exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

gmailbug.txt

gmailbug.txt
Posted Nov 30, 2005
Site elhacker.net

A flaw in Google's G-Mail system allowed anyone access to any mailbox.

tags | exploit
SHA-256 | 13920fad28ecea1955b62c9880eee1f35a5562d14beb8983db8ccbe96c6896e5

gmailbug.txt

Change Mirror Download
 

*- Gmail Bug -*





*INTRODUCTION*

This bug has already been corrected, that's why it's been published.

In this manual you will see step by step how to exploit Gmail's
vulnerability, that gave you access to any account, reported by
Anelkaos, colaborator of elhacker.net's forum and patched by Google by
October 18. Due to the bug's gravity (that allowed in a few simple steps
to login in any Gmail account), it was decided not to publish this
document while the bug was still active. Motives are more than obvious
because ALL Gmail accounts were vulnerable to the bug.

Google hasn't declared definitively this topic, and they seem to have no
intention of publishing the bug. The veracity of the failure was
demonstrated to the editors of the Magazine "Seguridad0", logging into
an account created for that purpose, just as described in
http://www.elistas.net/lista/informativos/archivo/indice/61/msg/79/.
They also "dared" to publish this news in CyruxNET and PCWorld.

The bug was discovered in October 14 and it was patched in October 18
because ANELKAOS decided to conctact GMail instead of publishing the bug
in a list of security, and lamentably we couldn't do more demos in other
sites that we sent the news, and because we're not HBX Networks, all the
people claimed for a "hacking' test". Thanks to heaven, we have saved
all the mails where Google recognize the failure. ;).

Unlike the reported by HBX and published by BetaNews last year, this bug
doesn't require cookie robbery, and because of that, the bug's danger
was considerably higher.

*PROCEDURE*

This is the way Sirdarckcat (EHN's user) developed the exploit, although
the original method is easier, the concept is the same one.

Due to the fact that this demonstration was realized against another's
person account, all data that could bring legal consequences have been
hiden. In AUTH variable goes the ciphered address of the mail's
propetary, and although we don't know how to decipher it, we've
preferred to hide its values, in case "someone else" could :).

First of all, we need two sessions. For that we've chosen to use
Internet Explorer and Mozilla. We start the session normally... for
example, in Mozilla..

If we pay attention, we notice that the login screen is now different.
It doesn't just ask if you've forgotten your password, it also asks now
for the user. Too much casualty, isn't it? That soon and coinciding with
the publishing of the bug's existence it has changed the authentication
is too much coincidence, isn't it? We're talking about 10 days ago :).

Well, let's continue. Now we need some data we'll modify. For that we
will also iniciate an Internet Explorer session, but we stop the browser
as soon as it says "Loading...".

We simply look at the source code and we save the value of the "ver"
variable, that we will need later.



Then we allow the page to continue loading, and we look the direction of
the inbox, that we can see by pressing right clicking, and then Properties.

We will need the "zx" variable, and we save it.

Now we go to 'mail/?username=victim&zx=[zx Variable]'

And we stop the charging of the page just when it stops Loading,
getting inside:

We stop again the browser, and we look at the source code.

Here we have the code of AUTH that we need to initiate session as our
victim, but our cookie disagree (not the same).

We take a look inside the cookie, and we change the value of "ID" for
the one we got in the "ver" variable we got before, this what surprising
does is to return a valid value! It doesn't have related information,
why does that happen? Who knows...

GMail confirms that it's well ciphered, and completes correctly all the
rules. Nevertheless, even the content is not related, it doesn't return
an error.



Once modified the cookie, in the Explorer session, we enter into the
following page:

http://mail.google.com/mail?gxlu=victim&zx=[zx Variable]



In this moment we haven't already started the session, we've just
associated with the victim's account.

So we go to: www.google.com/accounts/ServiceLoginAuth
<http://www.google.com/accounts/ServiceLoginAuth>.

And it sends you to:

mail.google.com/mail/?auth= [CODIGO auth]

At this point all we have to do is to modify the values of the cookie
that will expire... At least we give it 1 minute of life.

We enter mail.google.com/mail/?&&rm=false&null=Entrar&continue

We stop the loading because if we don't, Google is going to close our
session, so we write:

javascript:document.cookie+=";expires=Thu,%2001%20Jan%202070%2000:00:00%20GMT";

Once extended the cookie's life, we enter
http://mail.google.com/mail/?auth=[AUTH Code]

And we start the session as the victim.

Complete access, of course :).

*GOODBYE AND CLOSE.*

OK, it's a Beta version, and they don't have to report anything. But if
they would have recognized it and published a thank you note, this
information wouldn't had been published. We have 3 ways to get to the
same result, the others 2 are quite easier, and because of that easily
we can deduce that it's a multibug, and a design error. With all these
clues, they will not take too much to discover new methods.








| encuesta <../encuesta.htm> | foro <../foro.htm> | boletĂ­n
<../email.htm> | recomendar </cgi-bin/birdcast.cgi> | ¿algĂșn fallo?
<../bug.htm> | <javascript:window.print()>

Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close