Gmai Flaw Lets Attacker Cotrol "change Password" Function


Recommended Posts

New Gmail Flaw Lets Attacker Control 'Change Password' Function Cross-site request forgery (CSRF) vulnerability lets an attacker change Gmail user passwords and hack Gmail accounts -- but Google says it's tough to exploit

Mar 03, 2009 | 01:37 PM

By Kelly Jackson Higgins

DarkReading

A researcher today released a proof-of-concept for a vulnerability he discovered in Google Gmail that lets an attacker change a Gmail user's password, wage a denial-of-service attack on the account, or even access other Gmail users' email.

The cross-site request forgery (CSRF) flaw -- which researcher Vicente Aguilera Diaz from Madrid-based Internet Security Auditors first reported to Google in August 2007 -- takes advantage of the way Gmail's "Change Password" function operates. "The only token for authenticat[ing] the user is a session cookie, and this cookie is sent automatically by the browser in every request," according to the vulnerability disclosure post.

An attacker can build a phony Web page that accepts requests for Gmail password changes, and then lets the attacker change the victims' passwords without their knowing and evading CAPTCHA restrictions.

Google maintains that the flaw is not a major one because such an attack wouldn't be easy to pull off.

http://www.darkreading.com/security/vulner...cleID=215800241

>>>>>>>>>>>>>>>>

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...