gt;&lt;span style="background-color: white; color: #222222; font-family: , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;lato&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;&amp;nbsp;In March 2016, it raised Series C Funding from&amp;nbsp;&lt;/span&gt;&lt;a href="https://en.m.wikipedia.org/wiki/Amadeus_Capital_Partners" style="background: none rgb(255, 255, 255); border: 0px; color: #6b4ba1; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Lato, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" title="Amadeus Capital Partners"&gt;Amadeus Capital Partners&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;lato&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;&amp;nbsp;and Quona Capital. It is claimed that these funds will be used to scale up the activities of IndiaMART and Tolexo.&lt;/span&gt;&lt;sup class="reference" id="cite_ref-27" style="background: none rgb(255, 255, 255); border: 0px; color: #222222; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Lato, Helvetica, Arial, sans-serif; font-size: 0.75em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1; margin: 0px; padding: 0px; unicode-bidi: isolate; white-space: nowrap;"&gt;&lt;a href="https://en.m.wikipedia.org/wiki/IndiaMART#cite_note-27" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;"&gt;[27]&lt;/a&gt;&lt;/sup&gt;&lt;span style="background-color: white; color: #222222; font-family: , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;lato&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;&amp;nbsp;In June 2018 IndiaMART has filled draft papers with SEBI to raise $88.24 million through IPO and list on NSE and BSE exchange.&lt;/span&gt;&lt;sup class="reference" id="cite_ref-28" style="background: none rgb(255, 255, 255); border: 0px; color: #222222; font-family: -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Lato, Helvetica, Arial, sans-serif; font-size: 0.75em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1; margin: 0px; padding: 0px; unicode-bidi: isolate; white-space: nowrap;"&gt;&lt;a href="https://en.m.wikipedia.org/wiki/IndiaMART#cite_note-28" style="background: none; border: 0px; color: #6b4ba1; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;"&gt;[28]&lt;/a&gt;&lt;/sup&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
Hence, we may expect them to be mindful about the security of their sensitive internal infrastructure, taking all this into consideration, but the reality is strikingly, quite different.&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
Gist&lt;/h2&gt;
&lt;div&gt;
I found my way through various private and sensitive internal infrastructure belonging to Indiamart quite easily. This was accomplished in hardly a few minutes of casual reconnassance, because they hardly followed any security practices, speaking of their overall infrastructure.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Firewalls and VPN only access to internal infrastructure was missing&lt;/li&gt;
&lt;li&gt;No authentication required on the most sensitive endpoints&lt;/li&gt;
&lt;li&gt;Weak credentials on endpoints and only using basic authentication where one might consider adding 2FA and restrict access to certain internal IP ranges as well.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Think of an external adversary in my place, what would he have done? Is your data secure with Indiamart's security practices (of whose example we got here)?&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
Issues discovered&lt;/h2&gt;
&lt;div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;b&gt;Weak credentials on all dev/developer instances/subdomains&lt;/b&gt;, letting an external attacker gain easy access to these restricted servers. Ideally, only developers must have access to them, and they should not be kept open on the internet, t&lt;b&gt;he company in question should have made these accessible only through a VPN, internally among their employees. &lt;/b&gt;But, shockingly they just had a Basic Authentication in place, with these credentials,&amp;nbsp; --&amp;nbsp; username:password -&amp;gt; admin:admin&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&amp;nbsp; &amp;nbsp; Is it that hard to guess the credentials? The username and password both were simply "admin", cool, right?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;b&gt;Finally, their employee wiki or, knowledge base was publicly accessible without any authentication&lt;/b&gt;. This is pretty serious. Ask how?&amp;nbsp; &amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; Their internal employee knowledge base/wiki&amp;nbsp; &amp;nbsp;&lt;a href="https://kb.indiamart.com/"&gt;https://kb.indiamart.com&lt;/a&gt; allows unauthenticated users to view it, which is meant for their employees and should have been only internally accessible. But this isn't the case, it's accessible publicly and anyone on the internet has access to these corporate secrets of Indiamart.&lt;br /&gt;
&lt;br /&gt;
Through this knowledge base, employees could access internal confidential/sensitive details on how to deal with issues. For example, it contained &lt;i&gt;instructions for lead managers, and so on.&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
In the past I had also come across an old endpoint in one of their applications that had an access control flaw leading to exposure of user details via victim user's registered phone number, but it seems to be down currently. I no longer retain the details on that.&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
PoC&lt;/h2&gt;
&lt;/div&gt;
&lt;div&gt;
For the knowledge base issue, this page for example, details some internal procedures for an Indiamart employee about Login issues,&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href="https://kb.indiamart.com/en/article/client-is-not-receiving-otp-asking-for-usernamepassword-to-login"&gt;https://kb.indiamart.com/en/article/client-is-not-receiving-otp-asking-for-usernamepassword-to-login&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizPu2P5RwVqMsvhzb_hfeHD6MixPdvsEzOTtpRSIB04v0OxJE9Qtr2zC1P_dWQKb7eTmnMul-6ytQ-UNWNGzB7Ht6qMo8xL40L8eKp-KSmpVBoZqSiskrKdTn8AKgt8nnP6qD3SMjUzWAT/s1600/Screenshot_2019-04-22-11-41-29-671_com.android.chrome.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1227" data-original-width="720" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizPu2P5RwVqMsvhzb_hfeHD6MixPdvsEzOTtpRSIB04v0OxJE9Qtr2zC1P_dWQKb7eTmnMul-6ytQ-UNWNGzB7Ht6qMo8xL40L8eKp-KSmpVBoZqSiskrKdTn8AKgt8nnP6qD3SMjUzWAT/s320/Screenshot_2019-04-22-11-41-29-671_com.android.chrome.png" width="187" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;i&gt;Company's internal knowledge base is strictly for internal private usage and shouldn't be publicly accessible as such&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
Issue with Dev instances: Upon trying these credentials,&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Username: admin&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Password : admin&lt;br /&gt;
on these subdomains/Dev instances, one gets access to them,&lt;br /&gt;
&lt;br /&gt;
https://dev-*.indiamart.com&lt;br /&gt;
&lt;br /&gt;
like, &lt;a href="https://dev-seller.indiamart.com/"&gt;https://dev-seller.indiamart.com&lt;/a&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;a href="https://dev-paywith.indiamart.com/"&gt;https://dev-paywith.indiamart.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;Here, "*" means a wildcard&lt;/i&gt;, and can be replaced with &lt;i&gt;paywith, seller &lt;/i&gt;and other applications of Indiamart.&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
How I discovered it?&lt;/h2&gt;
&lt;div&gt;
Using subdomain enumeration I obtained the subdomains (including internal ones that weren't firewalled) of IndiaMart. From here on, it was just a matter of luck and lack of security on the part of Indiamart that led me to discover these vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://securitytrails.com/" target="_blank"&gt;SecurityTrails &lt;/a&gt;is just a great, and handy tool for performing quick passive reconnaissance and subdomain enumeration like this.&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
Takeaways&lt;/h2&gt;
&lt;div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Setup a VPN to shield off your internal infrastructure meant for employee-only access. Don't allow public access to them.&lt;/li&gt;
&lt;li&gt;Use strong credentials and 2FA on sensitive and restricted endpoints.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h2 style="text-align: left;"&gt;
Special Credits&amp;nbsp;&lt;/h2&gt;
&lt;/div&gt;
&lt;div&gt;
I would like to thank&lt;b&gt; Mohit Kumar &lt;/b&gt;of &lt;b&gt;THN&lt;/b&gt;, who helped in responsible disclosure of this vulnerability and, a contact was made with an IndiaMart employee who quickly fixed all the issues.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
Fix&lt;/h2&gt;
&lt;div&gt;
As of writing this, all issues were temporarily fixed and the dev instances are now inaccessible. However, part of the fix is still insufficient in my opinion.&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
Rewards&lt;/h2&gt;
&lt;div&gt;
None as of yet. They haven't even sent a proper &lt;i&gt;official acknowledgement letter to thank me for reporting the above issues.&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;What more could you expect from a ~20 year old multi-million dollar Indian E-commerce giant after reporting severe issues like these?&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizPu2P5RwVqMsvhzb_hfeHD6MixPdvsEzOTtpRSIB04v0OxJE9Qtr2zC1P_dWQKb7eTmnMul-6ytQ-UNWNGzB7Ht6qMo8xL40L8eKp-KSmpVBoZqSiskrKdTn8AKgt8nnP6qD3SMjUzWAT/s72-c/Screenshot_2019-04-22-11-41-29-671_com.android.chrome.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>[Unpatched Vulnerability] CVE-2019-11015: Lock Screen Auth Bypass leading to Sensitive Information Disclosure and an Improper Access Control issue in Xiaomi MIUI OS (latest stable releases affected)</title><link>https://www.andmp.com/2019/04/unpatched-vulnerability-in-xiaomi-miui-os-lock-screen.html</link><category>advisory</category><category>CVE</category><category>Mi</category><category>MIUI</category><category>mobile security</category><category>security</category><category>sensitive information disclosure</category><category>unpatched vulnerability</category><category>Xiaomi</category><author>noreply@blogger.com (Unknown)</author><pubDate>Wed, 10 Apr 2019 01:50:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8166728817383736132.post-9140616731638957840</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div&gt;
So, as promised on Twitter, the wait ends, new security vulnerability full disclosure in &lt;b&gt;Xiaomi!&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;i&gt;&lt;/i&gt;
&lt;i&gt;
&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;/i&gt;&lt;br /&gt;
&lt;div style="display: inline !important;"&gt;
&lt;i&gt;&lt;i&gt;MiSRC team accepted and confirmed this bug&lt;/i&gt; for their&lt;b&gt; bug&lt;/b&gt;&amp;nbsp;&lt;b&gt;bounty program.&lt;/b&gt;&amp;nbsp;I submitted it sometime back. But, this hasn't been fixed yet. Also, I have no idea of when they 're going to patch it, no ETA was provided as usual. So, what about a &lt;b&gt;FULL DISCLOSURE, &lt;/b&gt;like I did before, sounds all good right? Alright, IIRC they don't bring fixes in time, so here I 'm spilling the beans about it, before they silently patch it after &lt;i&gt;(n+3) months of reporting the issue.&lt;/i&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;Disclaimer: &lt;/b&gt;I will make a lot of assumptions ahead. Some may not be correct or, feasible in your opinion, use your discretion and change my mind, I would love to know your opinions on it!&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
Some Assumptions&lt;/h2&gt;
&lt;div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Attacker has physical access to your device.&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Victim needs to be an&amp;nbsp;&lt;b&gt;INDIAN&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;This issue only affects people who have their Region in &lt;b&gt;Additional Settings set to India (&lt;/b&gt;although I haven't checked other regions for this issue, maybe more are affected try it out yourself?)&lt;/li&gt;
&lt;li&gt;So, are &lt;i&gt;assumptions a bar? judge yourself&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;i&gt;Versions affected&lt;/i&gt;&lt;/h2&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Strikingly, yet again those in &lt;b&gt;Indian region are affected by this bug.&amp;nbsp;&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Latest stable release 10.1.3.0 (personally tested on), as well as 10.2.3.0 (as per an external source)&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;Thanks to a friend, Ritam,&amp;nbsp;for helping me confirm this issue on the latest stable release of&amp;nbsp;&lt;b&gt;Pocofone OS as well.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/i&gt;
&lt;i&gt;&lt;b&gt;For testing purposes Region can be changed here, in Additional Settings,&amp;nbsp;&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/i&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTWuUwOC0fUHoytTGa-kGKCdYidVNZ7YMLN9cmoHUzF1Bo8wENaJOgkw5bLHPVGGfedNUJ41_-wbjI1Y8SavrUxZ-dWo6c9AzkNUzQLqsRupjfAdCon9llQCr4AAID_1h5q-iO4150P9XL/s1600/IMG_20190410_131425.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1440" data-original-width="720" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTWuUwOC0fUHoytTGa-kGKCdYidVNZ7YMLN9cmoHUzF1Bo8wENaJOgkw5bLHPVGGfedNUJ41_-wbjI1Y8SavrUxZ-dWo6c9AzkNUzQLqsRupjfAdCon9llQCr4AAID_1h5q-iO4150P9XL/s320/IMG_20190410_131425.jpg" width="160" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;i&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;i&gt;Advisory&lt;/i&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2019-11015" target="_blank"&gt;&lt;b&gt;Mitre assigned&amp;nbsp;&lt;/b&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: x-small;"&gt;CVE-2019-11015 for this issue.&lt;/span&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: x-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
Cause&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;Wallpaper Carousel feature&lt;/b&gt;, that can be turned on by attacker himself upto version 10.*.3.0 (latest stable release) from the Lockscreen itself &lt;i&gt;despite Lockscreen based pass/pin/pattern protection.&lt;/i&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
This feature is the root cause of this&amp;nbsp;&lt;b&gt;sensitive&amp;nbsp;&lt;/b&gt;information disclosure.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;
The issue actually lies in &lt;b&gt;Glance&lt;/b&gt;, a content provider in the Wallpaper Carousel application, I believe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;i&gt;Whats interesting? Plus, the Proof-of-Concept&lt;/i&gt;&lt;/h2&gt;
&lt;div&gt;
There seems to be 2 issues.&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;1. Missing access control check while Enabling Wallpaper Carousel via Lockscreen:&amp;nbsp;&lt;/b&gt;Though,&amp;nbsp; &amp;nbsp; this might not actually be a problem, just more of what I feel - &lt;b&gt;Wallpaper Carousel, that appears on the lockscreen can be &lt;/b&gt;&lt;i&gt;disabled on your device, there is an option to do that in the &lt;b&gt;Settings.&lt;/b&gt;&amp;nbsp;But, how effective is that? &lt;b&gt;Enabling it isn't password protected on your lockscreen! Can it be an issue, if so in what way?&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;Follow these steps&lt;/b&gt;,&lt;/i&gt;&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Go to Settings&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Search for &lt;b&gt;Wallpaper Carousel/Lockscreen&lt;/b&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Turns out you can disable or, enable &lt;b&gt;Wallpaper Carousel through settings.&lt;/b&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;Is it really an issue? Don't know, just my opinion. Feel free to try to change my mind!&lt;/li&gt;
&lt;li&gt;&lt;b style="font-style: italic;"&gt;On the version 10.1.3.0 turns out, &lt;/b&gt;even after you disable &lt;b&gt;Wallpaper Carousel, there's an option to enable it directly from the Lockscreen, &lt;/b&gt;&lt;i&gt;without authentication, also &lt;b&gt;interestingly, Xiaomi makes you agree to some &lt;a href="https://www.inmobi.com/glance/xiaomi/eula" target="_blank"&gt;Terms &amp;amp; Conditions (of a 3rd party provider) while Turning on this feature.&lt;/a&gt;&lt;/b&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.inmobi.com/glance/xiaomi/eula" target="_blank"&gt;So far I said, you can turn on &lt;/a&gt;&lt;b&gt;&lt;a href="https://www.inmobi.com/glance/xiaomi/eula" target="_blank"&gt;Wallp&lt;/a&gt;aper Carousel from lockscreen, but you also have to&amp;nbsp; agree to some T&amp;amp;C to Turn On this feature. &lt;/b&gt;You can do that without authentication, even after having disabled it through &lt;b&gt;Settings. &lt;/b&gt;Possibly an &lt;b&gt;ACCESS CONTROL issue? Because, an unauthenticated user can Turn On this feature by agreeing to these T&amp;amp;C (possibly of 3rd party content provider) on your behalf.&amp;nbsp;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
2. &lt;b&gt;Sensitive Information Disclosure:&lt;/b&gt;&amp;nbsp;With the help of &lt;b&gt;Wallpaper Carousel feature, &lt;/b&gt;more specifically &lt;i&gt;glance&lt;/i&gt;, one can actually get read access as well as write access to user's (current)&amp;nbsp;&lt;b&gt;Clipboard data, &lt;/b&gt;and apart from that &lt;b&gt;the attacker can also partially access user's stored social media credentials by abusing Autofill feature.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;b&gt;&amp;nbsp;Follow these Steps to reproduce this issue (PoC)&lt;/b&gt;&lt;/h3&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
1. Swipe Lockscreen to right&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOsDRtgvoF1DSga7HxkdbzkSXyoK4gdtBXdkx0HuJCeSPPcIYHpdbqVHR1vwIRtCIoGOxL6Tp2K9RL-3Rqc8dEm5Im7000ecsW07R691tIRsB4ydxB72Tv2IijdRwLYmYVKznFs9i7tI5-/s1600/Screenshot_2019-04-08-10-20-43-778_lockscreen.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1440" data-original-width="720" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOsDRtgvoF1DSga7HxkdbzkSXyoK4gdtBXdkx0HuJCeSPPcIYHpdbqVHR1vwIRtCIoGOxL6Tp2K9RL-3Rqc8dEm5Im7000ecsW07R691tIRsB4ydxB72Tv2IijdRwLYmYVKznFs9i7tI5-/s320/Screenshot_2019-04-08-10-20-43-778_lockscreen.png" width="160" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;2. Next, tap on Wallpaper Carousel&lt;br /&gt;
&lt;div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5khuyp-gqg_RgzbsF9sFDPws8KRqzrIO1IisHo2fDVznF4PYm_jNgKwYGINUbYIhBVvY-bZwgJhxBLyMJZ3mJhYOi9FvE3Mmz6BsOM03Masclfq7HFXcnzLWBLPa14wXsLT1DjrgJ9j8F/s1600/IMG_20190408_102422.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1440" data-original-width="720" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5khuyp-gqg_RgzbsF9sFDPws8KRqzrIO1IisHo2fDVznF4PYm_jNgKwYGINUbYIhBVvY-bZwgJhxBLyMJZ3mJhYOi9FvE3Mmz6BsOM03Masclfq7HFXcnzLWBLPa14wXsLT1DjrgJ9j8F/s320/IMG_20190408_102422.jpg" width="160" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 3. (Access Control Issue) Enable Wallpaper Carousel from&amp;nbsp; &amp;nbsp;Lockscreen itself&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjv9UeEuzGwxQ9jKSxyMQwwTBLWzScWi-73F5GKdm5TA1LAQuuGmopJaLib7SHYh01oEkjMoWSw6mt4o09fQ5a-bfDtvm6pno1Vw_b4TEFBDSq_w7J03r16FVeZPDz1wMNlXRITRNXvdp3/s1600/Screenshot_2019-04-01-10-08-05-804_lockscreen.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1440" data-original-width="720" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjv9UeEuzGwxQ9jKSxyMQwwTBLWzScWi-73F5GKdm5TA1LAQuuGmopJaLib7SHYh01oEkjMoWSw6mt4o09fQ5a-bfDtvm6pno1Vw_b4TEFBDSq_w7J03r16FVeZPDz1wMNlXRITRNXvdp3/s320/Screenshot_2019-04-01-10-08-05-804_lockscreen.png" width="160" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
4. Swipe right after enabling Wallpaper Carousel, tap on Wallpaper Carousel again to view this screen. Tap on &lt;b&gt;Read More.&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5x7i_ojJqj8SfS15d_5lAc377e2S-dcQ48s_wEDd4Q3UgGykMdoyz_FxspVbHikN-EAa5FmtZra-Uzoyt5kfO6G68Mmau1FALMi1SZ6tI9GIj4UxcEf7ikktnCwYK7tP9L-ED-R6r27tP/s1600/IMG_20190408_102340.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1440" data-original-width="720" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5x7i_ojJqj8SfS15d_5lAc377e2S-dcQ48s_wEDd4Q3UgGykMdoyz_FxspVbHikN-EAa5FmtZra-Uzoyt5kfO6G68Mmau1FALMi1SZ6tI9GIj4UxcEf7ikktnCwYK7tP9L-ED-R6r27tP/s320/IMG_20190408_102340.jpg" width="160" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
5. This opens a web page something like this. Click on any social buttons that appear on those web pages.&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0FiiUhCcFjdhm9PzQWtaYh33scQASVaREGarVtXocLSgryecpu4WLj4rCvMK1YjtxO_ZlqxMIqWk6IuElJymzRZhqgYNnqa8zpp0xOO_rUMy6_iKTUJdXAlL8YRwZQ2D8m3Uwwqfpv6mo/s1600/IMG_20190401_121826.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1440" data-original-width="720" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0FiiUhCcFjdhm9PzQWtaYh33scQASVaREGarVtXocLSgryecpu4WLj4rCvMK1YjtxO_ZlqxMIqWk6IuElJymzRZhqgYNnqa8zpp0xOO_rUMy6_iKTUJdXAlL8YRwZQ2D8m3Uwwqfpv6mo/s320/IMG_20190401_121826.jpg" width="160" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
6.&amp;nbsp; From here on, you can expose user's &lt;b&gt;Clipboard Data &lt;/b&gt;and &lt;i&gt;partially, user's stored &lt;b&gt;Autofill data for that particular social network.&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi86zXnpw2aJnMmysl6HobK4RsCkOsIolOEdZ8fOdkd2DOY3p9PA9My5B38SPfWzhdv3Zw0hK90NEhspqRPn1KmR834khK2u5udGIl8JkgEFFWmIziPldHGv2JiftZcbI7Q0rnkVtnN2yjd/s1600/IMG_20190401_121238.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1440" data-original-width="720" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi86zXnpw2aJnMmysl6HobK4RsCkOsIolOEdZ8fOdkd2DOY3p9PA9My5B38SPfWzhdv3Zw0hK90NEhspqRPn1KmR834khK2u5udGIl8JkgEFFWmIziPldHGv2JiftZcbI7Q0rnkVtnN2yjd/s320/IMG_20190401_121238.jpg" width="160" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
7. Exposing &lt;b&gt;Autofill data. &lt;/b&gt;(example)&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbPqQd81DQNrf4LQd3KyaKeFd6k26uVAEvgDGy9ytJhqgP-gJdn_eC-amlnHZ8zXONcSqGVYBZr37L_8hDpZfWqmjny5rslyfwuIDcEXeSG0l4KwFQG46-w-qnV652innbKp9fELaus3bb/s1600/IMG_20190408_102929.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1143" data-original-width="720" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbPqQd81DQNrf4LQd3KyaKeFd6k26uVAEvgDGy9ytJhqgP-gJdn_eC-amlnHZ8zXONcSqGVYBZr37L_8hDpZfWqmjny5rslyfwuIDcEXeSG0l4KwFQG46-w-qnV652innbKp9fELaus3bb/s320/IMG_20190408_102929.jpg" width="201" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;h2 style="text-align: left;"&gt;
Severity&lt;/h2&gt;
&lt;div&gt;
As per Mi Security team, it was marked &lt;i&gt;low, &lt;/i&gt;I have to disagree here, and would call it a &lt;b&gt;Medium-risk issue.&lt;/b&gt;&amp;nbsp;I have already stated the reasons above for that.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
So, what's up with the Clipboard and Autofill (privacy)?&lt;/h2&gt;
&lt;div&gt;
&lt;b&gt;Clipboard &lt;/b&gt;shouldn't be accessible to an &lt;b&gt;unauthenticated user via Lockscreen. But as it turns out, &lt;/b&gt;in this case, we can access the clipboard and disclose what was there in it. We can &lt;i&gt;EVEN modify it.&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;i&gt;Attacker can read what was there in the Clipboard with this vulnerability by abusing the &lt;b&gt;PASTE feature.&lt;/b&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Attacker can modify your clipboard content with the &lt;b&gt;COPY/CUT feature as well&lt;/b&gt;&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;Both of the above scenarios have an impact&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;b&gt;Autofill&lt;/b&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
Abusing Autofill feature on Social Login pages, an attacker can successfully expose user's stored email addresses, phone numbers and usernames linked with that social site.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Read more about Android clipboard privacy &lt;a href="https://www.xda-developers.com/android-q-block-background-clipboard-external-storage-permissions-downgrading-apps/" target="_blank"&gt;here&lt;/a&gt;, and in fact on one hand Google is working more towards resolving and fixing&amp;nbsp;&lt;b&gt;Clipboard privacy issues in Android Q while on the other we have MIUI OS increasing the potential attack surface. &lt;/b&gt;&lt;i&gt;In case of MIUI OS (Indian region/version), even an unauthorised user can bypass Lockscreen based authentication to read and modify your Clipboard data.&lt;/i&gt;&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;br /&gt;&lt;b&gt;Should this data be exposed to an external attacker without authorisation just in case you have enabled Lockscreen based protection/auth?&lt;/b&gt;&lt;/h4&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;b&gt;Reward and Resolution?&lt;/b&gt;&lt;/h2&gt;
&lt;div&gt;
For all this, Xiaomi offered me around 480 gold, or, around 45 bucks (in USD), for a bug that affects millions of devices in the Indian region!&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
They haven't yet paid for this. I won't accept this unfair reward either.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;As for resolution, they haven't fixed it yet, nor, given any ETA for fix.&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;i&gt;Not just that&lt;/i&gt;&lt;/h2&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;There appears to be some issue with Glance of Wallpaper Carousel as well. An access control issue perhaps? That lets an unauthorised person to follow different Trends/Topics for WC. Harmless?&lt;/i&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjULBZXLjemRfleACz-PiCT3BfIfGOkrbrGjF0DjugM7wrRAqTBzFHa6V6CaVD3lWhYhQkKdeknO7GSqpkl_QDMGFwbdH3_V4y-8W_ZYlN4TE-ulZgAaiKezv8r9aoOw2lw0sQH1HYo-hx6/s1600/IMG_20190410_231046.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1440" data-original-width="720" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjULBZXLjemRfleACz-PiCT3BfIfGOkrbrGjF0DjugM7wrRAqTBzFHa6V6CaVD3lWhYhQkKdeknO7GSqpkl_QDMGFwbdH3_V4y-8W_ZYlN4TE-ulZgAaiKezv8r9aoOw2lw0sQH1HYo-hx6/s320/IMG_20190410_231046.jpg" width="160" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizkZoNuPvOrkoKlAzquP_yujh9UeNPaTJXaLo-JhVGvbLPD4UfRnpLGyR_BoF5JIFH6ibwlFYY2GgY6J8JAVDaBCLuIuPuf68wPIjtaWaaAg4xnJAOt0ZlARl-CZ5eSfqj8PeCUKN4lJQa/s1600/IMG_20190410_231121.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1440" data-original-width="720" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizkZoNuPvOrkoKlAzquP_yujh9UeNPaTJXaLo-JhVGvbLPD4UfRnpLGyR_BoF5JIFH6ibwlFYY2GgY6J8JAVDaBCLuIuPuf68wPIjtaWaaAg4xnJAOt0ZlARl-CZ5eSfqj8PeCUKN4lJQa/s320/IMG_20190410_231121.jpg" width="160" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;i&gt;--------------------------------------------------------------------------------------------------------------------------&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;div&gt;
&lt;h3 style="text-align: left;"&gt;
Update (17th April, 2019)&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
Right after some media coverage about this issue,&amp;nbsp;&lt;i&gt;Xiaomi silently released a patch for&amp;nbsp;&lt;b&gt;Wallpaper Carousel&amp;nbsp;&lt;/b&gt;via&amp;nbsp;&lt;b&gt;Play Store,&amp;nbsp;&lt;/b&gt;citing the&amp;nbsp;&lt;/i&gt;vulnerability in the changelog of the update.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTWuUwOC0fUHoytTGa-kGKCdYidVNZ7YMLN9cmoHUzF1Bo8wENaJOgkw5bLHPVGGfedNUJ41_-wbjI1Y8SavrUxZ-dWo6c9AzkNUzQLqsRupjfAdCon9llQCr4AAID_1h5q-iO4150P9XL/s72-c/IMG_20190410_131425.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>0day Alert: URL Spoofing Bypassed for latest Mint Browser 1.6.4 by Renwa</title><link>https://www.andmp.com/2019/04/0day-alert-url-spoofing-bypass-for.html</link><category>mobile security</category><category>Xiaomi</category><category>xiaomi browser 0day</category><category>xiaomi browser vulnerability</category><category>xiaomi security issue</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 8 Apr 2019 19:15:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8166728817383736132.post-5618875710552510834</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
Yesterday, I published about Mint's 1.6.3 being vulnerable to the same flaw that I reported to Xiaomi, even after Xiaomi pushed a fix on the 5th of April, 2019. The fix could be bypassed with little effort neatly.&lt;br /&gt;
&lt;br /&gt;
In a matter of few hours, my friend Renwa bypassed Xiaomi's Mint's latest patch (on PLAYSTORE release) leading to a new 0day.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h2 style="text-align: left;"&gt;
Who are affected?&lt;/h2&gt;
&lt;div&gt;
Mi Browser and Mint Browser (upto 1.6.4)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
Intro&lt;/h2&gt;
&lt;div&gt;
Renwa discovered it and told me about it. This becomes the 2nd zero day discovered in a row in the Mint Browser and Mi Browser.&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Renwa found a bypass to the previous patch by Xiaomi team, by simply adding the target domain name to the phishing domain making it the subdomain of the phishing/attacker's domain. Which proved that Xiaomi's patch was insufficient and above all meaningless.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
But, the same day he came up with a new exploit which makes use of Unprintable Characters to bypass Xiaomi's new security patch in response to yesterday's 0day.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
Trick/Bypass&lt;/h2&gt;
&lt;div&gt;
By using Unprintable Characters&amp;nbsp;&lt;span style="background-color: #3d5466; color: white; font-family: , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;helvetica neue&amp;quot; , sans-serif; font-size: 37.4889px; white-space: pre-wrap;"&gt;%e2%80%8c, appended&lt;/span&gt;&amp;nbsp;to the URL query parameter.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
Video PoC&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/0m3V1UMIuGk/0.jpg" frameborder="0" height="266" src="https://www.youtube.com/embed/0m3V1UMIuGk?feature=player_embedded" width="320"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
PoC&lt;/h2&gt;
&lt;div&gt;
&lt;span style="background-color: #3d5466; color: white; font-family: , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;helvetica neue&amp;quot; , sans-serif; font-size: 37.4889px; white-space: pre-wrap;"&gt;https://www.yahoo.com/entertainment/tagged/kim-kardashian/?p=m.facebook.com%e2%80%8c&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: #3d5466; color: white; font-family: , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;helvetica neue&amp;quot; , sans-serif; font-size: 37.4889px; white-space: pre-wrap;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: #3d5466; color: white; font-family: , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;helvetica neue&amp;quot; , sans-serif; font-size: 37.4889px; white-space: pre-wrap;"&gt;(Spoofing m.facebook.com above^)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: #3d5466; color: white; font-family: , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;helvetica neue&amp;quot; , sans-serif; font-size: 37.4889px; white-space: pre-wrap;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="background-color: #3d5466; color: white; font-family: , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;helvetica neue&amp;quot; , sans-serif; font-size: 37.4889px; white-space: pre-wrap;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: #3d5466; color: white; font-family: , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;helvetica neue&amp;quot; , sans-serif; font-size: 37.4889px; white-space: pre-wrap;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: #3d5466; color: white; font-family: , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;helvetica neue&amp;quot; , sans-serif; font-size: 37.4889px; white-space: pre-wrap;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/0m3V1UMIuGk/default.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>0day Alert: Bypassing CVE-2019-10875  or, Xiaomi's Mint Browser's URL Spoofing patch: Discovered by Renwa</title><link>https://www.andmp.com/2019/04/bypassing-cve-2019-10875-or-xiaomis.html</link><category>0day</category><category>mobile security</category><category>Xiaomi</category><category>xiaomi browser 0day</category><category>xiaomi browser vulnerability</category><category>xiaomi security issue</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 7 Apr 2019 23:25:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8166728817383736132.post-2704101225272831683</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
A friend and fellow researcher Renwa disclosed a 0day in Xiaomi's Mi and Mint Browsers. He asked me to write about this on my blog since it's very similar to my previous find. He just found a bypass that lets him use the same trick that I used before,&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
Intro&lt;/h2&gt;
&lt;div&gt;
His exploit/PoC is just the same as mine. Domain stays same, query parameter same. But attacker's domain needs a subdomain same as the name of the query parameter.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
That's where he outsmarted Xiaomi's fix with a simple trick.&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
Who are still affected?&lt;/h2&gt;
&lt;/div&gt;
&lt;div&gt;
Mi Browser has not received the security patch. Neither has Mint Browser on Xiaomi's App Store.&amp;nbsp;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
Shady Security Patch? - Why? because it was so inadequate and easy to bypass!&lt;/h2&gt;
Too soon? Just after that big news about Xiaomi Browser Vulnerability broke. Makes one question about Xiaomi's overall credibility and security patching. How on earth could someone make such a fix that could be bypassed with just so little an effort? The patch seems shady since it could be bypassed so easily, don't agree? See for yourself. I have published a video PoC of the same.&lt;br /&gt;
&lt;br /&gt;
Renwa pinged me yesterday&amp;nbsp; about his new bypass of Mint Browser's patch in response to my URL spoofing vulnerability that I disclosed a few days back. This got me curious. I was not aware of this because the UPDATED version of Mint (1.6.3) wasn't available on Mi Appstore. I came to know from him that they released the patched version on Google Playstore on the 5th of April, 2019.&lt;br /&gt;
&lt;br /&gt;
His exploit is based on the fact that Xiaomi developers wrote some bad regex rules to patch my previous URL spoofing attack that failed on the onslaught of a new trick to circumvent the same. Was it intentional again :P?&lt;br /&gt;
&lt;br /&gt;
The fix didn't work anyways. Is this how Xiaomi puts things into production? Didn't they test for similar secuity issues or, what? They don't do it for Global products ;) or, what?&lt;br /&gt;
&lt;br /&gt;
Because, they either have started learning regex or, don't know how to patch security issues on their Browser products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
How?&lt;/h2&gt;
Renwa's 0day utilises the fact that their new Regex rules which were supposed to fix the previous problem, namely,&amp;nbsp;&lt;span style="background-color: white; font-family: &amp;quot;ruda&amp;quot;; font-size: 22px; font-weight: 700;"&gt;CVE-2019-10875&lt;/span&gt;&lt;span style="background-color: white; font-family: &amp;quot;ruda&amp;quot;; font-size: 22px; font-weight: 700;"&gt;&amp;nbsp;were not sufficient, not only that, it was not the appropriate measure.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: &amp;quot;ruda&amp;quot;; font-size: 22px; font-weight: 700;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;ruda&amp;quot;;"&gt;&lt;span style="background-color: white; font-size: 22px;"&gt;He bypassed their protection by using my previous trick including the target domain in 'q' parameter but, the only thing he included this time, the wittiest part is that it struck his mind what if he changes the *subdomain name* on the phishing domain to the target domain name? Guess what? Their patch failed to prevent this new bypass/attack. Renwa's assumption was right!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;ruda&amp;quot;;"&gt;&lt;span style="background-color: white; font-size: 22px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
New PoC or, attack vector that succeeds my older one&lt;/h2&gt;
&lt;div&gt;
&lt;a href="http://google.com.phishing-site.com/?q=google.com"&gt;http://google.com.phishing-site.com/?q=google.com&lt;/a&gt;&amp;nbsp;that spoofs google.com as an example&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Older PoC -&amp;gt;&amp;nbsp;&lt;a href="http://google.com.phishing-site.com/?q=google.com"&gt;http://phishing-site.com/?q=google.com&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
Video PoC&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/5QeZXwoqJGU/0.jpg" frameborder="0" height="266" src="https://www.youtube.com/embed/5QeZXwoqJGU?feature=player_embedded" width="320"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
Why?&lt;/h2&gt;
&lt;div&gt;
Perhaps Xiaomi security team didn't look deeper into this issue and how attackers could possibly bypass it with minimal changes. Which leads to a 0day, horrifying, isn't it?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
Parting Words&lt;/h2&gt;
&lt;div&gt;
I hope they don't make the same mistake again. Patch this 0day and test for similar types of vulnerabilities, adding more security to their Browser apps for the good of all Xiaomi users who rely on their Browsers.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
Credits&lt;/h2&gt;
&lt;div&gt;
&lt;a href="https://twitter.com/RenwaX23" target="_blank"&gt;Renwa&lt;/a&gt;.&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;ruda&amp;quot;;"&gt;&lt;span style="background-color: white; font-size: 22px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;ruda&amp;quot;;"&gt;&lt;span style="background-color: white; font-size: 22px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;ruda&amp;quot;;"&gt;&lt;span style="background-color: white; font-size: 22px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/5QeZXwoqJGU/default.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Xiaomi URL Address Bar spoofing w/ SSL vulnerability or, CVE-2019-10875 - Was it intentionally kept in the global versions by Xiaomi?</title><link>https://www.andmp.com/2019/04/xiaomi-url-spoofing-w-ssl-vulnerability.html</link><category>Mi</category><category>PoC</category><category>vulnerability</category><category>Xiaomi</category><category>xiaomi browser vulnerability</category><category>xiaomi security issue</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Apr 2019 03:16:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8166728817383736132.post-6446694991792293381</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: left;"&gt;
Introduction&lt;/h2&gt;
&lt;span style="font-family: sans-serif; font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif; font-size: 12.8px;"&gt;&lt;img alt="Image result for Xiaomi" src="data:image/png;base64,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" /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif; font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;

&lt;span style="font-family: sans-serif; font-size: 12.8px;"&gt;Are Chinese device makers on purpose making their software and OS insecure for international markets? Chinese manufacturers have always been well-known to have weaponized their products, and made them vulnerable for attackers or, themselves.&lt;/span&gt;&lt;br /&gt;
&lt;div dir="auto"&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;Xiaomi has always been criticized for pestering users with unwanted bloatware apps like Sharetrend (for example, users were forced to download it as part of an update) and it's unwanted ad campaigns. I recently came across &lt;a href="https://www.xda-developers.com/xiaomi-remove-obnoxious-ads-miui-add-new-features/" target="_blank"&gt;this&lt;/a&gt;, since finally MIUI 11 will get rid of all those unwanted malicious ads and bloatware, comes as a great relief for users, right? Well, there's more to it than disturbing ad content and things as such.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;Speaking of Xiaomi browsers, they lack even the most basic security features like XSS auditors. So, you are always at risk if you are using it. I advise using Chrome rather because it has a good XSS filter.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;span style="background-color: #1b95e0; color: white; font-family: , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;helvetica neue&amp;quot; , sans-serif; font-size: 14px; white-space: pre-wrap;"&gt;- Xiaomi Browsers don't have an XSS auditor. 
  - As an example, XSS attacks become simple
 - Also, common XSS attacks like ones in which you redirect to a javascript/data URI work in Xiaomi, thus making it the least secure, lacking basic security features. 

