« Opera 9.64 Security Updates and Enhancements | Main | The return of L0phtCrack »

New Gmail Flaw Lets Attacker Control 'Change Password' Function

"A researcher today released a proof-of-concept for a vulnerability he discovered in Google Gmail that lets an attacker change a Gmail user's password, wage a denial-of-service attack on the account, or even access other Gmail users' email.

The cross-site request forgery (CSRF) flaw -- which researcher Vicente Aguilera Diaz from Madrid-based Internet Security Auditors first reported to Google in August 2007 -- takes advantage of the way Gmail's "Change Password" function operates. "The only token for authenticat[ing] the user is a session cookie, and this cookie is sent automatically by the browser in every request," according to the vulnerability disclosure post.

An attacker can build a phony Web page that accepts requests for Gmail password changes, and then lets the attacker change the victims' passwords without their knowing and evading CAPTCHA restrictions.

Google maintains that the flaw is not a major one because such an attack wouldn't be easy to pull off.

This isn't the first CSRF flaw reported in Gmail: In October 2007, the US CERT issued an alert about a CSRF bug that let attackers create mail filters and send mail to arbitrary email accounts. Google patched the bug."

Read more: http://darkreading.com/security/vulnerabilities/showArticle.jhtml?articleID=215800241


Feed You can follow this conversation by subscribing to the comment feed for this post.

All Comments are Moderated and will be delayed!

My Gmail info was hijacked earlier today, I'm assuming with something similar to this. The password was changed and the language options were then changed to Turkish.