Comments (5)
Hi,
Actually if you add the correct referer header, it will go through for all of the applications. For this vulnerability-misconfiguration type, Google Maps now only suggests header based security controls such as Referer or Application header controls. So if the referer is correct, there is nothing to do. This actually blocks usage from other web applications directly since there is no chance to manipulate referer headers from web browser use.
from gmapsapiscanner.
Sorry, it's still a bit unclear to me, you're saying that if I add the correct referer header all the endpoints will work?
In that case, what we're actually testing is the ability to use the maps api key from another website, rather than the ability to cause financial damage to the key owner by repeated use of his key (for example through burp intruder or a shell script)?
Am I understanding correctly ?
from gmapsapiscanner.
Yeah that's true. If you want to harm the key owner within repeated use, you can do anyways within the repeating the original request going from the original web application unless JS API is used (Because the behavior in JS API is a little bit complex comparing to the other API's). Google does not offer any other abuse protection system rather than referer header security control. Only configuration a developer can be make is actually restricting the referer so the API key cannot be used by other application unauthorizedly. In this case, abuse from other application would not be possible, however abuse for denial of service or financial damage would still be possible.
I recommend you to read my 2 blog posts about it, referenced in readme file.
from gmapsapiscanner.
Oh wow, I didn't know you were an expert on the matter, now I'm following you on twitter.
Thanks for the reply mate!
gg
from gmapsapiscanner.
Glad to help!
from gmapsapiscanner.
Related Issues (14)
- google map in iframe HOT 2
- Add Firebase Cloud Messaging (FCM) check HOT 2
- False positive Embed (Basic) API HOT 2
- Security HOT 1
- Embed API is now unlimited free usage and not a vulnerability HOT 1
- No module named 'requests' HOT 3
- json.decoder.JSONDecodeError: Expecting value: line 1 column 1 (char 0) HOT 2
- add referer HOT 1
- issue HOT 1
- Embed check will always work HOT 5
- Reduce needed steps for JavaScript API test (semi auto or completely auto) HOT 4
- Allow set api_key via command-line argument HOT 1
- Add Containerfile to repo HOT 1
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from gmapsapiscanner.