Apr 25, 2009 | Category: Google Vulns
Security researcher Pierre Gardenat reported a new interesting vulnerability in Google’s service Orkut. Malicious users can spread XSS worms on Orkut or steal authentication credentials from Google users who also use Orkut.
According to Pierre, it is important to note that thanks to the fact that this flaw affects an externally integrated application in Orkut, sensitive cookies cannot be read. An attacker will still have increased possibilities for a successful attack, just because he can force the connected user to go where he wants, using the existing open session(s).
Google also uses HTTPOnly option. Once again, this prevents an attacker from getting sensitive information, but still allows to launch powerful attacks. HTTPOnly – implemented from Firefox 3.0.6 and partially from Internet Explorer 7 : cf. http://www.owasp.org/index.php/HTTPOnly – only helps mitigate session stealing.
Anyway, this particular flaw does not affect Google directly, but a trusted application. Above all, this vulnerability clearly shows how risky it can be for a large social network like Orkut when relying on external applications.
You can see a compromised Orkut profile on:
(you need to be connected to orkut to be able to see this profile).
Thanks Pierre for the report! :-) We hope that Orkut’s staff will look into this and fix it quickly…