Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Summary: A user can get full access to a google account with just a pin Authentication or fingerprint from the phone. Making a extreme secure account easy accessible with a simple pin.
- Steps to reproduce:
- 1. Get access to a Android phone of the victim and know its PIN code, or authentication code. (Imagine working in a phone repair store - customers give out the pin easily, or imagine seeing the person type the pin etc, there's several ways to get a pin code/pattern lock)
- 2. In the Android phone go to passwords.google.com and try to login
- 3. On the login page, you can already know the email address, without even knowing it beforehand.
- 4. Click continue on the "Use device lock to login" page.
- 5. Click on use pin and insert the pin of the victim.
- 6. You are now in the page of all the saved passwords of the victim, you can now retrieve every single password from all bank accounts, social networks and maybe google accounts as well. All of this with just a single pin.
- The takeaway here is that by just knowing a 4 pin digit, or pattern of a victim, you can have all sorts of access to every single account out there, including bank accounts and social networks. You can also have access to the google accounts and with this you can access everything of the victim and potentially cause a lot of harm..
- Imagine that the atacker works on a phone repair shop, He could easily save a list of victims and delete all emails and alerts from google emails as well as other secondary email. To prevent the victim to think that anything happened, then He could wait before making any kind of attack.
- Browser/OS: Chrome + Android
- Attack scenario:
- The takeaway here is that by just knowing a 4 pin digit, or pattern of a victim, you can have all sorts of access to every single account out there, including bank accounts and social networks. You can also have access to the google accounts and with this you can access everything of the victim and potentially cause a lot of harm..
- Imagine that the atacker works on a phone repair shop, He could easily save a list of victims and delete all emails and alerts from google emails as well as other secondary email. To prevent the victim to think that anything happened, then He could wait before making any kind of attack.
- Imagine this other scenario, you want to access your Girlfriend social accounts, as the boyfriend you could easily access any social account Live from anywhere and have all kinds of access to private information.
- 06:08PM
- Component: 310426
- 06:08PM
- Status: New
- 06:08PM
- Reporter: [email protected] (Alexandre *********)
- 06:08PM
- +CC: [email protected] , [email protected] (Alexandre *********)
- 06:08PM
- Type: Customer Issue
- 06:08PM
- Priority: P4
- 06:08PM
- Severity: S4
- 06:08PM
- Title: Auth Bypass in Android + Google Chrome Fingerprint or pin Authentication method
- [email protected] <[email protected]> #2Jan 7, 2020 06:08PM
- 06:08PM
- ** NOTE: This e-mail has been generated automatically. **
- Thanks for your report.
- This email confirms we've received your message. We'll investigate and get back to you once we've got an update. In the meantime, you might want to take a look at the list of frequently asked questions about Google VRP at https://sites.google.com/site/bughunteruniversity/behind-the-scenes/faq.
- If you are reporting a security vulnerability and wish to appear in Google Security Hall of Fame, please create a profile at https://bughunter.withgoogle.com/new_profile.
- You appear automatically in our Honorable Mentions if we decide to file a security vulnerability based on your report, and you will also show up in our Hall of Fame if we issue a reward.
- **Note that if you did not report a vulnerability, or a technical security problem in one of our products, we won't be able to act on your report. This channel is not the right one if you wish to resolve a problem with your account, report non-security bugs, or suggest a new feature in our product.**
- Cheers,
- Google Security Bot
- Follow us on Twitter! https://twitter.com/googlevrp
- 06:08PM
- +Hotlist: 702027
- [email protected] <[email protected]>Jan 8, 2020 10:06AM
- 10:06AM
- Component: 310426 310543
- [email protected] <[email protected]> #3Jan 8, 2020 10:06AM
- Assigned to [email protected].
- 10:06AM
- ** NOTE: This e-mail has been generated automatically. **
- Hey,
- Just letting you know that your report was triaged and we're currently looking into it.
- You should receive a response in a couple of days, but it might take up to a week if we're particularly busy. In the meantime, you might want to take a look at the list of frequently asked questions about Google VRP at https://sites.google.com/site/bughunteruniversity/behind-the-scenes/faq.
