News

Google ‘Send Feedback’ bug could expose your sensitive data to attackers

This week, security researcher KL Sreeram has disclosed a vulnerability in Google Docs which could let hackers steal sensitive data present in your docs.

The bug occurs due to how Google’s “Send Feedback” mechanism is implemented within Docs.

“Send Feedback” screenshots document data

When using Google services, such as Docs, an inbuilt feedback sharing mechanism allows users to send to Google a screenshot of their browser window and any additional feedback related to the product being used.

“When you click on the button, a popup would appear asking you to describe the problem and this feature automatically takes a screenshot, sending (uploading) the data to Google for further review,” says Sreeram.

Google implements this feedback sharing popup via an iframe embedded within the parent page which is running the Google product, such as Docs.

Sreeram wondered how exactly was Google displaying this screenshot image, which included the contents of the document, which could could sensitive information in some cases.

“I found, the image was being uploaded to Google via postMessage, and then rendered in the popup box before being sent to Google for further investigation,” explained the researcher.

The postMessage method enables cross-origin communication between different Window objects, such as iframes.

On a closer look, Sreeram noted the exact workflow by which Google was able to take the screenshot, render it as an image and send it along with user feedback to their domains.

Screenshot data can be hijacked by an attacker

Initially, the researcher could not find any direct XSS exploit which could be used to grab the screenshot.

But, the postMessage function responsible for transmitting the screenshot data to feedback.googlusercontent.com is called a second time within the Send Feedback workflow, where it specifies a “*” (wild card scope) in place of a specific domain or URL to which the data should be submitted.

windowRef.postmessage("<Data>","*");

“The final postmessage function upon submitting the feedback was configured in a manner that allowed modifying the iFrame to an evil website,” explains Sreeram.

The wildcard scope, along with inadequate cross-origin request sharing protections allowed cases where this data could instead be routed to an evil attacker-controlled server, as long as there was some user interaction.

“The security misconfiguration here is the wildcard scope *  that allowed me to steal and hijack Google Docs screenshots which were meant to be uploaded to Google’s servers,” said the researcher.

By writing a simple HTML page exploit which embeds a Google document, the researcher demonstrated how an attacker could improvise a JavaScript that alters the timer functionality used by the “Send Feedback” feature to load iframes every 6 seconds.

But, by exploiting this vulnerability, the attacker could hijack the iframe location to their page, and steal the screenshot taken by the user of their document.

“This could have allowed any attacker to steal sensitive information about your Google Docs documents and presentations, since organizations use it as part of G Suite for managing highly sensitive information. Although, this attack needs some user interaction but its not impossible given an attacker can easily convince a victim to perform the needed interaction (button click),” explained Sreeram.

The researcher has been awarded a $3,133.7 bug bounty for responsibly reporting the flaw via Google’s VRP program.

Sreeram’s detailed findings have been posted on SaveBreach and his blog.

A Proof of Concept (PoC) video detailing the exploit is provided below:

Ax Sharma

Ax Sharma is a Security Researcher and Tech Reporter. His works and expert analyses have frequently been featured by leading media outlets including the BBC, Business Insider, Fortune, TechCrunch, TechRepublic, The Register, WIRED, among others. Ax's expertise lies in vulnerability research, malware analysis and reverse engineering, open source software and scams investigations. He's an active community member of British Association of Journalists (BAJ) and Canadian Association of Journalists (CAJ).

Recent Posts

Sea Turtle Cyber Espionage Campaign Targets Telecommunication and IT Companies in the Netherlands

Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the…

4 months ago

Rogue WordPress plugin: Threat hunters uncover credit card skimming campaign targeting e-commerce sites

Rogue WordPress Plugin Found to Steal Credit Card Information in Magecart Campaign Threat hunters have…

4 months ago

Albanian Parliament and telco ‘One Albania’ suffer cyber attacks

The Assembly of the Republic of Albania and telecom company One Albania have recently fallen…

4 months ago

Carbanak Banking Malware Resurfaces with Updated Tactics in Ransomware Attacks

The banking malware Carbanak has resurfaced with updated tactics, incorporating attack vendors and techniques to…

4 months ago

Theme park giant Parques Reunidos hit by a ransomware cyber attack

One of the world's largest theme park operators, Parques Reunidos has disclosed a cybersecurity incident.…

1 year ago

Phishing kit screenshots your email domain on the fly to appear real

Phishing kit used by multiple hacked sites generates a log in page on the fly…

1 year ago

This website uses cookies.