New Google bugs empower phishermen

October 11, 2008 – 8:07 AM

Google’s Gmail service suffers from security flaws that make it trivial for attackers to create authentic-looking spoof pages that steal users’ login credentials, a security expert has demonstrated. Google Calendar and other sensitive Google services are susceptible to similar tampering.

A proof-of-concept (PoC) attack, published by Adrian Pastor of the GNUCitizen ethical hacking collective, exploits a weakness in the google.com domain that allows him to inject third-party content into Google pages. The result is this page, which allowed him (at time of writing, anyway) to display a fraudulent Gmail login page that displayed mail.google.com in the browser’s address bar.

“The previous PoC URL will cause the entered credentials to be submitted to www.gnucitizen.org when clicking on the Sign in, so please do NOT submit any real credentials,” Pastor warns here.

A Google spokesman said company security pros were looking into the reports.

The attack is another cautionary reminder to designers of websites and software of the importance of fixing vulnerabilities even when they may at first appear inconsequential.

Source:
http://www.theregister.co.uk/2008/10/10/google_cross_domain_bug/

You must be logged in to post a comment.