Researcher Claims Google Login Page May Allow Credential Theft And Send Infected Files

Google Login Page
Google Login Page

According to a recent finding by an independent UK based researcher Aidan Woods, Google login page is not very secure and allows attackers to steal users’ credentials. The attacker can also send an arbitrary file to the user’s browser each time the login form is submitted, without unloading the login page due to a bug in the login process.

The bug results from the fact that the Google login page will take a specific, weak GET parameter.

Google’s login page accepts a vulnerable GET parameter, namely ‘continue’. As far as I can determine, this parameter undergoes a basic check

Must point to *.google.com/*

The application fails to verify the type of Google service that has been specified. This means that it is possible to seamlessly insert any Google service at the end of the login process.

Aidan Woods further states that an attacker could easily change the parameter at the end of the login flow and insert any Google service at the end of the login process. An attacker could also make you download an arbitrary file from Google Drive any time the login form is submitted, provided public link sharing is enabled after uploading it to Google Drive.

Aidan Woods have notified Google about the vulnerability. However, Google responded that they did not consider it as a security issue and decided to do nothing. He even opened three separate reports with Google, in hope to convince the company about the severity of this vulnerability, but to no avail.

If I understand correctly the only attack scenario you have in mind is phishing, we invest in technologies to detect and alert users about phishing and abuse. Take a look at https://sites.google.com/site/bughunteruniversity/nonvuln/open-redirect. If you can come up with a convincing attack vector let me know.

Karshan – Google Security Team

Thanks for your bug report and research to keep our users secure! We’ve investigated your submission and made the decision not to track it as a security bug.

This report will unfortunately not be accepted for our VRP. Only first reports of technical security vulnerabilities that substantially affect the confidentiality or integrity of our users’ data are in scope, and we feel the issue you mentioned does not meet that bar 🙁

Bummer, we know. Nevertheless, we’re looking forward to your next report! To maximize the chances of it being accepted, check out Bughunter University and learn some secrets of Google VRP.

As Google believes this is not a security threat, Aidan Woods has made the vulnerability public in hope of attracting Google’s attention and to educate users with possible preventive actions.

This one feels very strange writing, because the vulnerability detailed below is currently exploitable. Google has been notified of this vulnerability, yet they have chosen to do nothing.

Google: Thanks for your bug report and research to keep our users secure! We’ve investigated your submission and made the decision not to track it as a security bug.

In hope that public disclosure will encourage Google to do otherwise, here goes.

Woods have also given some preventive steps a user can take to avoid being a victim

  • Always check the URL – before entering credentials – including at each stage of the login process
  • Avoid login after clicking links that don’t come directly from Google – bad links could be anywhere: even Google search results. An example use case would be behind the ruse of user protected content that requires sign-in (e.g. content on Google Drive)
  • If it looks like Google sent you a file at sign-in, don’t run it. Regardless of what it is named, you can’t trust it.

You can read more about this issue by visiting https://www.aidanwoods.com/blog/faulty-login-pages

Video Explaining Google: Faulty Login Pages

Edward Ramamoorthy

I work in one of the top 10 tech company in India. In my spare time I write for PrimeInspiration.com

Help Us Grow

If you like this post, please share it with your friends.

You are free to copy and redistribute this article in any medium or format, as long as you keep the links in the article or provide a link back to this page.

You may also like...

1 Response

  1. Achal says:

    Aidan Woods found a way to attack anybody’s system via gmail, hackers might take this as a root and they might attack in future. God save ppl!!!!!!!!