Not a great month for Google security.
In the past 3 days, 34 interesting disclosures have been published:

  1. Google Search Appliance XSS discovered by MustLive, affecting almost 200,000 paying customers of the outsourced search engine and their users: this Google dork shown 196,000 results at the time of disclosure, now dropped to 188,000. Fear effect?
  2. Billy Rios and Nate McFeters revealed the gory details of their already announced Picasa exploit, leveraging a clever combo of XSS, Cross Application Request Forgery, Flash same domain policy elusion and URI handler weakness exploitation to steal your private pictures, straight from your local hard disk, just visiting a malicious web page.
  3. Finally, the most simple yet impressive, because of the huge number of users involved: beford decided to launch his new blog disclosing a Google Polls XSS which, thanks to the (too) smart “widget reuse” allowing Google services to integrate the same functionality across multiple services, can be used to attack Search, Blogspot, Groups and, the most dramatic exploitation scenario, GMail:

    For such an attack to be successful, the victim just needs to visit a malicious website while logged in Google, e.g. by following a link from an incoming message (unless she’s got anti-XSS protection).

  4. update — a few hours after I released the first version of article, I heard of another Google-outsourced vulnerability, an Urchin Login XSS disclosed by GNUCITIZEN’s Adrian Pastor, which could compromise local Google Analytics installations. Its severity may vary depending on how Urchin is installed (e.g. on a domain different than your main site), but the provided proof of concept is quite interesting because it shows an actual credential theft in action, rather than the usual, boring
    alert(’XSS’)

    . Not that a more spectacular example proves anything new about the dangers of XSS, but some people just don’t believe until they can see with their own eyes.

These vulnerabilities are surely being fixed at top speed, since Google is one of the most reactive organizations in this fight, but they’re nonetheless disturbing because they hit the very main player on the field, with the largest user base on the web: this make this kind of incidents unavoidable ipso facto.
How many vulnerabilities like those just go undisclosed and unpatched, but yet exploited by unethical hacrackers?
In Gareth Heyes‘ words,

This proves everything is insecure, there are just degrees of insecurity.

Talking about XSS, if you’re an end user and you don’t like to stay at the very bottom of the insecurity food chain, you’d better use Firefox with NoScript — but that’s your choice, of course. ;)

30 Responses to “GoogHOle (XSS pwning GMail, Picasa and almost 200K customers)”

  1. #1 Scooter Bug says:

    Whoosh! Very slick. I clicked on a link and waited before realizing that the code had already executed, entirely transparently. Time to reconfigure NoScript again…

  2. #2 Gmail XSS exploit - Google XSS - Gmail vulnerability says:

    […] Last couple of days were particularly interesting as different users reported various hole’s and vulnerabilities of Google services and some published ones you can find on Hackademix.net. […]

  3. #3 Gmail и Picasa - owned at Блогът на Георги says:

    […] Този материал описва доста притеснителни XSS дупки в сигурността на продуктите на Google. Явно авторът очаква средностатистическия читател да е доста изплашен, но предвид наличието на NoScript (споменат в материала), не съм чак толкова притеснен. Сега да очакваме инвазия на skiddies от “младата генерация”. […]

  4. #4 DigitMemo.com » Multi Google Security Holes Revealed says:

    […] Multiple Google-targeted exploits disclosed in the past 3 days could compromise your GMail account, steal your pictures from Picasa or impersonate you on almost 200,000 big sites. […]

  5. #5 Ubuntero says:

    noscript ftw!

  6. #6 [SSD] Security & Development Blog » Semana negra para Google says:

    […] Firefox con NoScript están a salvo de las vulnerabilidades XSS, como su autor, Giorgio Maone, se encarga hoy de […]

  7. #7 Nathan McFeters says:

    Giorgio,

    Great recap and thanks for the postback, but I’m afraid you forgot a few… if you take a peak at our site (Billy Rios and I), you’ll see that there’s actually been two other exploits against Google this month. One, http://xs-sniper.com/blog/2007/09/18/the-old-dog-and-his-old-tricks-part-i/ discusses the use of a Google SMTP server to send arbitrary messages to anyone from Google/GMail.com from anyone from Google/GMail.com. The second, http://xs-sniper.com/blog/2007/09/20/bk-for-mayor-of-oak-tree-view/ is even scarier (if you plan on using Google Docs) as Billy discovered a way to read the contents of arbitrary documents AND EDIT the contents of arbitrary documents.

    All this, and I can guarantee that there will be more from the two of us this month as I know Billy has a couple more he’s just waiting to talk to Google about.

