{"id":15420,"date":"2020-08-21T16:37:35","date_gmt":"2020-08-21T14:37:35","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=15420"},"modified":"2021-03-11T22:25:51","modified_gmt":"2021-03-11T21:25:51","slug":"google-fixt-gmail-spoofing-schwachstelle","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/08\/21\/google-fixt-gmail-spoofing-schwachstelle\/","title":{"rendered":"Google fixes Gmail spoofing vulnerability"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/08\/21\/google-fixt-gmail-spoofing-schwachstelle\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]In Google's email service Gmail wad a spoofing vulnerability that could have been used to send mail through someone else's account. Google has now eliminated this vulnerability after an exploit became public. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg08.met.vgwort.de\/na\/b2705ca24a9f4c3787d0f258fb5e2496\" width=\"1\" height=\"1\">Security researcher Allison Husain encountered the problem and has documented it in <a href=\"https:\/\/web.archive.org\/web\/20210228210604\/https:\/\/ezh.es\/blog\/2020\/08\/the-confused-mailman-sending-spf-and-dmarc-passing-mail-as-any-gmail-or-g-suite-customer\/\" target=\"_blank\" rel=\"noopener noreferrer\">this blog post<\/a>. Due to lack of verification when configuring mail routes, both Gmail's strict DMARC\/SPF policy and the strict DMARC\/SPF policy of every G Suite customer can be circumvented. This can be done by using G Suite's mail routing rules to forward fraudulent messages and give them authenticity. <\/p>\n<p>In particular, this is not the same as the classic mail spoofing of the past, where an arbitrary value is assigned to the From header, a technique that can be easily blocked by mail servers using the Sender Policy Framework (SPF) and Domain-based Message Authentication, Reporting and Compliance (DMARC). This issue is a unique flaw in the Gmail system that allows an attacker to send email like any other G Suite user or customer, while complying with even the most restrictive SPF and DMARC rules.<\/p>\n<p>Allison Husain discovered the bug on April 1, 2020 and reported it to Google on April 3, 2020. Google confirmed the problem, classifying it as a priority 2, severity 2 bug, but did not change anything. Then Allison Husain published the vulnerability along with a proof of concept (PoC) in her blog. Seven hours later, the vulnerability was patched by Google, as the security researcher writes. ZDnet.com has published <a href=\"https:\/\/www.zdnet.com\/article\/google-fixes-major-gmail-bug-seven-hours-after-exploit-details-go-public\/\" target=\"_blank\" rel=\"noopener noreferrer\">this post<\/a> on the subject. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]In Google's email service Gmail wad a spoofing vulnerability that could have been used to send mail through someone else's account. Google has now eliminated this vulnerability after an exploit became public.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[117,1068,69],"class_list":["post-15420","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-google","tag-mail","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=15420"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15420\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=15420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=15420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=15420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}