For a demo, type javascript:alert(); in Xiaomi browser and hit enter. There is no XSS auditor to protect you against such XSS attacks.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV6luqVxWBFDt0DVda8FXsk8fIAoUtwqYDf6CQ0I_jK-eOWydxIkz_0nsmzWYCsdZQYA538GmuEK7vYF8JLlQWNccgVKE-fpQskcTJIlBHxrgD4QxSqm3U2dAEApISvJXgFJ2wohiXKxan/s1600/Screenshot_2019-04-06-23-59-29-246_com.android.browser.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="1440" data-original-width="720" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV6luqVxWBFDt0DVda8FXsk8fIAoUtwqYDf6CQ0I_jK-eOWydxIkz_0nsmzWYCsdZQYA538GmuEK7vYF8JLlQWNccgVKE-fpQskcTJIlBHxrgD4QxSqm3U2dAEApISvJXgFJ2wohiXKxan/s320/Screenshot_2019-04-06-23-59-29-246_com.android.browser.png" width="160" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;In this case, I found a simple vulnerability in Xiaomi's browser applications. Interestingly, their Security team (MiSRC) confirmed the security issues to be present in their &lt;i&gt;global or, overseas versions and &lt;/i&gt;&lt;b style="font-style: italic;"&gt;not in their domestic ones.&lt;/b&gt;&amp;nbsp;Thus, they inadvertently conveyed the fact that only &lt;i style="font-weight: bold;"&gt;International versions of their browsers were insecure to this vulnerability, &lt;/i&gt;&lt;i&gt;which made me ponder into it.&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;i&gt;&amp;nbsp;A question that arises is: Are they targeting International users in particular for efficient &lt;b&gt;phishing campaigns, ad campaigns and &lt;/b&gt;distributing unwanted software or, malware? &lt;/i&gt;Lots of possibilities with things like this.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;b&gt;2 popular browser (global) versions are affected by this vulnerability (latest global versions), namely:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&amp;nbsp; &amp;nbsp;- Mi Browser (official pre-installed default app for every Xiaomi device), with over millions of installs&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&amp;nbsp; &amp;nbsp;- Mint Browser (global versions)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;b&gt;I have been testing MIUI for security bugs, for sometime now and have reported multiple security issues as such on their pre-installed apps and the MIUI OS (as a whole).&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
However, as for this bug, I would call this an &lt;b&gt;accidental discovery, cause&amp;nbsp;&lt;/b&gt;it didn't require much effort but somehow I decided to test a certain feature in their browser which was &lt;b&gt;behaving somewhat abnormally, than expected.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style="text-align: left;"&gt;
How I discovered the bug?&lt;/h3&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;Firstly, to every person who knows a bit about browsers, it seems pretty much as if they were trying to make the way Google search appears on their browser or, any other search engine's overall UX on their browser better, for &lt;i&gt;which they tried to display only the "search query" on their URL Address bar&lt;/i&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;This is the first idea that comes to mind, and indeed, this is how I first hit upon this bug, quite unknowingly, &lt;i&gt;when I once just opened a Google (query) search link in the Mi Browser, &lt;/i&gt;and that's how it all started.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;This is the sort of link I tried to open in Mi Browser, and ironically this is the PoC for my bug,&lt;i&gt; it shockingly needs almost 0 user interaction to exploit&lt;/i&gt;, just make a victim open this link and yeah, that's all to it,&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;https://www.google.com/?q=www.domain.com&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
Technical Details&lt;/h2&gt;
&lt;div&gt;
When you try to open a link with a query portion with that URL, Xiaomi's browsers try to display it as search engines would display it in the search bar. This is where the issue arises.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
For a link such as this,&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;https://www.google.com/?q=www.domain.com&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;The URL bar would display www.domain.com, and I guess that would give you a better search engine experience with this browser.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;This is exactly where the problem arises, because the URL bar doesn't display the full URL, and this not only happens in case of popular search engine websites but also with other websites.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;Thus, the issue is due to the way the Browser tries to render or, display the URL in the address bar, for example,&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;https://www.evil.com/?q=www.google.com&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;The website www.evil.com com can thus pretend to be www.google.com because of the way, the Browser handles the query parameter 'q' of the URL. It just happens with &lt;i&gt;the parameter &lt;b&gt;q.&amp;nbsp;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;i&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;b&gt;&lt;i&gt;The browser in such cases would only display the content in the parameter 'q' of the whole URL, but not the whole URL.&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
Video PoC&lt;/h2&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/u5OdvnzrJNM/0.jpg" frameborder="0" height="266" src="https://www.youtube.com/embed/u5OdvnzrJNM?feature=player_embedded" width="320"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;/h2&gt;
&lt;h2 style="text-align: left;"&gt;
Impact?&lt;/h2&gt;
&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;b&gt;Mi Browser is the default browser app to open such links, making it susceptible to phishing attacks. This makes it quite feasible to execute successful phishing, and ad campaigns on Mi devices, &lt;/b&gt;even for &lt;i&gt;Xiaomi themselves.&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;Coming back to the previous point, it appeared quite normal for the search term to appear on the browser's search bar, but what if that's the only thing which is being displayed on the Address Bar of the browser. Yep, that's what I observed, when I tapped on the URL Bar, I found only the "www.domain.com" and not the entire domain https://www.google.com/?q=www.domain.com was being displayed.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;This initially kept me skeptical but I assumed that this was intended by Xiaomi, keeping (popular and major) search engines in mind, to enhance user feel and feedback, overall UX. But, guess what?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;I went ahead to try this oddly interesting behaviour with my own blog's URL (which isn't a popular search engine), guess what happened after that? I managed to reproduce the same behaviour with other websites including mine as well, as shown here,&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;https://www.andmp.com/?q=www.google.com&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;And presto!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;The URL on the address bar, appeared as&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: sans-serif; font-size: 12.8px;"&gt;www.google.com with that SSL lock in the corner, although I was actually visiting my own blog www.andmp.com. Neato, for phishing?&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;i&gt;Xiaomi's blunder or, rather, was this intentional on Xiaomi's part?&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
My Opinion&lt;/h2&gt;
&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;The first thing that comes to one's mind after seeing this is, "This is a feature not a bug, right?"&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;But wait, Xiaomi proved me wrong. &lt;i&gt;Their security team MiSRC acknowledges it as a High Risk security issue for their global users&lt;/i&gt;. So, here I am, going a bit further and maybe, I will add more of my personal opinions on what I studied through all this - this maybe biased, and unacceptable to some, but yeah, feel free to skip this part and dive straight into the PoC part, who cares about that after all?&amp;nbsp; This is still unpatched as of now, in the latest release of the Global versions of Mi Browser and Mint Browser as available on Mi Appstore. I haven't been provided any ETA or, such assurances that it would be fixed at the soonest, nothing as such, they just said their Business were repairing or, had fixed it, but truth is even if they have done so, the patched version hasn't made its way to release as of yet.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;Up until now, everything I have said or, their security team told me, might sound queer, namely "global users", browser bar including nothing but the search query in the query parameter q, and not the entire URL. So, what's going on?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;Xiaomi confirmed that this was the case with their Global variants of Mi Browser. What about Chinese ones, balls wonder? But, according to them, going by their own words, DOMESTIC VERSIONS didn't show this behaviour. Why so?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;b&gt;Maybe, they targeted International Users for malware/unwanted software/ad campaigns. Should we rule out this possibility, given the nature of this bug, it goes unnoticeable (appears quite normal) but it's there?&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;Chinese (mobile) brands and device makers are infamous for this reason, they don't&amp;nbsp; care about security and privacy, I can give a lot of examples in this regard to prove my point, but let's keep that for another post, shall we?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;Let's blame their aggressive marketing, ad campaigns and phishing campaigns for these security issues. Chinese brands have always found new ways to mint money, even after the device has been bought, that maybe in the form of unwanted advertisements popping out of every other native app, harmful bloatware and as such.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;But this time, it's a vulnerability that can trick a user into believing that YOU ARE VISITING GOOGLE.COM BUT ACTUALLY YOU ARE VISITING EVIL.COM. However, that isn't my point, look at the simplicity of the bug and how it appears as part of the feature rather than being a vulnerability itself? Well that's how smart Chinese developers seem to be.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;Strangely, it's only present in Indian and overseas versions. So, was Xiaomi trying to find a way in which it can effectively distribute malware and set up phishing ad campaigns to trick it's International users who were blindly relying on this default in-built browser, should you trust Xiaomi in that case for anything, even your messages, or, any personal information stored on your phones? Well, this is what Chinese companies are known for internationally.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;Given the nature of this bug and how it can pass without being noticed, makes me feel it's intentional. Also, because it was not there in Mi Browser of Chinese versions of MIUI. This is mainly the reason behind my speculations!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
Some Attack Scenarios&lt;/h2&gt;
&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;Some Technical Prospects about this attack, for why this maybe a phishing trap intentionally set by Xiaomi for its foreign users towards whom they targeted their ad campaigns,&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;b&gt;As an adversary, one can preferably use a URL shortening service to further make this attack simpler, and more unnoticeable while directly sending links to victim users.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&amp;nbsp;- The PoC or, exploit needs &lt;i&gt;almost&lt;/i&gt; zero user interaction. User clicks on the link and off you go!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&amp;nbsp;- Malicious pop ups, they are now easier than ever to execute large-scale successful phishing campaigns!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&amp;nbsp;- Lastly, this seems like a huge flaw left purposefully by Xiaomi who promote such advertisement campaigns by their partners.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;This can even effectively be used to trick a user and steal his/her credentials, ask how?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&amp;nbsp;-&amp;gt; Attacker sends you crafted link&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&amp;nbsp; &amp;nbsp; -&amp;gt; Thereafter, he adds /?q=target.com to every menu link and everywhere you can click on the phishing page which successfully spoofs every bit of user interaction in the best way possible to give you an as much as real experience with the target web page which might be Google sign in page, just for example.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
Xiaomi Security Team's response and Reward&lt;/h2&gt;
&lt;div&gt;
They took sometime in confirming that this bug only affects the Global/overseas versions of their browser applications.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
They paid out a very low and unfair bounty, although they are a &lt;b&gt;multi-billion dollar company.&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;The vulnerability impacts millions of users globally yet the bounty offered as such was, $99 (for Mi Browser) and another $99 (for Mint Browser).&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;h2&gt;
Ridiculous, Xiaomi calls itself a multi-million dollar company and this is how they compensate researchers for their efforts in reality&lt;/h2&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;br /&gt;
&lt;img alt="Image" src="https://ton.twitter.com/1.1/ton/data/dm/1114183069240414214/1114183031009341441/CVa7nTmy.png:small" /&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="auto"&gt;
&lt;span style="font-family: sans-serif;"&gt;&lt;span style="font-size: 12.8px;"&gt;Peace!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV6luqVxWBFDt0DVda8FXsk8fIAoUtwqYDf6CQ0I_jK-eOWydxIkz_0nsmzWYCsdZQYA538GmuEK7vYF8JLlQWNccgVKE-fpQskcTJIlBHxrgD4QxSqm3U2dAEApISvJXgFJ2wohiXKxan/s72-c/Screenshot_2019-04-06-23-59-29-246_com.android.browser.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>The case of an unusual $10k worth content-based Blind SQLi in a Private Program</title><link>https://www.andmp.com/2019/03/the-case-of-unusual-10k-worth-content-based-sqli-bug.html</link><category>Blind SQLi</category><category>bug bounty writeup</category><category>content based</category><category>SQL injection</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 31 Mar 2019 11:44:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8166728817383736132.post-8371574786478465128</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