  8. #8 Giorgio says:

    Nate,
    I’m a regular reader of your blog and I’ve seen both those posts.
    The mail sending issue is not Google-specific, as it applies to almost any SMTP server: it’s just the way unsigned email works.
    The Google Docs one… well, I must confess I just forgot it: that’s not easy keeping the count now ;)

    Eagerly waiting for the upcoming news…
    Cheers to both you and Billy :)

  9. #9 Nathan McFeters says:

    Haha, agreed, it isn’t Google specific, anyone could make that mistake, but I do agree that it’s been a rough month for them. Just wait for, oh, say Tuesday… I think Billy will scare some people with his next two posts.

  10. #10 pdp says:

    how about another 0day for GMail?

  11. #11 Giorgio says:

    pdp, what are you waiting for? ;)

  12. #12 pdp says:

    I feel kind of dirty… I will contact Google first, I guess. Do you want to try it?

  13. #13 Giorgio says:

    pdp, I assumed you already contacted Google, you nasty boy.
    Yes, please do the right thing contacting Google first and yes, I’d like to have a sneak peak in the meanwhile :)

  14. #14 NieuwsEnzo.info » Welkom » Google Analytics, Picasa, Polls en Search Appliance zijn lek ! says:

    […] beveiligingslek in GMail te maken, ook in Analytics, Picasa, Polls en de Search Appliance zitten gaten. In het geval van de Search Appliance, dat zo’n 200.000 betalende gebruikers heeft, gaat het […]

  15. #15 SecuriTeam Blogs » These bad days of Google’s security team says:

    […] First this week started with news of three serious vulnerabilities in Google’s services and products - via hacademix.net post GoogHOle (XSS pwning GMail, Picasa and almost 200K customers). […]

  16. #16 Eliena Andrews says:

    really bad month for google, we all shud disclose the holes we found… KEeep it up.

  17. #17 A rough week for Google security — Security Bytes says:

    […] developer Giorgio Maone offers a very good analysis in his Hackademics blog of which Google programs are flawe… and who discovered them. He outlines four […]

  18. #18 Google Gmail: “E-mail Hijack” via CSRF « Simply Security says:

    […] per Informaction e autore di popolari estensioni per Firefox come FlashGot e NoScript, commenta su Hackademix.net: “i dettagli rilasciati da Petkov sono più che sufficienti per realizzare un PoC in 10 […]

  19. #19 K-Elektronik Indonesia » Blog Archive » GoogH0le says:

    […] google, bagi yang berminat untuk mengetahui lebih jauh bisa membaca pada blog nya Giorgio Maone di sini. Dari link tersebut kita juga dapat mencoba POC untuk eksploitasi google, namun seperti nya […]

  20. #20 Rails 2.0 geliyor - ”FaikEmre” Kişisel Web Blog! says:

    […] . göze çarpan yeniliklerden birisi de bugunlerde google’ın da başını fena halde ağrıtan csrf ataklarına karşı güvenlik önlemlerinin alınması. yeni versiyonu denemek için gem […]

  21. #21 IT Security » Blog Archive » Gmail Cross Site Script Vulnerabilities Exposed says:

    […] Maone’s post at Hackademix.net also reports other Google XSS vulnerabilities that have recently come to light, targeting gmail, […]

  22. #22 Future is Fiction - Just another WordPress weblog » Trust No One says:

    […] This is all a long lead-up to this link, from hackademix.net, about four recent security weaknesses in google. […]

  23. #23 karthi says:

    damn.. i came late to this info..
    beford dot org leads me here..
    the poc link for "stealing incoming messages" are dead..
    where can i find more information about that?

  24. #24 Giorgio says:

    @karthi:
    those links are not dead, it’s just the vulnerability which has been fixed.
    If you want to check how it used to work, you can just look at the source code:
    view-source:http://beford.org/stuff/contacts.htm
    view-source:http://beford.org/stuff/gmail.htm

  25. #25 karthi says:

    @Giorgio
    OMG..
    pls forgive my ignorance..
    so, if someone opens the page when they are loggend onto gmail, the filter is set..?

  26. #26 Giorgio says:

    @karthi:
    No, nothing bad happens anymore because the bug has been fixed by Google.
    But yes, that was how it used to work originally.

  27. #27 karthi says:

    thank you giorgio..
    i read on other blog that, one can hack my pwd by making me to click an image or some other links using javascript..
    is it really possible?

  28. #28 Giorgio says:

    @karthi:
    yes, they can, provided that the site is vulnerable to XSS.

  29. #29 karthi says:

    hmm.. so.. noscript can block this type of attack??
    hey.. besides, do you feel that i’m asking too many kiddie questions??
    coz, i am a new born in this field..

  30. #30 Tort King says:

    You can’t hack gmail. That is b.s. My computer guy said it isn’t possible. ticketslayer@gmail.com LOL

Bad Behavior has blocked 3743 access attempts in the last 7 days.