CRZ-004

Prod docs hosted as publicly-shareable Google Doc

info CVSS 3.1: 5.3 · Asset: doc.corezoid.com

Summary

doc.corezoid.com 302-redirects to https://docs.google.com/document/d/1-31BBNhy2DUIfu-EljVn3MJr3GSOVqJ3PIwjGPUi3So/edit?tab=t.0#heading=h.ozm883b0d4z0. Corezoid's official product documentation is therefore hosted inside a single Google Doc. Anyone who follows the redirect (or guesses the doc ID) can:

Google Doc share settings could be:

  1. "Anyone with the link can view" — current observed state (since no auth challenge appears on redirect)
  2. "Anyone can comment" — attacker could inject comments seen by staff
  3. "Anyone can edit" — attacker could deface documentation

Reproduction

$ curl -skI https://doc.corezoid.com/ | grep -i location
location: https://docs.google.com/document/d/1-31BBNhy2DUIfu-EljVn3MJr3GSOVqJ3PIwjGPUi3So/edit?tab=t.0#heading=h.ozm883b0d4z0

Open the URL in a browser to confirm the share permission and whether the document contains anything beyond public documentation.

Impact

Remediation

  1. Audit the Google Doc share settings. Change to "Restricted — only members of corezoid.com" if the content is not intended for public distribution.
  2. Move official product documentation to a controlled CMS (Docusaurus, Mkdocs, Readme.io) where content and auth are version-controlled.
  3. Audit the full document revision history for any sensitive content that was ever pasted in and forgotten.
  4. Add rel=noopener and enforce cert pinning if you keep the redirect.

References