Blind SQL (Structured Query Language) injection is a type of&amp;nbsp;&lt;a href="https://www.owasp.org/index.php/SQL_Injection" style="background: none; color: #0b0080; text-decoration-line: none;" title="SQL Injection"&gt;SQL Injection&lt;/a&gt;&amp;nbsp;attack that asks the database true or false questions and determines the answer based on the applications response. This attack is often used when the web application is configured to show generic error messages, but has not mitigated the code that is vulnerable to SQL injection.&lt;/div&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
When an attacker exploits SQL injection, sometimes the web application displays error messages from the database complaining that the SQL Query's syntax is incorrect. Blind SQL injection is nearly identical to normal&amp;nbsp;&lt;a href="https://www.owasp.org/index.php/SQL_Injection" style="background: none; color: #0b0080;" title="SQL Injection"&gt;SQL Injection&lt;/a&gt;, the only difference being the way the data is retrieved from the database. When the database does not output data to the web page, an attacker is forced to steal data by asking the database a series of true or false questions. This makes exploiting the SQL Injection vulnerability more difficult, but not impossible.&amp;nbsp;&lt;/div&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
Using a simple page, which displays an article with given ID as the parameter, the attacker may perform a couple of simple tests to determine if the page is vulnerable to SQL Injection attacks.&lt;/div&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
Example URL:&lt;/div&gt;
&lt;pre style="background-color: #f9f9f9; border: 1px solid rgb(221, 221, 221); font-family: monospace, Courier; line-height: 1.3em; overflow-x: auto; padding: 1em; white-space: pre-wrap;"&gt;http://newspaper.com/items.php?id=2
&lt;/pre&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
sends the following query to the database:&lt;/div&gt;
&lt;pre style="background-color: #f9f9f9; border: 1px solid rgb(221, 221, 221); font-family: monospace, Courier; line-height: 1.3em; overflow-x: auto; padding: 1em; white-space: pre-wrap;"&gt;SELECT title, description, body FROM items WHERE ID = 2
&lt;/pre&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
The attacker may then try to inject a query that returns 'false':&lt;/div&gt;
&lt;pre style="background-color: #f9f9f9; border: 1px solid rgb(221, 221, 221); font-family: monospace, Courier; line-height: 1.3em; overflow-x: auto; padding: 1em; white-space: pre-wrap;"&gt;http://newspaper.com/items.php?id=2 and 1=2
&lt;/pre&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
Now the SQL query should looks like this:&lt;/div&gt;
&lt;pre style="background-color: #f9f9f9; border: 1px solid rgb(221, 221, 221); font-family: monospace, Courier; line-height: 1.3em; overflow-x: auto; padding: 1em; white-space: pre-wrap;"&gt;SELECT title, description, body FROM items WHERE ID = 2 and 1=2
&lt;/pre&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
If the web application is vulnerable to SQL Injection, then it probably will not return anything. To make sure, the attacker will inject a query that will return 'true':&lt;/div&gt;
&lt;pre style="background-color: #f9f9f9; border: 1px solid rgb(221, 221, 221); font-family: monospace, Courier; line-height: 1.3em; overflow-x: auto; padding: 1em; white-space: pre-wrap;"&gt;http://newspaper.com/items.php?id=2 and 1=1
&lt;/pre&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
If the content of the page that returns 'true' is different than that of the page that returns 'false', then the attacker is able to distinguish when the executed query returns true or false.&lt;/div&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
Once this has been verified, the only limitations are privileges set up by the database administrator, different SQL syntax, and the attacker's imagination&lt;/div&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
(From Owasp)&lt;/div&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #252525; font-family: sans-serif; line-height: inherit; margin-bottom: 0.5em; margin-top: 0.5em;"&gt;
--------------&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
Bummer, did you notice something? Title seemed dope? Couldn't resist looking at it once? Sorry to spoil your excitement mate. (Sed lyf you know!) Anyway, keep reading.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Wtf? Just copy-pasted content?&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
By the way, did you forget what day it is? (That depends on your timezone though)&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Pro Tip: Learn to distinguish clickbaits from legit ones. You 're still young at it and just another noob, much like me.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
EASTER EGG DUDE. LIKE SERIOUSLY, WHAT ELSE DID YOU EXPECT ON A DAY LIKE THIS?!&lt;br /&gt;
&lt;br /&gt;
Finally, it makes sense. Right, it does. Just look up your calendar if you still didn't!&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
TODAY IS THE FIRST DAY OF APRIL! So, 10k figure makes sense I guess, first day of April (1) and 4th month of the year in succession (4 zeros follow).&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Anyways, here's a good link to cheer you up! Btw, do you have a similar $10k writeup, do share with me on Twitter ;)&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyI_dwP1R3vcLQS2ez6aHqHfYDNKHoZ7lsx2GL4VVGrSyekQ2mtx0g4fbetG59F4KW3nJD4_yqX2qpX7xxw2yhWtNYfzID4Yb7aaBXARf45YZ3ow0FcJudOkMjgTBuWgcNk9P1kQPD4ISe/s1600/images.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="440" data-original-width="697" height="202" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyI_dwP1R3vcLQS2ez6aHqHfYDNKHoZ7lsx2GL4VVGrSyekQ2mtx0g4fbetG59F4KW3nJD4_yqX2qpX7xxw2yhWtNYfzID4Yb7aaBXARf45YZ3ow0FcJudOkMjgTBuWgcNk9P1kQPD4ISe/s320/images.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
Read more about Blind SQLi here,&amp;nbsp;https://www.owasp.org/index.php/Blind_SQL_Injection&lt;br /&gt;
&lt;br /&gt;
And here we go! Don't get fooled by clickbaits and last but not the least, (a meme stolen from the internet &#128518;),&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinU42iXAR1S249e6D6mIy5QvMgEKdry7g0fcwAP4M0cIbAQ-1GTRCTD2oi-vhdLSRMZGotYP9FlufRL6tzO2P8maD07gNfR310Q9912IRE0K1yYqzkCi5DO0Yz4M0ivZdEsaZc7Au9Dgdo/s1600/images+%25283%2529.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="339" data-original-width="433" height="250" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinU42iXAR1S249e6D6mIy5QvMgEKdry7g0fcwAP4M0cIbAQ-1GTRCTD2oi-vhdLSRMZGotYP9FlufRL6tzO2P8maD07gNfR310Q9912IRE0K1yYqzkCi5DO0Yz4M0ivZdEsaZc7Au9Dgdo/s320/images+%25283%2529.jpeg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
Alright, if it disappointed you then you are not alone. Who doesn't want $10k after all? If you read till the end, my clickbait experiment was successful.&amp;nbsp;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
Thanks for participating in my April Fool's day clickbait experiment. Another important thing, don't forget to let me know how you felt about it, after reading all this, come on, do say some good words in the comment box or, on Twitter!&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyI_dwP1R3vcLQS2ez6aHqHfYDNKHoZ7lsx2GL4VVGrSyekQ2mtx0g4fbetG59F4KW3nJD4_yqX2qpX7xxw2yhWtNYfzID4Yb7aaBXARf45YZ3ow0FcJudOkMjgTBuWgcNk9P1kQPD4ISe/s72-c/images.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>How I managed to get an @Google.com email address, bypassing their previous patch!</title><link>https://www.andmp.com/2018/12/how-i-managed-to-get-google.html</link><category>bug bounty</category><category>Business logic bugs</category><category>google</category><category>google issue tracker bug</category><category>hacking</category><category>hacking google</category><category>InfoSec</category><category>security</category><category>security testing</category><category>security writeup</category><category>ticket trick</category><author>noreply@blogger.com (Gopal Singh)</author><pubDate>Sat, 1 Dec 2018 01:00:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8166728817383736132.post-5293827933826703807</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="graf graf--p graf-after--h3" id="760c" name="760c" style="background-color: white; line-height: 1.58; margin-top: 10px;"&gt;
&lt;div style="color: rgba(0, 0, 0, 0.84); font-size: 21px; letter-spacing: -0.003em;"&gt;
&lt;i&gt;The Google Bug Tracker helps them(Google) in tracking through different bugs and security issues, but Gopal, a highly skilled security researcher managed to leverage and pilferage Google through its own issue tracker, isn't it quite creative? A defensive mechanism, since the same tool is used to track and patch security issues was implemented to pervade through Google's protection.&lt;/i&gt;&lt;/div&gt;
&lt;div style="color: rgba(0, 0, 0, 0.84); font-size: 21px; letter-spacing: -0.003em;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="color: rgba(0, 0, 0, 0.84); font-size: 21px; letter-spacing: -0.003em;"&gt;
&amp;nbsp;Every organisation have bug trackers, in fact, for example most companies use external ones like Jira bug tracker to track and resolve bugs, so what makes Google's case unique in particular is their custom tailored Issue Tracker and it's features. Security researcher &lt;a href="https://twitter.com/gopalsinghcse" target="_blank"&gt;Gopal &lt;/a&gt;discovered that although Google had in the past attempted to fix several security issues in their Bug Tracker, yet, it was unsafe and indeed his firm conviction led to him finding a different issue, that can be called a regression but nevertheless, he bypassed Google's previous fix proving the fact - No system can be made "secure" (completely), no matter what amount of patches you make, this again shows the need for bug bounties to motivate and attract highly talented talented individuals as Gopal, and also motivates security researchers to use offensive methods as the one mentioned in this case, and keep trying harder to circumvent all security measures kept in place, even previous patches.&lt;/div&gt;
&lt;div style="color: rgba(0, 0, 0, 0.84); font-size: 21px; letter-spacing: -0.003em;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="color: rgba(0, 0, 0, 0.84); font-size: 21px; letter-spacing: -0.003em;"&gt;
------------------------------------------------------&lt;/div&gt;
&lt;div style="color: rgba(0, 0, 0, 0.84); font-size: 21px; letter-spacing: -0.003em;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: rgba(0 , 0 , 0 , 0.83921568627451);"&gt;&lt;span style="font-size: 21px; letter-spacing: -0.063px;"&gt;How I managed to get a Google organisation email, bypassing their previous patch!&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;/div&gt;
&lt;div class="graf graf--p graf-after--p" id="432e" name="432e" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px;"&gt;
I came across this &lt;a href="https://medium.freecodecamp.org/messing-with-the-google-buganizer-system-for-15-600-in-bounties-58f86cc9f9a5" target="_blank"&gt;writeup&lt;/a&gt; by&amp;nbsp;&lt;a class="markup--user markup--p-user" data-action-type="hover" data-action-value="7fa68cbc850e" data-action="show-user-card" data-anchor-type="2" data-href="https://medium.com/@alex.birsan" data-user-id="7fa68cbc850e" href="https://medium.com/@alex.birsan" style="-webkit-tap-highlight-color: transparent; background-color: transparent; color: #03a87c; text-decoration-line: none;" target="_blank"&gt;Alex&lt;/a&gt;. I started testing the issue tracker, and I wanted to see if I could somehow manage to get an @google.com Account. In the issue tracker, I found the&amp;nbsp;&lt;i&gt;browse components feature. &lt;/i&gt;There&amp;nbsp;were two public issue trackers, I clicked on Android Public Tracker&lt;/div&gt;
&lt;div class="graf graf--p graf-after--p" id="cc30" name="cc30" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px;"&gt;
Bugs reported to &lt;i&gt;Android &lt;/i&gt;showed up here. To report a Bug in Android public issue tracker you may simply send an email to-&lt;/div&gt;
&lt;div class="graf graf--p graf-after--p" id="6fc4" name="6fc4" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px;"&gt;
&lt;span class="markup--strong markup--p-strong" style="font-weight: 700;"&gt;buganizer-system+&lt;/span&gt;&lt;em class="markup--em markup--p-em" style="font-feature-settings: &amp;quot;liga&amp;quot;, &amp;quot;salt&amp;quot;;"&gt;componentID&lt;/em&gt;&lt;span class="markup--strong markup--p-strong" style="font-weight: 700;"&gt;@google.com&lt;/span&gt;&lt;/div&gt;
&lt;div class="graf graf--p graf-after--p" id="0e38" name="0e38" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px;"&gt;
In this case, android’s component id is &lt;b&gt;190923&lt;/b&gt;.&lt;/div&gt;
&lt;div class="graf graf--p graf-after--p" id="a597" name="a597" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px;"&gt;
The issue I made, got listed in the public issue tracker. I got a confirmation email from&amp;nbsp;&lt;span class="markup--strong markup--p-strong" style="font-weight: 700;"&gt;buganizersystem+my_email@google.com&amp;nbsp;&lt;/span&gt;and hence, replies to the email would be directed to-&lt;/div&gt;
&lt;div class="graf graf--p graf-after--p" id="1ed7" name="1ed7" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px;"&gt;
&lt;span class="markup--strong markup--p-strong" style="font-weight: 700;"&gt;buganizer-system+&lt;/span&gt;&lt;em class="markup--em markup--p-em" style="font-feature-settings: &amp;quot;liga&amp;quot;, &amp;quot;salt&amp;quot;;"&gt;componentID&lt;/em&gt;&lt;span class="markup--strong markup--p-strong" style="font-weight: 700;"&gt;&lt;em class="markup--em markup--p-em" style="font-feature-settings: &amp;quot;liga&amp;quot;, &amp;quot;salt&amp;quot;;"&gt;+&lt;/em&gt;&lt;/span&gt;&lt;em class="markup--em markup--p-em" style="font-feature-settings: &amp;quot;liga&amp;quot;, &amp;quot;salt&amp;quot;;"&gt;issueID&lt;/em&gt;&lt;span class="markup--strong markup--p-strong" style="font-weight: 700;"&gt;@google.com&lt;/span&gt;&lt;/div&gt;
&lt;div class="graf graf--p graf-after--p" id="451d" name="451d" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px;"&gt;
I replied to that email and comment was posted in the conversation. I can add google email to see if I can get a confirmation code, to test this I clicked on&amp;nbsp;&lt;a class="markup--anchor markup--p-anchor" data-href="https://mail.google.com/mail/u/0/#settings/fwdandpop" href="https://mail.google.com/mail/u/0/#settings/fwdandpop" rel="noopener nofollow" style="-webkit-tap-highlight-color: rgba(0, 0, 0, 0.54); background-color: transparent; background-image: linear-gradient(to right, currentcolor 100%, currentcolor 0px); background-position: 0px calc(1em + 1px); background-repeat: repeat-x; background-size: 1px 1px; text-decoration-line: none;" target="_blank"&gt;Forwarding and POP/IMAP&lt;/a&gt;&amp;nbsp;in Gmail settings and added the google email to the forwarding email address. I was surprised to see I got a confirmation code in the Android public issue tracker.&lt;/div&gt;