- Thanks,
- Google Security Bot
- 10:06AM
- Status: New Assigned
- Assignee: <none> [email protected]
- [email protected] <[email protected]>Jan 16, 2020 10:26AM
- 10:26AM
- Priority: P4 P3
- [email protected] <[email protected]>Jan 20, 2020 09:59AM
- 09:59AM
- Component: 310543 310427
- [email protected] <[email protected]> #4Jan 24, 2020 03:34PM
- Status: Won't Fix (Intended Behavior)
- 03:34PM
- -Hotlist: 702027
- 03:34PM
- Hello,
- Thanks for reaching out to us about this issue!
- If an attacker has access to a victim's phone, then with persistence the attacker has a higher chance to take over the account depending on the technical capabilities of that attacker. We would recommend that you never share your four digit pin or code to access your phone with anyone.
- Once someone has access to your phone and is able to use your phone in-full, then it is hard to programmatically determine whether the actions on the phone are being committed by the victim as opposed to the attacker. If an attacker has already passed the pin code barrier of your phone, then they wouldn't need to know your password in order to commit the attacks that you propose, even if we removed the feature that you highlighted, because access to the device could lead to the attacker changing the password of the the account by going through recovery on this device.
- Many users enjoy the "Use device lock to login" feature and it seems you are suggesting that we require a password to use on of our services from a personal device and I am not sure, if we remove this feature that it would increase the security of a Gmail account, since the device in itself increases the chances of a successful recovery, if you know the gmail address tied to the phone.
- That said - if you think we misunderstood your report, and you see a well defined security risk, please let us know what we missed.
- Best,
- Marc, Google Trust & Safety
- 03:34PM
- Status: Assigned Won't Fix (Intended Behavior)
- Alexandre ********** <[email protected]> #5Jan 24, 2020 04:14PM
- Hello Marc, yes I truly understand the cool functionality of this pin/fingerprint to enter.
- I will again give the example of the Phone repair service center of some kind.
- Never a bad intentioned person would by any means try to "recover" and account of a person to attack them, why you would ask? Well they would need to try to do it while having the phone in hands, and the person being attacked would notice right away by receiving any kind of emails etc etc. there would be alerts for sure! And the person would at the very least get suspicious about this!
- By letting the PIN function available you are opening a breach to store the passwords locally to prepare an attack later, avoiding some kind of suspicions to the store or the worker itself, because no alerts would be emited to the true owner...
- The only thing now that is not happening is that no one knows this simple trick, but when someone starts to notice this they will start to make atacks, then instead of avoiding your customers issues you will have to repair them.
- I could very easily store a lot of customers passwords of any kind, and then prepare an atack a year later. no one will know for sure what happened here.
- At least make the option to require the fingerprint only. And remove the pin.
- You at google love to send emails warning about possible account breaches everywhere. You have this simple trick open to everyone. I can know every passwords of a person by just knowing a 4 digit pin and not be scared of the person knowing that I just did that.
- And of course I Am totally aware about the riscs of leting people access my phone, but you have to consider that the average consumer thinks that they are perfectly safe by giving a 4 digit PIN to a simple phone repair shop. They will never suspect that the store can know every single password to every single website that they have saved on the google account or even enter the google account at will without knowing the password beforehand and without alerts from google, even a experienced user would let this slip trough probably...
- I truly believe that this kind of trick in the wrong hands could lead to serious injury to lots of people. Its a mater of time only... To be a hacker you don't have to understand code, sometimes you have to find this little gaps in the system.
- I love this feature myself, and I don't want to lose it. The best way here? make the feature fingerprint only. Not with the phone PIN.
- You should reconsider this, by looking this aside a making it "intended behaviour" you are ignoring all this facts, and it will be a mater of time that someone will start using this, then you will reconsider and it will be too late.
- We know that this is the end users fault! but Shouldn't you try to avoid all the harm this would make? Imagine if I post this on reddit or any social network, providing all the information to this flaw? and stating that you are letting this slip? People will get informed about a new kind of attack and then you will take action? If the answer is yes why then wouldn't you want to solve this? Just because it is not known yet?
- [email protected] <[email protected]>Jan 24, 2020 04:14PM
- 04:14PM
- +Hotlist: 702027
- [email protected] <[email protected]> #6Jan 27, 2020 01:30PM
- 01:30PM
- -Hotlist: 702027
- 01:30PM
- You are free to post this on reddit and secondly, why would anyone give their 4 digit code to Phone repair service center? The repair shop would have no need for their customer's pin and this is not normal practice. Your pincode is your pincode, not to be shared with anyone.
- Alexandre ********* <[email protected]> #7Jan 27, 2020 01:37PM
- The question is not why would they. the question is do they? And yes they do. Sometimes to fully test the phone . Like checking if touchscreen is working on all areas etc etc.
- You are completely ignoring this . Because you are stating what you think is correct or not. well. People do it. Thats is normal. and they think a 4 pin digit will only give them access to the phone, and not to the google account entirely, I mean at least they should expect an alert. but no. nothing. Easy access. I'm surprised to see how you can ignore this ... Your reaction is. well its the peoples fault, deal with it. Shouldn't you prevent stuff that is related to user error as well? I dont know. I'm kinda disappointed in this answer.
- Its like fishing, why would people enter the password in wrong websites? well they do. You alert people from this anyway. Why should you care about that then anyway? its their fault as well.
- [email protected] <[email protected]>Jan 27, 2020 01:37PM
- 01:37PM
- +Hotlist: 702027
- [email protected] <[email protected]> #8Jan 27, 2020 02:56PM
- 02:56PM
- -Hotlist: 702027
- 02:56PM
- Hello,
- You are conflating what I said, in my original response, I explained that if someone knows the pin to your phone that they would have an advantage to reset the Gmail account's password, so removing this feature wouldn't provide any extra protections against this kind of attack.
- Alexandre ********* <[email protected]> #9Jan 27, 2020 03:23PM
- Yes, but the original owner gets notified via email + alternate email address with emails with those actions. Right? So will a guy working at a store even consider to do this? It would point everything to himself.
- Imagine if you get notified of such actions and your phone is at the repair shop, well thats an easy case to solve... Just go there and ask who did it and why,
- If you know your phone is at a repair shop and you notice that your password got reset or received an email address wouldn't you ask in the store who did this and why?
- I just cant believe how are you not understanding what I am saying.
- That would be a big risk for whoever is doing that, because that kind of "attack" would have to be done when you have the phone in hands. The owner would know in several diferent ways that something odd happened you understand this?
- This other way around is not the same, I could just write down all the info that I want and then wait a couple of days or months or years to make something out. The person would not even know how the hell is getting attacked. Do you understand this?
- There's 2 atacks here.
- 1. Having access to the google account while having the phone at hands (your example)
- 2. Having access to the google account and other kind of accounts later, this includes social accounts and bank accounts and anything that is saved in google passwords.
- Disadvantages/safeties implemented in attack 1.
- - The attacker needs to act with the device at hand having all kinds of attention to him.
- - Changing any passwords with the device at hand would bring suspicious from the owner. Theres tons of notifications from google when that happens.
- - The owner will get notified via different methods
- - They will never prefer to do this because they will be scared of being fired from the job.
- Disadvantages/safeties implemented in attack 2 (my example)
- - The attacker could just save the passwords and the owner will not know this, because you are not currently notified of accessing that page. So the attacker feels safe to do this. No suspicions.
- - The attacker can try and login at any website (bank or social) later, and the owner can be notified at that time, but will never know who is doing that nor will remember that that simple repair shop could hack them..
- - The attacker could try and make an attack at night this way the original owner could be sleeping having a lot of time to do anything he wants.
- - No suspicions no fear of doing this as the attacker could login in a internet cafe to hide his real IP Address...
Advertisement
Add Comment
Please, Sign In to add comment