Skip to content Skip to footer
0 items - $0.00 0

Leaking the email of any YouTube user for $10,000 by brutecat

Leaking the email of any YouTube user for $10,000 by brutecat

23 Comments

  • Post Author
    michpoch
    Posted February 12, 2025 at 12:10 pm

    Am I very naive expecting the payout to be significantly higher?

  • Post Author
    robin_reala
    Posted February 12, 2025 at 12:11 pm

    I’d misunderstood the title to refer to $10k of GPU compute or something like that. Unfortunately I suspect there’ll be tens or hundreds of occurrences of this bug given that they just picked one old Google product and immediately found a hole.

  • Post Author
    nullderef
    Posted February 12, 2025 at 12:11 pm

    Breaking the email system so that it's not sent is the cherry on top. With companies as big as Google who have developed so many products, "security" feels fake. If every line of code is a possible vulnerability, with millions it's just inevitable. It feels like the only way is to keep things simple (e.g., deprecate the recorder site), but even then.

  • Post Author
    55555
    Posted February 12, 2025 at 12:12 pm

    This is a puny payout IMO. If they poked around a bit more they may have found a better GAIA->Email vulnerability or perhaps could just use the one they found. A database of emails for every major youtube channel would be worth an awful lot.

  • Post Author
    suyash
    Posted February 12, 2025 at 12:14 pm

    Question is is this patched or the vulnerability still exists?

  • Post Author
    billpg
    Posted February 12, 2025 at 12:14 pm

    It's (channel-name)@gmail.com

    I'll take a cheque.

  • Post Author
    fnordian_slip
    Posted February 12, 2025 at 12:16 pm

    Very nice breakdown. But while 10,000 dollars seems like a decent sum, I expected more for a bug of this severity, if I'm being honest. Especially as they initially only awarded 3100. But I'm not sure how much is usual for such cases. Almost 150 days also seems kind of a long time for fixing it imho.

  • Post Author
    doctorhandshake
    Posted February 12, 2025 at 12:19 pm

    Is it me or are all the dates in this timeline in the future? Isn’t it Feb 2025 now? Do you smell toast?

    EDIT: oh I see .. DD/MM/YY is a new one to me

  • Post Author
    AznHisoka
    Posted February 12, 2025 at 12:23 pm

    “Applied 1 downgrade from the base amount due to complexity of attack chain required” <— is this common?

    I’ve only participated in a few vulnerability programs, and most of them reward less if the security flaw is stupidly simple (but serious) such as revealing user emails in the page source.

  • Post Author
    ForHackernews
    Posted February 12, 2025 at 12:27 pm

    > That params is nothing more than just base64 encoded protobuf, which is a common encoding format used throughout Google.

    Pour one out for the google dev in charge of b64 encoding their fancy binary message format so it can be jammed inside a JSON blob. If you want a vision of the future, imagine a boot with "worse is better" imprinted on the sole stomping on an engineer's face, forever.

  • Post Author
    sebstefan
    Posted February 12, 2025 at 12:31 pm

    “Applied 1 downgrade from the base amount due to complexity of attack chain required”

    The attack chain isn't that complex…

    It's very lame to be stingy with a bug bounty program.

  • Post Author
    hoerzu
    Posted February 12, 2025 at 12:37 pm

    I haven't gotten access to my YouTube channel since it migrated to Google account. If anyone can set me in contact with anyone who can help recover my account, it will be rewarded with karma for life

  • Post Author
    philipwhiuk
    Posted February 12, 2025 at 12:43 pm

    > Some time ago, I was looking for a research target in Google and was digging through the Internal People API (Staging) discovery document

    Should… should this just be public: https://staging-people-pa.sandbox.googleapis.com/$discovery/…

  • Post Author
    kensai
    Posted February 12, 2025 at 12:44 pm

    I hear heads rolling…

  • Post Author
    neilv
    Posted February 12, 2025 at 12:46 pm

    $10k seems too small, for discovering a bad security mess-up by employees each getting paid 20 to 70 times that amount (or more).

  • Post Author
    andrewstuart
    Posted February 12, 2025 at 12:51 pm

    $10,000 ain’t much for that.

  • Post Author
    tptacek
    Posted February 12, 2025 at 1:10 pm

    Since every 3rd message on this thread (at the time I wrote this) is about how Google underpaid for this bug, some quick basic things about vulnerability valuations:

    * Valuations for server-side vulnerabilities are low, because vendors don't compete for them. There is effectively no grey market for a server-side vulnerability. It is difficult for a third party to put a price on a bug that Google can kill instantaneously, that has effectively no half-life once discovered, and whose exploitation will generate reliable telemetry from the target.

    * Similarly, bugs like full-chain Android/Chrome go for hundreds of thousands of dollars because Google competes with a well-established grey market; a firm can take that bug and sell it to potentially 6 different agencies at a single European country.

    * Even then, bounty vs. grey market is an apples-oranges comparison. Google will pay substantially less than the grey market, because Google doesn't need a reliable exploit (just proof that one can be written) and doesn't need to pay maintenance. The rest of the market will pay a total amount that is heavily tranched and subject to risk; Google can offer a lump-sum payment which is attractive even if discounted.

    * Threat actors buy vulnerabilities that fit into existing business processes. They do not, as a general rule, speculate on all the cool things they might do with some new kind of vulnerability and all the ways they might make money with it. Collecting payment information? Racking up thousands of machines for a botnet? Existing business processes. Unmasking Google accounts? Could there be a business there? Sure, maybe. Is there one already? Presumably no.

    A bounty payout is not generally a referendum on how clever or exciting a bug is. Here, it kind of is, though, because $10,000 feels extraordinarily high for a server-side web bug.

    For people who make their nut finding these kinds of bugs, the business strategy is to get good at finding lots of them. It's not like iOS exploit development, where you might sink months into a single reliable exploit.

    This is closer to the kind of vulnerability research I've done recently in my career than a lot of other vuln work, so I'm reasonably confident. But there are people on HN who actually full-time do this kind of bounty work, and I'd be thrilled to be corrected by any of them.

  • Post Author
    arajnoha
    Posted February 12, 2025 at 1:17 pm

    haha the title sounds like you are a blackhat, offering emails for 10k

  • Post Author
    mschoch
    Posted February 12, 2025 at 1:34 pm

    google insiders will leak for considerably less, no exploit needed

  • Post Author
    zoklet-enjoyer
    Posted February 12, 2025 at 2:09 pm

    Pixel Recorder is an "old forgotten product"? I have used it at least once a week for years. I used it a bunch yesterday. Very good app. I hope Google doesn't kill it.

  • Post Author
    yieldcrv
    Posted February 12, 2025 at 2:20 pm

    On one hand I doing really see the hack here. They didn’t get access to any email address, just a potential privacy leak

    On the other hand, a spearfishing campaign could be valuable. And launch a memecoin on some people’s account to make millions

  • Post Author
    donatj
    Posted February 12, 2025 at 2:52 pm

    After reading the article top to bottom I still had to come to the comments to find out what the "for $10,000" was about. It's the payout for a bug bounty.

  • Post Author
    progforlyfe
    Posted February 12, 2025 at 2:57 pm

    Wow, until the very last paragraph for some reason I was thinking that it COST $10,000 to leak the email of any YouTube user, like either a black market cost or purchasing cloud resources =) — Very nice exploit though!

Leave a comment

In the Shadows of Innovation”

© 2025 HackTech.info. All Rights Reserved.

Sign Up to Our Newsletter

Be the first to know the latest updates

Whoops, you're not connected to Mailchimp. You need to enter a valid Mailchimp API key.