&lt;div class="graf graf--p graf-after--p" id="b759" name="b759" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px;"&gt;
There are two parts here, to get a google account.&amp;nbsp;&lt;span class="markup--strong markup--p-strong" style="font-weight: 700;"&gt;Signup&lt;/span&gt;&amp;nbsp;and&amp;nbsp;&lt;span class="markup--strong markup--p-strong" style="font-weight: 700;"&gt;verification&lt;/span&gt;. I can verify a google account, but I could not signup for a @google.com account so my report got closed as &lt;i&gt;Won’t Fix. Bummer!&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;figure class="graf graf--figure graf-after--p" id="aa11" name="aa11" style="background-color: white; box-sizing: border-box; clear: both; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Open Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 20px; margin: 43px 0px 0px; outline: 0px; position: relative; user-select: auto; z-index: 100;"&gt;&lt;div class="aspectRatioPlaceholder is-locked" style="margin: 0px auto; max-height: 222px; max-width: 700px; position: relative; width: 699.991px;"&gt;
&lt;div class="aspectRatioPlaceholder-fill" style="padding-bottom: 222.587px;"&gt;
&lt;/div&gt;
&lt;div class="progressiveMedia js-progressiveMedia graf-image is-canvasLoaded is-imageLoaded" data-action-value="1*VPKKHkJihwBU5EGmiCO87Q.jpeg" data-action="zoom" data-height="410" data-image-id="1*VPKKHkJihwBU5EGmiCO87Q.jpeg" data-scroll="native" data-width="1290" style="background: rgba(0, 0, 0, 0); box-sizing: border-box; cursor: zoom-in; height: 222px; left: 0px; margin: auto; max-width: 100%; position: absolute; top: 0px; transition: background 0.2s ease 0s; width: 699.991px;"&gt;
&lt;canvas class="progressiveMedia-canvas js-progressiveMedia-canvas" height="22" style="backface-visibility: hidden; box-sizing: border-box; display: block; height: 222px; left: 0px; margin: auto; opacity: 0; position: absolute; top: 0px; transition: visibility 0s linear 0.5s, opacity 0.1s ease 0.4s; vertical-align: baseline; visibility: hidden; width: 699.991px;" width="75"&gt;&lt;/canvas&gt;&lt;img class="progressiveMedia-image js-progressiveMedia-image" data-src="https://cdn-images-1.medium.com/max/958/1*VPKKHkJihwBU5EGmiCO87Q.jpeg" src="https://cdn-images-1.medium.com/max/958/1*VPKKHkJihwBU5EGmiCO87Q.jpeg" style="backface-visibility: hidden; border: 0px; box-sizing: border-box; display: block; height: 222px; left: 0px; margin: auto; opacity: 1; position: absolute; top: 0px; transition: visibility 0s linear 0s, opacity 0.4s ease 0s; visibility: visible; width: 699.991px; z-index: 100;" /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/figure&gt;&lt;figure class="graf graf--figure graf--iframe graf-after--figure" id="272e" name="272e" style="background-color: white; box-sizing: border-box; clear: both; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Open Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 20px; margin: 52px 0px 0px; outline: 0px; position: relative; user-select: auto; z-index: 100;"&gt;&lt;div class="aspectRatioPlaceholder is-locked" style="margin: 0px auto; position: relative; width: 700.004px;"&gt;
&lt;div class="aspectRatioPlaceholder-fill" style="padding-bottom: 527.791px;"&gt;
&lt;/div&gt;
&lt;div class="progressiveMedia js-progressiveMedia is-canvasLoaded is-imageLoaded" data-scroll="native" style="background: rgba(0, 0, 0, 0); box-sizing: border-box; height: 527.791px; left: 0px; margin: auto; position: absolute; top: 0px; transition: background 0.2s ease 0s; width: 700.004px;"&gt;
&lt;canvas class="progressiveMedia-canvas js-progressiveMedia-canvas" height="56" style="backface-visibility: hidden; box-sizing: border-box; display: block; height: 527.791px; left: 0px; margin: auto; opacity: 0; position: absolute; top: 0px; transition: visibility 0s linear 0.5s, opacity 0.1s ease 0.4s; vertical-align: baseline; visibility: hidden; width: 700.004px;" width="75"&gt;&lt;/canvas&gt;&lt;br /&gt;
&lt;div class="iframeContainer" style="box-sizing: border-box; height: 527.791px; left: 0px; margin: auto; max-width: 100%; overflow: auto; position: absolute; top: 0px; width: 700.004px;"&gt;
&lt;iframe __idm_frm__="372" allowfullscreen="" class="progressiveMedia-iframe js-progressiveMedia-iframe" data-height="328" data-media-id="f43e2cd25ca7ebe9431e7afaf2d17fba" data-src="/media/f43e2cd25ca7ebe9431e7afaf2d17fba?postId=16134466ab15" data-thumbnail="https://i.embed.ly/1/image?url=https%3A%2F%2Fmedia.giphy.com%2Fmedia%2F6gLyE15StAs3C%2F200.gif&amp;amp;key=a19fcc184b9711e1b4764040d3dc5c07" data-width="435" frameborder="0" height="328" src="https://medium.com/media/f43e2cd25ca7ebe9431e7afaf2d17fba?postId=16134466ab15" style="box-sizing: border-box; display: block; height: 527.791px; left: 0px; margin: auto; max-width: 100%; position: absolute; top: 0px; transform: translateZ(0px); width: 700.004px;" width="435"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/figure&gt;&lt;br /&gt;
&lt;div class="graf graf--p graf-after--figure" id="9012" name="9012" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 38px;"&gt;
Then I started visiting every subdomain of Google to see if I could use google.com email to signup and this new signup page appeared.&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;figure class="graf graf--figure graf-after--p" id="98a9" name="98a9" style="background-color: white; box-sizing: border-box; clear: both; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Open Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 20px; margin: 43px 0px 0px; outline: 0px; position: relative; user-select: auto; z-index: 100;"&gt;&lt;div class="aspectRatioPlaceholder is-locked" style="margin: 0px auto; max-height: 572px; max-width: 700px; position: relative; width: 699.991px;"&gt;
&lt;div class="aspectRatioPlaceholder-fill" style="padding-bottom: 571.891px;"&gt;
&lt;/div&gt;
&lt;div class="progressiveMedia js-progressiveMedia graf-image is-canvasLoaded is-imageLoaded" data-action-value="1*FnYAmegCjYie3tJD31dW7A.jpeg" data-action="zoom" data-height="821" data-image-id="1*FnYAmegCjYie3tJD31dW7A.jpeg" data-is-featured="true" data-scroll="native" data-width="1005" style="background: rgba(0, 0, 0, 0); box-sizing: border-box; cursor: zoom-in; height: 571.891px; left: 0px; margin: auto; max-width: 100%; position: absolute; top: 0px; transition: background 0.2s ease 0s; width: 699.991px;"&gt;
&lt;canvas class="progressiveMedia-canvas js-progressiveMedia-canvas" height="60" style="backface-visibility: hidden; box-sizing: border-box; display: block; height: 571.891px; left: 0px; margin: auto; opacity: 0; position: absolute; top: 0px; transition: visibility 0s linear 0.5s, opacity 0.1s ease 0.4s; vertical-align: baseline; visibility: hidden; width: 699.991px;" width="75"&gt;&lt;/canvas&gt;&lt;img class="progressiveMedia-image js-progressiveMedia-image" data-src="https://cdn-images-1.medium.com/max/958/1*FnYAmegCjYie3tJD31dW7A.jpeg" src="https://cdn-images-1.medium.com/max/958/1*FnYAmegCjYie3tJD31dW7A.jpeg" style="backface-visibility: hidden; border: 0px; box-sizing: border-box; display: block; height: 571.891px; left: 0px; margin: auto; opacity: 1; position: absolute; top: 0px; transition: visibility 0s linear 0s, opacity 0.4s ease 0s; visibility: visible; width: 699.991px; z-index: 100;" /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/figure&gt;&lt;br /&gt;
&lt;div class="graf graf--p graf-after--figure" id="4738" name="4738" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 38px;"&gt;
I could feel my heartbeats racing, after coming across this new signup page. I signed up using the bug…@google.com email and then it asked me to verify by entering the code.&lt;/div&gt;
&lt;h3 class="graf graf--h3 graf-after--p" id="295b" name="295b" style="--baseline-multiplier: 0.22; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, &amp;quot;Lucida Grande&amp;quot;, &amp;quot;Lucida Sans Unicode&amp;quot;, &amp;quot;Lucida Sans&amp;quot;, Geneva, Arial, sans-serif; font-size: 34px; letter-spacing: -0.015em; line-height: 1.15; margin: 56px 0px 0px -2.13px;"&gt;
Verifying The email&amp;nbsp;address&lt;/h3&gt;
&lt;div class="graf graf--p graf-after--h3" id="38d3" name="38d3" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 8px;"&gt;
I was waiting for the verification code in the conversation and then received the verification code in the mail.&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;figure class="graf graf--figure graf-after--p" id="85a3" name="85a3" style="background-color: white; box-sizing: border-box; clear: both; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Open Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 20px; margin: 43px 0px 0px; outline: 0px; position: relative; user-select: auto; z-index: 100;"&gt;&lt;div class="aspectRatioPlaceholder is-locked" style="margin: 0px auto; max-height: 183px; max-width: 700px; position: relative; width: 699.991px;"&gt;
&lt;div class="aspectRatioPlaceholder-fill" style="padding-bottom: 182.687px;"&gt;
&lt;/div&gt;
&lt;div class="progressiveMedia js-progressiveMedia graf-image is-canvasLoaded is-imageLoaded" data-action-value="1*2V5EtNmYL9dLuWzzE5Pahg.jpeg" data-action="zoom" data-height="325" data-image-id="1*2V5EtNmYL9dLuWzzE5Pahg.jpeg" data-scroll="native" data-width="1243" style="background: rgba(0, 0, 0, 0); box-sizing: border-box; cursor: zoom-in; height: 182.687px; left: 0px; margin: auto; max-width: 100%; position: absolute; top: 0px; transition: background 0.2s ease 0s; width: 699.991px;"&gt;
&lt;canvas class="progressiveMedia-canvas js-progressiveMedia-canvas" height="18" style="backface-visibility: hidden; box-sizing: border-box; display: block; height: 182.687px; left: 0px; margin: auto; opacity: 0; position: absolute; top: 0px; transition: visibility 0s linear 0.5s, opacity 0.1s ease 0.4s; vertical-align: baseline; visibility: hidden; width: 699.991px;" width="75"&gt;&lt;/canvas&gt;&lt;img class="progressiveMedia-image js-progressiveMedia-image" data-src="https://cdn-images-1.medium.com/max/958/1*2V5EtNmYL9dLuWzzE5Pahg.jpeg" src="https://cdn-images-1.medium.com/max/958/1*2V5EtNmYL9dLuWzzE5Pahg.jpeg" style="backface-visibility: hidden; border: 0px; box-sizing: border-box; display: block; height: 182.687px; left: 0px; margin: auto; opacity: 1; position: absolute; top: 0px; transition: visibility 0s linear 0s, opacity 0.4s ease 0s; visibility: visible; width: 699.991px; z-index: 100;" /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/figure&gt;&lt;figure class="graf graf--figure graf-after--figure" id="bd07" name="bd07" style="background-color: white; box-sizing: border-box; clear: both; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Open Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 20px; margin: 52px 0px 0px; outline: 0px; position: relative; user-select: auto; z-index: 100;"&gt;&lt;div class="aspectRatioPlaceholder is-locked" style="margin: 0px auto; max-height: 281px; max-width: 700px; position: relative; width: 699.991px;"&gt;
&lt;div class="aspectRatioPlaceholder-fill" style="padding-bottom: 280.696px;"&gt;
&lt;/div&gt;
&lt;div class="progressiveMedia js-progressiveMedia graf-image is-canvasLoaded is-imageLoaded" data-action-value="1*i3SoADa-WPpR624Nr9BPyA.jpeg" data-action="zoom" data-height="373" data-image-id="1*i3SoADa-WPpR624Nr9BPyA.jpeg" data-scroll="native" data-width="930" style="background: rgba(0, 0, 0, 0); box-sizing: border-box; cursor: zoom-in; height: 280.696px; left: 0px; margin: auto; max-width: 100%; position: absolute; top: 0px; transition: background 0.2s ease 0s; width: 699.991px;"&gt;
&lt;canvas class="progressiveMedia-canvas js-progressiveMedia-canvas" height="29" style="backface-visibility: hidden; box-sizing: border-box; display: block; height: 280.696px; left: 0px; margin: auto; opacity: 0; position: absolute; top: 0px; transition: visibility 0s linear 0.5s, opacity 0.1s ease 0.4s; vertical-align: baseline; visibility: hidden; width: 699.991px;" width="75"&gt;&lt;/canvas&gt;&lt;img class="progressiveMedia-image js-progressiveMedia-image" data-src="https://cdn-images-1.medium.com/max/958/1*i3SoADa-WPpR624Nr9BPyA.jpeg" src="https://cdn-images-1.medium.com/max/958/1*i3SoADa-WPpR624Nr9BPyA.jpeg" style="backface-visibility: hidden; border: 0px; box-sizing: border-box; display: block; height: 280.696px; left: 0px; margin: auto; opacity: 1; position: absolute; top: 0px; transition: visibility 0s linear 0s, opacity 0.4s ease 0s; visibility: visible; width: 699.991px; z-index: 100;" /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/figure&gt;&lt;br /&gt;
&lt;div class="graf graf--p graf-after--figure" id="86d0" name="86d0" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 38px;"&gt;
After successfully signing up for the Google Account, I reopened the issue.&lt;/div&gt;
&lt;div class="graf graf--p graf-after--p" id="fce1" name="fce1" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 29px;"&gt;
&lt;span class="markup--strong markup--p-strong" style="font-weight: 700;"&gt;Nice catch!&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;figure class="graf graf--figure graf-after--p" id="18b4" name="18b4" style="background-color: white; box-sizing: border-box; clear: both; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Open Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 20px; margin: 43px 0px 0px; outline: 0px; position: relative; user-select: auto; z-index: 100;"&gt;&lt;div class="aspectRatioPlaceholder is-locked" style="margin: 0px auto; max-height: 161px; max-width: 700px; position: relative; width: 699.991px;"&gt;
&lt;div class="aspectRatioPlaceholder-fill" style="padding-bottom: 160.996px;"&gt;
&lt;/div&gt;
&lt;div class="progressiveMedia js-progressiveMedia graf-image is-canvasLoaded is-imageLoaded" data-action-value="1*OM8Cx-NTdPsFxkGJgMcqxQ.jpeg" data-action="zoom" data-height="295" data-image-id="1*OM8Cx-NTdPsFxkGJgMcqxQ.jpeg" data-scroll="native" data-width="1285" style="background: rgba(0, 0, 0, 0); box-sizing: border-box; cursor: zoom-in; height: 160.996px; left: 0px; margin: auto; max-width: 100%; position: absolute; top: 0px; transition: background 0.2s ease 0s; width: 699.991px;"&gt;
&lt;canvas class="progressiveMedia-canvas js-progressiveMedia-canvas" height="16" style="backface-visibility: hidden; box-sizing: border-box; display: block; height: 160.996px; left: 0px; margin: auto; opacity: 0; position: absolute; top: 0px; transition: visibility 0s linear 0.5s, opacity 0.1s ease 0.4s; vertical-align: baseline; visibility: hidden; width: 699.991px;" width="75"&gt;&lt;/canvas&gt;&lt;img class="progressiveMedia-image js-progressiveMedia-image" data-src="https://cdn-images-1.medium.com/max/958/1*OM8Cx-NTdPsFxkGJgMcqxQ.jpeg" src="https://cdn-images-1.medium.com/max/958/1*OM8Cx-NTdPsFxkGJgMcqxQ.jpeg" style="backface-visibility: hidden; border: 0px; box-sizing: border-box; display: block; height: 160.996px; left: 0px; margin: auto; opacity: 1; position: absolute; top: 0px; transition: visibility 0s linear 0s, opacity 0.4s ease 0s; visibility: visible; width: 699.991px; z-index: 100;" /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/figure&gt;&lt;br /&gt;
