exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

advisory-2007-06-29.txt

advisory-2007-06-29.txt
Posted Jun 29, 2007
Authored by Susam Pal | Site susam.in

Google suffers from re-authentication a bypass vulnerability with the SID and LSID cookies.

tags | advisory, bypass
SHA-256 | 4f025da75376d5304616a5f06e5e0cbc824d41e86de0ab0e7ddad020d50ade61

advisory-2007-06-29.txt

Change Mirror Download
Google Re-authentication Bypass with SID and LSID cookies

This document is also available at:-
http://susam.in/security/advisory-2007-06-29.txt

Researcher:-
Susam Pal

Type:-
Session management error

Timeline:-
2007-06-21 - Discovered
2007-06-22 - Reported to vendor
2007-06-29 - Public disclosure

Summary:-
During a session, while performing a crucial operation Orkut requires a
user to authenticate himself with his password in order to prevent
walk-by attacks. If a user fails this authentication, he is redirected
to login page, where he needs to re-authenticate himself. However, at
this stage the session is not disabled temporarily at the server side.
This can be exploited by an attacker to bypass re-authentication.

Description:-
On successful Orkut login, the following cookies are set:-

1. Domain: .www.orkut.com
Cookie: orkut_state
2. Domain: .google.com
Cookie: SID
3. Domain: www.google.com
Cookie: LSID

The security flaw associated with the first cookie has already been
explained in http://susam.in/security/advisory-2007-06-21.txt

The second and the third cookies are responsible for another flaw which
is described in this advisory. In the login page of Orkut, the login
form appears from google.com in an inline frame and the form inputs are
submitted back to google.com. Hence these cookies are set for the domain
google.com and www.google.com.

Vulnerability:-
When an Orkut user fails to authenticate himself during a session (say,
while deleting a community), the user is redirected to a login page
where the user has to enter his password to login again. At this stage,
ideally the session should be disabled and should be enabled only after
the user re-authenticates himself. However, the session associated with
SID and LSID cookies remain alive at the server side. Therefore, it is
not safe to abandon the session at this stage. An attacker can set these
cookies in his browser and access the compromised account by visiting
http://www.gmail.com/, https://www.google.com/accounts/ManageAccount,
etc.

Impact:-
1. If an attacker manages to steal the SID and LSID cookies of the user,
he can gain access to the compromised account even after the user has
been logged out as described in 'Vulnerability' section.
2. In case of unsuccessful authentication during a session, when the
user finds himself logged out, if he leaves the browser unattended,
a trespasser can login to his account simply by accessing a valid URL
for his account as mentioned in 'Vulnerability' section.

Solution:-
When a user fails to authenticate himself during a session as described
in 'Vulnerability' section, then the session associated with him should
be disabled at the server side. The session should be enabled only after
the user successfully authenticates himself.

Prevention:-
1. When a user fails to authenticate himself during a session and he is
logged out for re-authentication as described in 'Vulnerability'
section, he must re-authenticate himself to log in and then logout
properly by clicking the 'Logout' link. This deletes the session
associated with SID and LSID cookies at the server side.
2. A user logged into Orkut, Google, GMail, etc. should not run any
untrusted JavaScript or program to prevent the cookies from being
stolen.

Disclaimer:-
This document is published with the hope that it will be useful, but
without any warranty; without even the implied warranty of
merchantability or fitness for a particular purpose. The information in
this advisory should be used for education, research, experimentation,
bug-fixes and patch-releases only. The author shall not be liable in
any event of any damages, incidental or consequential, in connection
with, or arising out of this advisory.

Revision History:-
2007-06-29 - Initial release

Contact Information:-
Susam Pal
susam@susam.in
http://susam.in/

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close