Today I want to share a short write-up about a stored cross-site scripting (XSS) issue I found on the Google Cloud Console. I consider it a lucky find. Some of you may remember the tweet I sent to Frans Rosén after he discovered a vulnerability on Google Payments:
As it turned out, among the unsuccessful XSS payloads I saved on my Google account, there was one that actually fired. But unexpectedly. When I was originally testing my payloads, I never managed to trigger the execution until recently and inadvertently. But let’s start from the beginning.
Here’s the video POC I sent in for the Google VRP:
That’s it 🙂
Thanks to Peter @yaworsk for editing :-)! Follow him and support him by buying his book ! For more technical writeups have a look at ERNW’s Insinuator blog, I blog there now and then about Mobile Security and IPv6.
If you have any questions please feel free to contact me at patrik.fehrenbach (at) it-securityguard.com