Security News Gmail Verification Vulnerability (Status: Fixed)

Ink

Administrator
Thread author
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
A student and security researcher from Pakistan has found a serious issue with Gmail that makes it possible for a hacker to take over any email address.

The vulnerability relates to the way Google handles the linking of a primary Gmail account to another email address for the purposes of message forwarding. In just a few steps it was -- before Google fixed the problem -- possible to take over ownership of an email address by tricking the system into sending out the necessary verification code.

Ahmed Mehtab Blog: Gmail Account Hijacking Vulnerability | Ahmed Mehtab | Security Fuse

The video below goes into a little more detail:
  • Attacker tries to confirm ownership of xyz@gmail.com
  • Google sends email to xyz@gmail.com for confirmation
  • xyz@gmail.com is not capable of receiving email, so email is bounced back to Google
  • Google gives attacker a failure notification in his inbox with the verification code
  • Attacker takes that verification code and confirms his ownership to xyz@gmail.com
 

Dirk41

Level 17
Verified
Top Poster
Well-known
Mar 17, 2016
797
The person who found the flaw, Ahmed Mehtab, explains the conditions in which the flaw can be exploited:

  • If recipient’s SMTP is offline
  • If recipient has deactivated his email
  • If recipient does not exist
  • If recipient exists but has blocked a user

I don't know what the first point means , but it 's highly improbable my account is blocked , not exist or is deactivated
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top