Python XSS flaw left Google open to attackers
A security researcher reveals how a scripting flaw left many Google services open to an attacker.

Google recently fixed a cross-site scripting vulnerability that could have allowed an attacker to take over a number of its services.
According to researcher Inferno' on Securethoughts.com, the vulnerability in Google's Support Python Script could have allowed an intruder to transfer a user's Google.com cookie to a malicious site.
This means that an attacker would have a user's Google.com domain cookie, which is the single sign-On cookie to all Google services.
A criminal could have had access to Google Mail, Contacts, Google Docs, Code, Sites, website analytics as well as be able to install malicious widgets in an iGoogle homepage.
However rather than publish the vulnerability, Inferno reported it straight to Google, which responded within the hour and fixed the flaw after a little more than two weeks.
Inferno said on the blog: "I believe in responsible disclosure, so I waited for this vulnerability to be fixed completely."
Inferno said that the time Google took to fix the flaw was due to vulnerable python script being used in lots of places.
A Google spokesperson said: "We immediately investigated this issue after it was privately reported to us, and we resolved it prior to publication. We take the security of our users very seriously."
Four strategies for building a hybrid workplace that works
All indications are that the future of work is hybrid, if it's not here already

The digital marketer’s guide to contextual insights and trends
How to use contextual intelligence to uncover new insights and inform strategies

Ransomware and Microsoft 365 for business
What you need to know about reducing ransomware risk

Building a modern strategy for analytics and machine learning success
Turning into business value