&lt;div class="graf graf--p graf-after--figure" id="9dd4" name="9dd4" style="--baseline-multiplier: 0.17; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-serif-font, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 1.58; margin-top: 38px;"&gt;
Finally, at 9:50 PM that day, the most awaited email arrived&amp;nbsp;&lt;span class="markup--strong markup--p-strong" style="font-weight: 700;"&gt;$3133.70&lt;/span&gt;. I could not sleep the whole night.&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;figure class="graf graf--figure graf-after--p" id="d047" name="d047" style="background-color: white; box-sizing: border-box; clear: both; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Open Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 20px; margin: 43px 0px 0px; outline: 0px; position: relative; user-select: auto; z-index: 100;"&gt;&lt;div class="aspectRatioPlaceholder is-locked" style="margin: 0px auto; max-height: 333px; max-width: 700px; position: relative; width: 699.991px;"&gt;
&lt;div class="aspectRatioPlaceholder-fill" style="padding-bottom: 333.196px;"&gt;
&lt;/div&gt;
&lt;div class="progressiveMedia js-progressiveMedia graf-image is-canvasLoaded is-imageLoaded" data-action-value="1*cp_Noolq5VnWPNf3NqgNGg.jpeg" data-action="zoom" data-height="604" data-image-id="1*cp_Noolq5VnWPNf3NqgNGg.jpeg" data-scroll="native" data-width="1269" style="background: rgba(0, 0, 0, 0); box-sizing: border-box; cursor: zoom-in; height: 333px; left: 0px; margin: auto; max-width: 100%; position: absolute; top: 0px; transition: background 0.2s ease 0s; width: 699.991px;"&gt;
&lt;canvas class="progressiveMedia-canvas js-progressiveMedia-canvas" height="35" style="backface-visibility: hidden; box-sizing: border-box; display: block; height: 333px; left: 0px; margin: auto; opacity: 0; position: absolute; top: 0px; transition: visibility 0s linear 0.5s, opacity 0.1s ease 0.4s; vertical-align: baseline; visibility: hidden; width: 699.991px;" width="75"&gt;&lt;/canvas&gt;&lt;img class="progressiveMedia-image js-progressiveMedia-image" data-src="https://cdn-images-1.medium.com/max/958/1*cp_Noolq5VnWPNf3NqgNGg.jpeg" src="https://cdn-images-1.medium.com/max/958/1*cp_Noolq5VnWPNf3NqgNGg.jpeg" style="backface-visibility: hidden; border: 0px; box-sizing: border-box; display: block; height: 333px; left: 0px; margin: auto; opacity: 1; position: absolute; top: 0px; transition: visibility 0s linear 0s, opacity 0.4s ease 0s; visibility: visible; width: 699.991px; z-index: 100;" /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/figure&gt;&lt;figure class="graf graf--figure graf--iframe graf-after--figure" id="e743" name="e743" style="background-color: white; box-sizing: border-box; clear: both; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Open Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 20px; margin: 52px 0px 0px; outline: 0px; position: relative; user-select: auto; z-index: 100;"&gt;&lt;div class="aspectRatioPlaceholder is-locked" style="margin: 0px auto; position: relative; width: 700.004px;"&gt;
&lt;div class="aspectRatioPlaceholder-fill" style="padding-bottom: 381.496px;"&gt;
&lt;/div&gt;
&lt;div class="progressiveMedia js-progressiveMedia is-canvasLoaded is-imageLoaded" data-scroll="native" style="background: rgba(0, 0, 0, 0); box-sizing: border-box; height: 381.496px; left: 0px; margin: auto; position: absolute; top: 0px; transition: background 0.2s ease 0s; width: 700.004px;"&gt;
&lt;canvas class="progressiveMedia-canvas js-progressiveMedia-canvas" height="41" style="backface-visibility: hidden; box-sizing: border-box; display: block; height: 381.496px; left: 0px; margin: auto; opacity: 0; position: absolute; top: 0px; transition: visibility 0s linear 0.5s, opacity 0.1s ease 0.4s; vertical-align: baseline; visibility: hidden; width: 700.004px;" width="75"&gt;&lt;/canvas&gt;&lt;br /&gt;
&lt;div class="iframeContainer" style="box-sizing: border-box; height: 381.496px; left: 0px; margin: auto; max-width: 100%; overflow: auto; position: absolute; top: 0px; width: 700.004px;"&gt;
&lt;iframe __idm_frm__="373" allowfullscreen="" class="progressiveMedia-iframe js-progressiveMedia-iframe" data-height="237" data-media-id="fdb342c567e77df042c0ae4eebfff141" data-src="/media/fdb342c567e77df042c0ae4eebfff141?postId=16134466ab15" data-thumbnail="https://i.embed.ly/1/image?url=https%3A%2F%2Fmedia.giphy.com%2Fmedia%2F3KC2jD2QcBOSc%2Fgiphy.gif&amp;amp;key=a19fcc184b9711e1b4764040d3dc5c07" data-width="435" frameborder="0" height="237" src="https://medium.com/media/fdb342c567e77df042c0ae4eebfff141?postId=16134466ab15" style="box-sizing: border-box; display: block; height: 381.496px; left: 0px; margin: auto; max-width: 100%; position: absolute; top: 0px; transform: translateZ(0px); width: 700.004px;" width="435"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/figure&gt;&lt;br /&gt;
&lt;h3 class="graf graf--h3 graf-after--figure" id="acdd" name="acdd" style="--baseline-multiplier: 0.22; background-color: white; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, &amp;quot;Lucida Grande&amp;quot;, &amp;quot;Lucida Sans Unicode&amp;quot;, &amp;quot;Lucida Sans&amp;quot;, Geneva, Arial, sans-serif; font-size: 34px; letter-spacing: -0.015em; line-height: 1.15; margin: 53px 0px 0px -2.13px;"&gt;
&lt;span class="markup--strong markup--h3-strong"&gt;Video PoC&lt;/span&gt;&lt;/h3&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/d5LjoitHkIY/0.jpg" frameborder="0" height="266" src="https://www.youtube.com/embed/d5LjoitHkIY?feature=player_embedded" width="320"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;figure class="graf graf--figure graf--iframe graf-after--h3" id="cd60" name="cd60" style="background-color: white; box-sizing: border-box; clear: both; color: rgba(0, 0, 0, 0.84); font-family: medium-content-sans-serif-font, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Open Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; font-size: 20px; margin: 44px 0px 0px; outline: 0px; position: relative; user-select: auto; z-index: 100;"&gt;&lt;div class="aspectRatioPlaceholder is-locked" style="margin: 0px auto; position: relative; width: 700.004px;"&gt;
&lt;div class="progressiveMedia js-progressiveMedia is-canvasLoaded is-imageLoaded" data-scroll="native" style="background: rgba(0, 0, 0, 0); box-sizing: border-box; height: 393.391px; left: 0px; margin: auto; position: absolute; top: 0px; transition: background 0.2s ease 0s; width: 700.004px;"&gt;
&lt;canvas class="progressiveMedia-canvas js-progressiveMedia-canvas" height="56" style="backface-visibility: hidden; box-sizing: border-box; display: block; height: 393.391px; left: 0px; margin: auto; opacity: 0; position: absolute; top: 0px; transition: visibility 0s linear 0.5s, opacity 0.1s ease 0.4s; vertical-align: baseline; visibility: hidden; width: 700.004px;" width="75"&gt;&lt;/canvas&gt;&lt;br /&gt;
&lt;div class="iframeContainer" style="box-sizing: border-box; height: 393.391px; left: 0px; margin: auto; max-width: 100%; overflow: auto; position: absolute; top: 0px; width: 700.004px;"&gt;
&lt;iframe __idm_frm__="374" allowfullscreen="" class="progressiveMedia-iframe js-progressiveMedia-iframe" data-height="480" data-media-id="fb70ff3dea381b611da10811136c870c" data-src="/media/fb70ff3dea381b611da10811136c870c?postId=16134466ab15" data-thumbnail="https://i.embed.ly/1/image?url=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fd5LjoitHkIY%2Fhqdefault.jpg&amp;amp;key=a19fcc184b9711e1b4764040d3dc5c07" data-width="854" frameborder="0" height="393" src="https://medium.com/media/fb70ff3dea381b611da10811136c870c?postId=16134466ab15" style="box-sizing: border-box; display: block; height: 393.391px; left: 0px; margin: auto; max-width: 100%; position: absolute; top: 0px; transform: translateZ(0px); width: 700.004px;" width="700"&gt;&lt;/iframe&gt;&lt;span style="background-color: rgba(0, 0, 0, 0); font-size: 21px; letter-spacing: -0.003em;"&gt;Thanks to&amp;nbsp;&lt;/span&gt;&lt;a class="markup--user markup--p-user" data-action-type="hover" data-action-value="7fa68cbc850e" data-action="show-user-card" data-anchor-type="2" data-href="https://medium.com/@alex.birsan" data-user-id="7fa68cbc850e" href="https://medium.com/@alex.birsan" style="background-color: transparent; color: #03a87c; font-size: 21px; letter-spacing: -0.003em;" target="_blank"&gt;Alex Birsan&lt;/a&gt;&lt;span style="background-color: rgba(0, 0, 0, 0); font-size: 21px; letter-spacing: -0.003em;"&gt;&amp;nbsp;this would not be possible without his write-up. I learned a lot from reading write-ups&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/figure&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/d5LjoitHkIY/default.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Escalating SSRF in a Vulnerable Jira Instance to RCE via Docker Engine API</title><link>https://www.andmp.com/2018/11/escalating-ssrf-in-vulnerable-jira.html</link><category>bug bounty</category><category>hacking</category><category>penetration testing</category><category>Reddit</category><category>security testing</category><category>SSRF</category><author>noreply@blogger.com (Unknown)</author><pubDate>Wed, 28 Nov 2018 21:23:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8166728817383736132.post-8959404869489618702</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="background-color: black; box-sizing: border-box; color: #cfd0ca; font-family: helvetica, arial, sans-serif; font-size: 13px; margin-bottom: 9px; overflow-wrap: break-word; word-break: keep-all;"&gt;
Originally posted by me on Reddit. This is just a repost of what I wrote there on /r/netsec, and formatting is a bit awkward.&amp;nbsp; &lt;strike&gt;Due to some glitch I found out it couldn't be published there.&amp;nbsp;&lt;/strike&gt;&lt;/div&gt;
&lt;div style="background-color: black; box-sizing: border-box; color: #cfd0ca; font-family: helvetica, arial, sans-serif; font-size: 13px; margin-bottom: 9px; overflow-wrap: break-word; word-break: keep-all;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: black; box-sizing: border-box; color: #cfd0ca; font-family: helvetica, arial, sans-serif; font-size: 13px; margin-bottom: 9px; overflow-wrap: break-word; word-break: keep-all;"&gt;
Awhile back, I posted on&amp;nbsp;&lt;a href="https://twitter.com/payloadartist/status/1062248690679668736?s=20" style="background: transparent; box-sizing: border-box; color: #82c9f5; text-decoration-line: none;"&gt;Twitter&lt;/a&gt;&amp;nbsp;about achieving&amp;nbsp;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;Remote Code Execution in Jira instances deployed over Docker.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: black; box-sizing: border-box; color: #cfd0ca; font-family: helvetica, arial, sans-serif; font-size: 13px; margin-bottom: 9px; overflow-wrap: break-word; word-break: keep-all;"&gt;
It's a common sight these days, to come across internal bug trackers of large companies who simply don't firewall their internal network. As a result, one can achieve varying impacts, but&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;I believe, sky is the limit ;)&lt;/em&gt;&lt;/div&gt;
&lt;div style="background-color: black; box-sizing: border-box; color: #cfd0ca; font-family: helvetica, arial, sans-serif; font-size: 13px; margin-bottom: 9px; overflow-wrap: break-word; word-break: keep-all;"&gt;
&lt;em style="box-sizing: border-box;"&gt;Orangetsai&lt;/em&gt;&amp;nbsp;has previously demonstrated some&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;exceptional cases of acheiveing RCE via SSRF based vulnerabilities&lt;/em&gt;, which further motivated me to research into this topic.&lt;/div&gt;
&lt;div style="background-color: black; box-sizing: border-box; color: #cfd0ca; font-family: helvetica, arial, sans-serif; font-size: 13px; margin-bottom: 9px; overflow-wrap: break-word; word-break: keep-all;"&gt;
Upon delving deeper, I found out that,&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;a huge number of Jira instances were exposed publically which itself is thought provoking and tempted me to look further into ways in which I could exploit it.&lt;/em&gt;&lt;/div&gt;
&lt;ul style="background-color: black; box-sizing: border-box; color: #cfd0ca; font-family: helvetica, arial, sans-serif; font-size: 13px; margin-bottom: 9px; margin-top: 0px;"&gt;
&lt;li style="box-sizing: border-box;"&gt;I was able to earn a couple bug bounties along the way on&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;BugCrowd&lt;/em&gt;&amp;nbsp;by successfully demonstrating XSS, with cookies scoped to parent domains in those cases allowing me to execute a full fledged ATO attack via Reflected XSS using SSRF in the Vulnerable Jira instance.&lt;/li&gt;
&lt;li style="box-sizing: border-box;"&gt;&lt;div style="box-sizing: border-box; margin-bottom: 9px; overflow-wrap: break-word; word-break: keep-all;"&gt;
The next considerable impact was&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;some critical information disclosure, which happened only at times, when you passed on a wrong or, malformed URL in your request&lt;/em&gt;&amp;nbsp;and Jira gave you an&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;interesting stack trace containing more internal information&lt;/em&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li style="box-sizing: border-box;"&gt;&lt;div style="box-sizing: border-box; margin-bottom: 9px; overflow-wrap: break-word; word-break: keep-all;"&gt;
Only in two counts of cases could I&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;leverage this to penetrate into the intranet of the concerned company&lt;/em&gt;&amp;nbsp;(which was interesting alone) and find some internal vulnerable software. The impact kept on increasing at each step as I progressed further and this was no more a simple report which most security researchers are tempted to make viz. Reflected XSS, SSRF and Exposed Jira Panels. Hence, I got something more to put in my security report.&lt;/div&gt;
&lt;/li&gt;
&lt;li style="box-sizing: border-box;"&gt;&lt;div style="box-sizing: border-box; margin-bottom: 9px; overflow-wrap: break-word; word-break: keep-all;"&gt;
As I kept digging deeper, I came across a&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;Jira instance which was deployed over Docker&lt;/em&gt;. Ask how? I put together a simple Python script that would keep hitting the&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;consumerUri&lt;/em&gt;&amp;nbsp;parameter with different payloads like [::1], localhost, and the likes, also with some deliberately filthy payloads just to exfiltrate some information. The endpoint is https://[Jira-server host.tld]/jira/plugins/servlet/oauth/users/icon-uri?consumerUri=&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: black; box-sizing: border-box; color: #cfd0ca; font-family: helvetica, arial, sans-serif; font-size: 13px; margin-bottom: 9px; overflow-wrap: break-word; word-break: keep-all;"&gt;
