ThunderScan® Discovered Multiple Vulnerabilities in Google API Client Library for PHP
During the security audit of Google APIs Client Library for PHP multiple XSS vulnerabilities were discovered using DefenseCode ThunderScan® SAST application source code security analysis platform. The Google API Client Library for PHP is designed for PHP client-application developers. It offers simple, flexible, powerful access to many Google APIs such as Google+, Drive, or YouTube.
The Cross-Site Scripting vulnerability can enable the attacker to construct the URL that contains malicious JavaScript code. If the administrator of the site makes a request to such an URL, the attacker’s code will be executed, with unrestricted access to the site in question. The attacker can entice the administrator to visit the URL in various ways, including sending the URL by email, posting it as a part of the comment on the vulnerable site or another forum. Once the unsuspecting user has visited such an URL, the attacker can proceed to send requests to the API on the behalf of the victim from his JavaScript.
Full advisory can be read here.
Latest News
- Latest Generation of Dynamic Application Security Testing solution from DefenseCode – WebStrike
- Ubiquitous AI Corporation appointed as DefenseCode’s partner
- DefenseCode announces GitHub Action to provide SAST solution for developers
- DefenseCode ThunderScan® SAST 2.1.0 added support for Go and ABAP languages
- ThunderScan® Enterprise SAST Now Supports Linux