Published Sun, Mar 8th, 2020
Platforms
A vulnerability in Google's common JavaScript library allowed bypassing domain validation checks across multiple Google products. By using a backslash character in URLs, an attacker could make the regex parser and browser disagree on the authority (domain) portion of a URL, allowing injection of arbitrary domains that pass whitelisting checks.
Cloud Console, GMail API, Actions Console, YouTube Studio, Google Accounts
None required
No tracked CVEs
Contributed by https://github.com/korniko98
Entry Status
Stub (AI-Generated)
Disclosure Date
Sat, Jan 4th, 2020
Exploitability Period
Until 2020/03/06
Known ITW Exploitation
-
Detection Methods
Monitor for unexpected URL parsing behaviors, especially URLs containing backslash characters between the authority and path components.
Piercing Index Rating
-
Discovered by
David Schütz