[bounty] Hacking Google Drive Integrations and XSS Puzzles

Published: Feb. 8, 2022, 9 p.m.

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/hacking-google-drive-integrations-and-xss-puzzles.html

\n

A "maybe" issue this week in Ruby's net/http library, some long chains leading to XSS, and a look at abusing parameter injection for SSRF in applications integrating with the Google Drive API.

\n

[00:00:26] [Ruby - net/http] HTTP Header Injection in the set_content_type method

\n

[00:10:22] Don't trust comments

\n

[00:16:54] HigherLogic Community RCE Vulnerability

\n

[00:24:29] Solving DOM XSS Puzzles

\n

[00:37:32] Hacking Google Drive Integrations

\n

The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:

\n

    \n\t
  • Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
  • \n\t
  • Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
  • \n
\n

The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec

\n

You can also join our discord: https://discord.gg/daTxTK9

\n

Or follow us on Twitter (@dayzerosec) to know when new releases are coming.