Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Researchers Discover Vulnerability in Google ClientLogin Protocol

A group of security and privacy researchers from the Institute of Media Informatics at Ulm University in Germany, is claiming to have discovered a serious security vulnerability in Google’s ClientLogin protocol.

In a recent analysis of the Android platform, the group discovered that when Android users are connected to an unencrypted open Wifi network, an attacker could both read transmitted synchronization data of Google Contacts, Calendar and Picasa Web Albums, and capture the authToken that’s user for authentication.

A group of security and privacy researchers from the Institute of Media Informatics at Ulm University in Germany, is claiming to have discovered a serious security vulnerability in Google’s ClientLogin protocol.

In a recent analysis of the Android platform, the group discovered that when Android users are connected to an unencrypted open Wifi network, an attacker could both read transmitted synchronization data of Google Contacts, Calendar and Picasa Web Albums, and capture the authToken that’s user for authentication.

Bastian Könings, one of the researchers from the group, told SecurityWeek, “The adversary could use this authToken to gain full access to the data API of the specific service and view, modify or delete any contacts, calendar events, and web albums of that user.”

“The vulnerability isn’t limited to Android Google apps, but to any apps and desktop applications that use Google’s ClientLogin protocol over HTTP rather than HTTPS,” Könings added.

The group notes an interesting scenario, saying that beyond the stealing user information, an adversary could perform subtle changes without the user noticing. “For example, an adversary could change the stored email address of the victim’s boss or business partners hoping to receive sensitive or confidential material pertaining to their business,” the group noted in a post disclosing the vulnerability. “Due to the long lifetime of authTokens, the adversary can comfortably capture a large number of tokens and make use of them later on from a different location,” the group added.

This type of attack is similar in scope to stealing Web site session cookies, sometimes called “session hijacking” or “Sidejacking. Sidejacking caught much attention surrounding the released of Firesheep, a plugin which enabled drag and drop hacking attacks against sites such as Facebook, Twitter, Yahoo! and more.

Bastian Könings told SecurityWeek via email that the group has contacted Google about this issue and that it was fixed for Calendar and Contacts in Android 2.3.4. However, Könings said that Picasa sync of the stock Gallery app still remains vulnerable. “Unfortunately, the distribution of Android 2.3.4 is rare and most Android versions are 2.3.3 and below,” he added.

More details from the discovery are available here. The Wireshark screenshot below shows the authToken for ClientLogin in a data API request to the Picasa Web Albums service.

Google Security Vulnerability

 

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Vulnerabilities

Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Vulnerabilities

GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet