Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Google OAuth vulnerability exposes millions through failed launch domains
Global Security

Google OAuth vulnerability exposes millions through failed launch domains

AdminBy AdminJanuary 14, 2025No Comments3 Mins Read
Google OAuth Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 14, 2025Ravi LakshmananData Vulnerability / Privacy

Google OAuth Vulnerability

A new study has uncovered a “flaw” in Google’s “Sign in with Google” authentication process that uses features in domain ownership to gain access to sensitive data.

“At Google OAuth a login doesn’t protect against someone buying a failed startup’s domain and using it to re-create email accounts for former employees.” Truffle Security Co-Founder and CEO Dylan Airey said in Monday’s report.

“And while you can’t access the old email data, you can use those accounts to log into all the different SaaS products that the organization used.”

Cyber ​​security

The San Francisco-based company said the issue could have compromised the data of millions of US users simply by buying a defunct domain linked to the failed startup and gaining unauthorized access to old employee accounts linked to various programs such as OpenAI ChatGPT, Slack. , Notion, Zoom and even HR systems.

“The most sensitive accounts included HR systems that contained tax documents, forms, insurance information, Social Security numbers and more,” Airey said. “The interview platforms also contained sensitive information about candidate feedback, offers and rejections.”

OAuth, short for Open Authorization, refers to an open access delegation standard that allows users to allow websites or applications to access their information on other websites without having to provide their passwords. This is achieved by using an access token to verify the user’s identity and allow the service to access the resource for which the token is assigned.

Google OAuth Vulnerability

When Sign in with Google is used to sign in to an app like Slack, Google sends the service a set of claims about the user, including their email address and hosted domain, which can then be used to sign users into their accounts.

This also means that if a service relies solely on these pieces of information to authenticate users, it also opens the door to a scenario where domain owner changes could allow an attacker to regain access to old employee accounts.

Truffle also noted that the Google OAuth ID token includes a unique user ID – sub-claim – this could theoretically prevent the problem, but it was found to be unreliable. It should be noted that Microsoft Entra ID tokens include sub or oid claims keep the value constant for each user.

Cyber ​​security

While Google initially responded to the vulnerability disclosure by saying it was intentional behavior, it has since re-opened the bug report as of December 19, 2024, awarding Airey a $1,337 reward. He also described the issue as a “high-impact, abusive methodology.”

At the same time, software vendors cannot exploit vulnerabilities in Google’s OAuth implementation. Hacker News has reached out to Google for further comment, and we’ll update when we hear back.

“As an individual, once you’re kicked out of a startup, you lose the ability to protect your data in those accounts, and you’re subject to a fate that will befall the future of the startup and the domain,” Airey said. “Without immutable identities for users and workspaces, domain ownership changes will continue to compromise accounts.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.