Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: How a YouTube Vulnerability Can Be Used to Steal Files
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: How a YouTube Vulnerability Can Be Used to Steal Files
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

News » How a YouTube Vulnerability Can Be Used to Steal Files

NewsVulnerabilities

How a YouTube Vulnerability Can Be Used to Steal Files

A security researcher shows how YouTube’s embed feature in Google Slides could be exploited for file theft.

Marco Rizal
Last updated: October 8, 2024 9:55 am
By Marco Rizal - Editor, Journalist 4 Min Read
Share
How a YouTube vulnerability can be used to steal files
SHARE
  • Google Slides’ YouTube embed feature can be exploited for redirecting users to malicious websites.
  • Open redirects in YouTube can be manipulated for potential attacks.
  • Attackers could exploit this method to trick users into sharing sensitive Google Drive files.

Lyra, a cybersecurity researcher, recently discovered an unexpected way to exploit YouTube's embed feature in Google Slides.

This vulnerability, which appears to be a strange party trick, has the potential to allow malicious actors to steal files from unsuspecting users.

The vulnerability comes from the way YouTube videos are embedded in Google Slides presentations.

Normally, users can add YouTube videos to their slides by selecting a video, which creates an iframe with the video's embed URL.

The researcher realized that modifying certain parts of the URL could cause the iframe to perform unexpected actions.

Leave YT
Credit: Lyra

The researcher explained, “The moment I changed the videoid to ../, I was redirected to YouTube’s homepage. It worked, though YouTube, like most modern sites, disallows framing to avoid clickjacking.”

Further investigation revealed that specific redirect points in YouTube's URL structure could be used for more than just video embedding.

A particular point of interest was YouTube's redirect system, which frequently employs a parameter known as redir_token.

This token manages the redirection of external links in video descriptions and comments.

The redirect uses a unique token for each session. Without it, users are directed to a warning page rather than the intended destination.

While this makes it difficult to directly manipulate the redirect to an external site, there were other options to consider.

The focus then shifted to YouTube's authentication flow, which allows users to log in and be taken back to their original page.

While experimenting with this mechanism, the researcher discovered a way to frame pages that should have been off-limits.

The redirect worked with subdomains such as music.youtube.com and admin.youtube.com, allowing for more testing.

Unintended File Access

The investigation has expanded to include Google Docs. Using chained redirects and iframe manipulation, the researcher was able to embed Google Docs pages within the Google Slides frame.

image 3
Credit: Lyra

This created the possibility of gaining unauthorized access to documents and even tricking users into sharing them.

Although the vulnerability is heavily reliant on user interaction, there is a risk of abuse.

One particularly concerning aspect of this exploit is how it could be used to change file access.

An attacker could gain access to sensitive information if a user is tricked into clicking a shared file link or changing the share settings of a document.

“If clicked, it’ll immediately share Editor permissions for the targeted file/folder with whatever e-mail we specified,” the researcher claimed.

Disguising the share folder button into a poll:

image 4
Before
image 5
After

Regardless of the technical possibilities, the exploit is difficult to weaponize without extensive social engineering.

Getting someone to click a link and grant file access still takes effort. However, it demonstrates how, with a little creativity, systems like YouTube and Google Slides can be used far beyond their intended purpose.

Convincing someone to follow all the steps needed would be tough, but it’s not impossible.

It’s a good reminder that even small quirks in widely used tools can lead to bigger security issues.

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Hackers May Use Telegram Video to Gain Full Control of Your Phone

Hackers May Use Telegram Video to Gain Full Control of Your Phone

Hacktivists Shut Down French Government

Hacktivists Shut Down French Government Websites in Protest of Telegram CEO’s Arrest

Deepfakes Hacks and Leaks Threaten to Disrupt 2024 US Election

Deepfakes, Hacks, and Leaks Threaten to Disrupt 2024 US Election

Critical Flaw Found in Two Factor Authenticator Yubikey Will Likely Not Be Patched

Critical Flaw Found in Two-Factor Authenticator YubiKey Will Likely Not Be Patched

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?