So, while monkey testing, and fuzzing I finally constructed this payload - https://[Jira-server-host.tld]/jira/plugins/servlet/oauth/users/icon-uri?consumerUri=http://[::1]:2375/containers/json&lt;/div&gt;
&lt;div style="background-color: black; box-sizing: border-box; color: #cfd0ca; font-family: helvetica, arial, sans-serif; font-size: 13px; margin-bottom: 9px; overflow-wrap: break-word; word-break: keep-all;"&gt;
Bam! We got some sensitive&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;docker credentials&lt;/em&gt;&amp;nbsp;stored as environment variables through an unauthenticated request to the Docker Engine API via an&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;SSRF vulnerability in that Jira instance&lt;/em&gt;&amp;nbsp;and are now in a position to conclude&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;we performed an RCE in an internal network where practically no XSS would hold that great an impact!&lt;/em&gt;&amp;nbsp;This could be rare but a notable case.&lt;/div&gt;
&lt;div style="background-color: black; box-sizing: border-box; color: #cfd0ca; font-family: helvetica, arial, sans-serif; font-size: 13px; margin-bottom: 9px; overflow-wrap: break-word; word-break: keep-all;"&gt;
Do you have some ideas on how to exploit this further? Do post your ideas on this!&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>What are Subdomain Takeovers, How to Test and Avoid them?</title><link>https://www.andmp.com/2018/08/what-are-subdomain-takeovers-how-to.html</link><category>hostile subdomain takeovers</category><category>SECURITY RESEARCH</category><category>security testing</category><category>security writeup</category><category>Subdomain takeovers</category><category>vulnerability analysis</category><category>vulnerability assessment</category><author>noreply@blogger.com (Unknown)</author><pubDate>Tue, 21 Aug 2018 23:16:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8166728817383736132.post-2202449989157480453</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://dz2cdn2.dzone.com/storage/article-thumb/10064721-thumb.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="500" data-original-width="800" height="199" src="https://dz2cdn2.dzone.com/storage/article-thumb/10064721-thumb.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h1&gt;
Introduction&lt;/h1&gt;
&lt;div pid="2"&gt;
&lt;i&gt;Hostile Subdomain takeover&lt;/i&gt; forms a class of attacks which has appeared quite often in large organisations due to a large number of factors like human negligence and a huge overall attack surface. A similar sort of attack is &lt;i&gt;stale DNS entries&lt;/i&gt; which often lead to the hijacking of the domain itself. This has already happened a number of times each in case of companies like &lt;a href="https://hackerone.com/reports/383564"&gt;Starbucks , &lt;/a&gt;&lt;a href="https://hackerone.com/reports/219205"&gt;Uber have already paid thousands of dollars for these security vulnerabilities reported by researchers. &lt;/a&gt;&lt;i&gt;Uber actually had more than one subdomain takeovers in the past&lt;/i&gt;. This often leads to companies losing their trust over the users and various other implications, due to loss of millions of dollars when a successful subdomain takeover is maliciously executed and an attacker puts up a successful phishing campaign. In this article, I will discuss about practical cases, impact and mitigation of this attack and share useful tips to avoid such situations.&lt;/div&gt;
&lt;div pid="8"&gt;
It's understandable though that for large organisations with a huge number of assets and servers DNS monitoring becomes too tedious, which can, of course, be automated with in-house solutions as well as paid ones and with a little care and effort be manually checked so that you don't leave stale &lt;i&gt;DNS entries (CNAME records).&lt;/i&gt;&lt;/div&gt;
&lt;div pid="15"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 pid="6"&gt;
What are Subdomain takeovers?&lt;/h2&gt;
&lt;div pid="3"&gt;
Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed or deleted. This allows an attacker to set up a page on the service that was being used and point their page to that subdomain. For example, if subdomain.example.com was pointing to a GitHub page and the user decided to delete their GitHub page, an attacker can now create a GitHub page, add a CNAME file containing subdomain.example.com, and claim subdomain.example.com.&lt;/div&gt;
&lt;div pid="7"&gt;
&lt;i&gt;Not only can this happen with your company's GitHub hosted pages but also with Amazon S3 buckets &lt;/i&gt;which are no longer in use but a subdomain is still pointing at it.&lt;/div&gt;
&lt;div pid="9"&gt;
As an attacker one can thus make use of this stale DNS record to own the AWS S3 bucket or point one's own GitHub pages to your (sub)domain, which is no longer in use by your organisation and use it to target your innocent users into leaking their account details via XSS and phishing pages hosted on your companies' domains.&lt;/div&gt;
&lt;h3 pid="19"&gt;
Further Impact&lt;/h3&gt;
&lt;div pid="21"&gt;
In many a case, an attacker can easily steal victim user's cookies via XSS if they are allowed on the subdomain, so that needs even little user interaction than usual phishing pages which are set up to steal user credentials.&lt;/div&gt;
&lt;h2 pid="16"&gt;
Some Notable Cases of Subdomain takeovers&lt;/h2&gt;
&lt;div pid="17"&gt;
Given below are companies who have been victim to this attack in the past.&lt;/div&gt;
&lt;ol&gt;
&lt;li&gt; &lt;div pid="18"&gt;
&lt;a href="https://hackerone.com/reports/195350"&gt;Slack&lt;/a&gt; - through &lt;span data-reactroot=""&gt;&lt;code&gt;podcasts.slack-core.com&lt;/code&gt;&lt;/span&gt; which was serving content via Feedpress&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt; &lt;div pid="18"&gt;
&lt;a href="https://hackerone.com/reports/263902"&gt;US Government - &lt;/a&gt;Via GitHub pages&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt; &lt;div pid="18"&gt;
&lt;a href="https://hackerone.com/reports/312118"&gt;GitLab&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt; &lt;div pid="18"&gt;
&lt;a href="https://hackerone.com/reports/219205"&gt;Uber&lt;/a&gt;&lt;a href="https://hackerone.com/reports/312118"&gt; - &lt;/a&gt;Leading to &lt;i&gt;Account Takeover&lt;/i&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt; &lt;div pid="18"&gt;
&lt;a href="https://hackerone.com/redirect?signature=0ce1ab68dbdd87a25605f108a853767d1bf1bb7f&amp;amp;url=https%3A%2F%2Fmedium.com%2F%40know.0nix%2Fhundreds-of-hundreds-subdomains-hack3d-including-hacker0ne-ad3acd1c0a44"&gt;Unbounced&lt;/a&gt; - Many different pages/domains belonging to different companies&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;div pid="18"&gt;
And many more...&lt;/div&gt;
&lt;h2 pid="11"&gt;
Mitigation&lt;/h2&gt;
&lt;div pid="12"&gt;
As an end user of a service - Going through your organisation's DNS records in a routine manner or while discontinuing or terminating a service, for example, a GitHub or an AWS S3 instance, safely removing it's DNS records.&lt;/div&gt;
&lt;div pid="12"&gt;
As a service provider, by implementing stricter methods to prove (sub) domain ownership.&lt;/div&gt;
&lt;h2 pid="14"&gt;
Testing for Subdomain Takeovers&lt;/h2&gt;
&lt;div pid="13"&gt;
Given below are some heuristic testing methodology to determine subdomain takeovers.&lt;/div&gt;
&lt;h1&gt;
Heuristic Tests to determine if a sub-domain/domain can be taken over&lt;/h1&gt;
&lt;table&gt; &lt;thead&gt;
&lt;tr&gt; &lt;th&gt;Engine&lt;/th&gt; &lt;th&gt;Possible&lt;/th&gt; &lt;th&gt;Fingerprint&lt;/th&gt; &lt;th&gt;Reference&lt;/th&gt; &lt;/tr&gt;
&lt;/thead&gt; &lt;tbody&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#aws-s3"&gt;AWS/S3&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;The specified bucket does not exist&lt;/code&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#bitbucket"&gt;Bitbucket&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;Repository not found&lt;/code&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#campaign-monitor"&gt;Campaign Monitor&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;a href="https://help.campaignmonitor.com/custom-domain-names" rel="nofollow"&gt;Support Page&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#cargo-collective"&gt;Cargo Collective&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;404 Not Found&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;a href="https://support.2.cargocollective.com/Using-a-Third-Party-Domain" rel="nofollow"&gt;Cargo Support Page&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#cloudfront"&gt;Cloudfront&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;Bad Request: ERROR: The request could not be satisfied&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;a href="https://blog.zsec.uk/subdomainhijack/" rel="nofollow"&gt;https://blog.zsec.uk/subdomainhijack/&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#desk"&gt;Desk&lt;/a&gt;&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#fastly"&gt;Fastly&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;Fastly error: unknown domain:&lt;/code&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#feedpress"&gt;Feedpress&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;The feed has not been found.&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;a href="https://hackerone.com/reports/195350" rel="nofollow"&gt;https://hackerone.com/reports/195350&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#freshdesk"&gt;Freshdesk&lt;/a&gt;&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;td&gt;&lt;a href="https://support.freshdesk.com/support/solutions/articles/37590-using-a-vanity-support-url-and-pointing-the-cname" rel="nofollow"&gt;Freshdesk Support Page&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#ghost"&gt;Ghost&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;The thing you were looking for is no longer here, or never was&lt;/code&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#github"&gt;Github&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;There isn't a Github Pages site here.&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;a href="https://hackerone.com/reports/263902" rel="nofollow"&gt;https://hackerone.com/reports/263902&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#gitlab"&gt;Gitlab&lt;/a&gt;&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;td&gt;&lt;a href="https://hackerone.com/reports/312118" rel="nofollow"&gt;https://hackerone.com/reports/312118&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#google-cloud-storage"&gt;Google Cloud Storage&lt;/a&gt;&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#help-juice"&gt;Help Juice&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;We could not find what you're looking for.&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;a href="https://help.helpjuice.com/34339-getting-started/custom-domain" rel="nofollow"&gt;Help Juice Support Page&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#help-scout"&gt;Help Scout&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;No settings were found for this company:&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;a href="https://docs.helpscout.net/article/42-setup-custom-domain" rel="nofollow"&gt;HelpScout Docs&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#heroku"&gt;Heroku&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;No such app&lt;/code&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#jetbrains"&gt;JetBrains&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;is not a registered InCloud YouTrack&lt;/code&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#mashery"&gt;Mashery&lt;/a&gt;&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;td&gt;&lt;code&gt;Unrecognized domain&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;a href="https://hackerone.com/reports/275714" rel="nofollow"&gt;https://hackerone.com/reports/275714&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#microsoft-azure"&gt;Microsoft Azure&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#sendgrid"&gt;Sendgrid&lt;/a&gt;&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#shopify"&gt;Shopify&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;Sorry, this shop is currently unavailable.&lt;/code&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#squarespace"&gt;Squarespace&lt;/a&gt;&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#statuspage"&gt;Statuspage&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;You are being redirected&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;a href="https://hackerone.com/reports/49663" rel="nofollow"&gt;https://hackerone.com/reports/49663&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#surge.sh"&gt;Surge.sh&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;project not found&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;a href="https://surge.sh/help/adding-a-custom-domain" rel="nofollow"&gt;https://surge.sh/help/adding-a-custom-domain&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#tumblr"&gt;Tumblr&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;Whatever you were looking for doesn't currently exist at this address&lt;/code&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#tilda"&gt;Tilda&lt;/a&gt;&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;td&gt;&lt;code&gt;Please renew your subscription&lt;/code&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#unbounce"&gt;Unbounce&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;The requested URL was not found on this server.&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;a href="https://hackerone.com/reports/202767" rel="nofollow"&gt;https://hackerone.com/reports/202767&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#uservoice"&gt;UserVoice&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;This UserVoice subdomain is currently available!&lt;/code&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#wordpress"&gt;Wordpress&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;Do you want to register *.wordpress.com?&lt;/code&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#wp-engine"&gt;WP Engine&lt;/a&gt;&lt;/td&gt; &lt;td&gt;No&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td&gt;&lt;a href="https://github.com/EdOverflow/can-i-take-over-xyz#zendesk"&gt;Zendesk&lt;/a&gt;&lt;/td&gt; &lt;td&gt;Yes&lt;/td&gt; &lt;td&gt;&lt;code&gt;Help Center Closed&lt;/code&gt;&lt;/td&gt; &lt;td&gt;&lt;a href="https://support.zendesk.com/hc/en-us/articles/203664356-Changing-the-address-of-your-Help-Center-subdomain-host-mapping-" rel="nofollow"&gt;Zendesk Support&lt;/a&gt;&lt;/td&gt; &lt;/tr&gt;
&lt;/tbody&gt; &lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;
&lt;h1&gt;
Something that I missed? Feel free to add in comments and I will be adding them!&lt;/h1&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>