Google Buckets are much like Amazon S3 buckets but owned by Google.
Google Buckets are much like Amazon S3 buckets but owned by Google. These buckets are usually protected but may be worth testing to ensure that an attacker does not have access to view/manipulate the data in the bucket.
The bucket details are usually located in the same plist files as the FireBase config. Use the STORAGE_BUCKET value in the following URL to check whether it is accessible.
If the bucket is setup correctly the attacker will get the following response:
{
"error": {
"code": 401,
"message": "Anonymous caller does not have storage.objects.list access to the Google Cloud Storage bucket.",
"errors": [
{
"message": "Anonymous caller does not have storage.objects.list access to the Google Cloud Storage bucket.",
"domain": "global",
"reason": "required",
"locationType": "header",
"location": "Authorization"
}
]
}
}
If the bucket is vulnerable and has this misconfiguration you should see a list of files as shown in the below response: