Security

How I found a bug in YouTube that let me watch private videos I wasn't allowed to, says compsci student

Theft-by-a-thousand-cuts flaw fixed


Until early last year, Google's YouTube had a security flaw that made private videos visible at reduced resolution, though not audible, to anyone who knew or guessed the video identifier and possessed the technical knowledge to take advantage of the snafu.

The bug was fixed in January 2020, after it was identified in December, 2019, by David Schütz, a computer science student at the University of Szeged in Hungary, and reported to Google through the company's Vulnerability Rewards Program (VRP).

On Monday, Schütz published his account of how he found the bug, which resided in a system called Moments that was intended to allow advertisers to mark a specific frame in the video, such as the appearance of a brand-relevant image.

Schütz found that the act of marking a Moment in a video generated a POST request to the /GetThumbnails endpoint and returned a base64-encoded thumbnail image from the video. And it turned out that if you made such a network request using the identifier of a private video, the ad tool would still fetch a thumbnail image.

Video encoders using Huawei chips have backdoors and bad bugs – and Chinese giant says it's not to blame

READ MORE

At that point, Schütz reasoned that he might be able to use the Insecure Direct Object Reference, or IDOR, that he had identified to request a series of individual frames and combine them into a sequence that approximates the original video.

"I wanted to make a proof of concept Python script which generates an actual, moving 'video,'" he explained in his writeup. "I searched for some calculations, and figured out that if the video is in 24 FPS, one frame stays on the screen for 33 milliseconds. So I just have to download every image starting from 0 milliseconds, incrementing by 33 milliseconds every time, and then construct some kind of video using all of the images I have acquired."

It worked. Schütz was able to download thumbnails for a sequence of frames that could be reassembled and played back. And he made a video of that process which you can see below:

Schütz acknowledges that the technique has limitations – thumbnails images yield a low-resolution reconstruction, there's no audio track captured, and you have to supply the identifier of the private video to be fetched – something not easily guessed.

But he notes that the flaw underscores the value of looking at how adjacent systems interact. In this case, YouTube's developers overlooked the security and privacy implications of the Moments feature.

For his efforts, Schütz was awarded a $5,000 bug bounty in January, 2020, in accordance with Google's VRP. That, incidentally, was the amount the company paid in 2015 to security researcher Kamil Hismatullin after he reported a bug that made it possible for anyone to delete anyone else's videos. ®

Send us news
9 Comments

YouTube now sabotages ad-blocking apps that stream its vids

EFF lambastes latest 'lazy and deliberately malicious move'

OpenAI's GPT-4 can exploit real vulnerabilities by reading security advisories

While some other LLMs appear to flat-out suck

Ex-CEO of 'unicorn' app startup HeadSpin heads to jail after BS'ing investors

Lachwani faked it but didn't make it

Cisco creates architecture to improve security and sell you new switches

Hypershield detects bad behavior and automagically reconfigures networks to snuff out threats

Governments issue alerts after 'sophisticated' state-backed actor found exploiting flaws in Cisco security boxes

Don't get too comfortable: 'Line Dancer' malware may be targeting other vendors, too

Microsoft slammed for lax security that led to China's cyber-raid on Exchange Online

CISA calls for 'fundamental, security-focused reforms' to happen ASAP, delaying work on other software

Microsoft squashes SmartScreen security bypass bug exploited in the wild

Plus: Adobe, SAP, Fortinet, VMware, Cisco issue pressing updates

IBM to acquire Hashi for $6.4 billion, hopes it will boost software biz and Red Hat

Investors want to know what Big Blue is smoking after growth disappoints

US Air Force says AI-controlled F-16 fighter jet has been dogfighting with humans

Robo-plane was made to restrain itself so as not to harm pilot or airframe

Crooks exploit OpenMetadata holes to mine crypto – and leave a sob story for victims

'I want to buy a car. That's all'

Japanese government rejects Yahoo<i>!</i> infosec improvement plan

Just doesn't believe it will sort out the mess that saw data leak from LINE messaging app

IT consultant-cum-developer in court over hiding COVID-19 loan

Syzmon Jastrzebski bagged six figures, money written off as he's left the country