- Portals
- The Current Year
- ED in the News
- Admins
- Help ED Rebuild
- Archive
- ED Bookmarklet
- Donate Bitcoin
Contact an admin on Discord or EDF if you want an account. Also fuck bots.
GodTube: Difference between revisions
imported>SheepBot teaching bitches how to swim |
imported>Thefixer234 |
||
(One intermediate revision by one other user not shown) | |||
Line 7: | Line 7: | ||
==Controversy== | ==Controversy== | ||
[[Image:Godtubes.jpg|thumb|right|win a free trip to [[Israel]]?! FUCK YEAH!]] | [[Image:Godtubes.jpg|thumb|right|win a free trip to [[Israel]]?! FUCK YEAH!]] | ||
It is | It is notable that supposedly [[VioletKitty|VK411]] was hiding out somewhere on the site. | ||
Latest revision as of 02:55, 16 April 2016
GodTube is was a free video sharing website that was asking for it. GodTube.com was basically the trollers' gift that kept on giving. Much like JewTube, but which specialized in Christian-themed videos which Blu Aardvark is "so down for". In particular, GodTube has been compared to Conservapedia, a Christian conservative encyclopedia opposed to Wikipedia, and MyChurch (LOL), a Christian version of MySpace.
GodTube was founded by some god-fearing cunt, Chris Wyatt, who is currently a student at Dallas Theological Seminary. Word on the street is Chris Wyatt was formerly a TV producer for CBS show Kid Nation. GodTube was privately funded by investors, and dumbfucks who think evolution shouldn't be taught in schools.
Controversy
It is notable that supposedly VK411 was hiding out somewhere on the site.
A question that some of these god fearing fucks will never answer is, where is your Jesus while your priests are raping little boys? 'Jesus saves'? Tell that to the little boys who were assraped in Church. But hey, as long as it's in the name of the God, It's awwright!
Godtastic Videos From The GodTube
- Atheism is shown to be without merit in 65 oddly arousing seconds (He has an accent, it must be true!)
- Anti-Abortion gatherings? Prayer Warriors? Chalk? Sounds like fun!
- Summer Camp, that battlefront for young impressionable souls.
- Beat off the pornographers who have entered into your frineds and family.
- Harrowing new movie trailor about the rising tide of homosinsuality.
- Thank God I have the uncoerced choice of choosing my master. Now I can have adventures with Jesus!
Broadcast Him Invasion
Various Anonymous groups (such as 420niggertits) were alerted to the existence of GodTube, and finally someone dropped LSD here [1].
The Invasion Begins
GodTube's site search, which could be used to find videos, groups, and users, did not correctly sanitize its input. The problem however is using normal ASCII characters inside of any quote (single, or double) would cause the page to output a script error, which would keep the vulnerability's payload from executing. In this example I converted: 'location.href="http://www.awesomeandrew.net/"' into its decimal equivalent for each character in the string, and then had it evaluated inside of the String.fromCharCode function to help it execute. Therefore when using this example in vulnerable URL you'll force an instant redirection to a new location. A similar vulnerability was found within the login page, which was accessible whether the user is logged out, or currently logged in. The above example simply alerts the user with their cookie data (if the cookie exists), but could obviously be used for much greater, or malicious purposes such as phishing, stealing cookie data, altering user information, installing third-party malware, or just about anything else that's possible using a computer. The input goes unsanitized again, but using quotes with ASCII characters inside will cause a script error again so String.fromCharCode must be used when quotes are required. Another vulnerability, just like the other reflective cross-site scripting holes I've already found, but inside the user signup page. In this instance however I forego the String.fromCharCode, and use the eval function to evaluate statements made after the URL's fragment identifier (the hash symbol, or "#"). Using the script placed within the vulnerable area an evaluation is made on the data following the URL, which is then executed as the payload. As with an cross-site scripting vulnerability this can be used for an array of purposes.
Related Articles
Resources
GodTube is part of a series on Visit the Sites Portal for complete coverage. |