Business Logic Flaw in Google Acquisition! (Hall Of Fame)

InfoSec Write-ups – Medium–

Always Try Harder! Because It’s Google!


I would like to thank all the Bug Hunters for their tedious effort in improving internet security and reaching out to read my little GOOGLE-Bug Hunting story and my experience on achieving GOOGLE-Hall Of Fame!

I had started my Bug Hunting journey about 3 months ago, for the first three months I practised Bug Hunting on numerous private platforms which enhanced my confidence and my interest in internet-based research for Bug Hunting. As Google is extremely secured platform, it took a few days to understand various Google Domains and Google Acquisition? I have reported total 3 vulnerabilities (P2>S2) in Google and all of them are accepted.

Hall Of Fame!

You have to understand first, what type of domains are managed by Google and What is an Acquisition of Google!? 🙄 If you have found any other domain which is not listed in Wikipedia, then check that domain on (whois lookup) and remember that Registrant and Administrative contact should be Google LLC

Details of Reported Bug:

I had selected and reported two vulnerabilities on this domain without using any tools:

  1. File/Document is not deleted permanently after deletion documents are still accessible globally. (Does the deleted data get stored permanently on Workbencheducation?)
    After understanding the fundamentals of the application, I realized that the uploaded files were stored in AWS S3 bucket. I was curious to know what happens after I have deleted my uploaded file. Certainly, I found that the deleted file was still publicly accessible.
  2. Either you choose accessibility of an uploaded File to be Private or Public, it is still accessible by the public, so anyone can access that File from the internet.
    Later I reported this Bug, and after an intense study on the same domain 🧐, I found another Bug. It was observed that the uploaded file was stored in AWS. There was a feature in that application for students to make assignment Public or Private. The logic was clear that if the assignment is set as private then it should not be publicly available. If it is still publicly accessible then it is insensible to provide the feature of making a file public and private in the application.

Steps to follow:
1. Create and login to the account
2. Now, click on create button and select upload file and fill necessary information.
3. Upload any file/document and click on save button.
4. Copy the uploaded document link and open through any web browser and validate it by opening the same link in any incognito mode.
4. Now, Delete the uploaded file and browse again using the uploaded document link, you should be able to access or download the same file.
5. You can still download or access the same file anytime, through the same uploaded document link.

Attack Scenarios and Impacts:
Even if the user has uploaded their personal documents opting Private accessibility yet those files were publically accessible.
1. This directly concerns with the privacy of the user as it stores all the deleted data of the person which is supposed to be deleted permanently.
2. The user may misuse the functionality of the feature of making the uploaded file into Public or Private access, either way, it still remains as public access, this breaches the trust and integrity of the user.
3. The Postsecondary researchers might get adversely affected by this misuse of the functionality due to their tedious data being Plagerised, and Research may lose its Uniqueness.

Try to be familiar with the targeted domain and understand all its functionalities. Keep exploring and understanding new technologies and never limit your knowledge. There is always something which we don’t know, think out of the box. #TryHarder 🎯 #NeverGiveUp 💪.

🎯Business Logic Flaw in Google Acquisition! (Hall Of Fame)🎯 was originally published in InfoSec Write-ups on Medium, where people are continuing the conversation by highlighting and responding to this story.

View original article on InfoSec Write-ups – Medium

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s