Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Logs show that it has never been used by anyone

Yes, because the #1 thing on the mind of someone who gained unauthorized access (e.g. a remote execution vulnerability) to a system is to cover their tracks, which includes things like doctoring logs.



a vulnerability that allows some unauthorized access to user data via the API and a vulnerability that allows edting logs are very different types of vulnerabilities.


Well, the comment I was responding to didn't specify:

> Company finds a security vulnerability caused by a bug

Remote execution vulnerabilities do exist..


The logs live somewhere else. If you had some magic exploit that let you run code on Google systems AND delete logs, you could do much more damaging things than just reading G+ data.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: