iTnews Asia
  • Home
  • News
  • Security

Google OAuth bug left accounts open to permanent compromise

Google OAuth bug left accounts open to permanent compromise

‘GhostToken’ exposed users to data theft and more.

By Richard Chirgwin on Apr 24, 2023 10:58AM

An OAuth bug discovered in Google’s Cloud Platform potentially allowed attackers to plant an application inside a victim’s account, leaving it permanently and undetectably compromised.

The bug was discovered by an Israeli security outfit, Astrix, who advised Google it had discovered the zero-day vulnerability in July 2022. 

A fix shipped earlier this month, the company said, detailing the vulnerability.

If a victim was successfully compromised , an attacker could plant a malicious app could read their Gmail account, access their files and photos, view their calendar, and track locations in Google maps, Astrix said – depending only on the permissions granted to the app.

An attack would start with a compromised file in Google Marketplace, the post explained.

When a user authorised it for installation, the app gets a token giving it access to the installer’s account with the permissions authorised by the user.

However, the GhostToken vulnerability would allow the attacker to then hide the app from the user.

“By exploiting the GhostToken vulnerability, attackers can hide their malicious application from the victim’s Google account application management page,” Astrix’s post claimed. 

“Since this is the only place Google users can see their applications and revoke their access, the exploit makes the malicious app unremovable from the Google account. 

“The attacker … can unhide their application and use the token to access the victim’s account, and then quickly hide the application again to restore its unremovable state.

"In other words, the attacker holds a ‘ghost’ token to the victim’s account.”

Google acknowledged the vulnerability in August 2022, and rolled a global update on April 7, Astrix said.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
astrix ghosttoken google oauth security

Related Articles

  • Proofpoint CEO: A tool-based approach for cybersecurity is impractical
  • Akamai: AI-security is both a security imperative and an economic necessity
  • The real-life Tom & Jerry chase
  • How can we bolster our resilience against AI-enabled e-mail attacks?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

How can we bolster our resilience against AI-enabled e-mail attacks?

How can we bolster our resilience against AI-enabled e-mail attacks?

Akamai: AI-security is both a security imperative and an economic necessity

Akamai: AI-security is both a security imperative and an economic necessity

The real-life Tom & Jerry chase

The real-life Tom & Jerry chase

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.