• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google oauth vulnerability exposes millions via failed startup domains

Google OAuth Vulnerability Exposes Millions via Failed Startup Domains

You are here: Home / General Cyber Security News / Google OAuth Vulnerability Exposes Millions via Failed Startup Domains
January 14, 2025

New research has pulled back the curtain on a “deficiency” in Google’s “Sign in with Google” authentication flow that exploits a quirk in domain ownership to gain access to sensitive data.

“Google’s OAuth login doesn’t protect against someone purchasing a failed startup’s domain and using it to re-create email accounts for former employees,” Truffle Security co-founder and CEO Dylan Ayrey said in a Monday report.

“And while you can’t access old email data, you can use those accounts to log into all the different SaaS products that the organization used.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The San Francisco-based company said the issue has the potential to put millions of American users’ data at risk simply by purchasing a defunct domain associated with a failed startup and gaining unauthorized access to old employee accounts related to various applications like OpenAI ChatGPT, Slack, Notion, Zoom, and even HR systems.

“The most sensitive accounts included HR systems, which contained tax documents, pay stubs, insurance information, social security numbers, and more,” Ayrey said. “Interview platforms also contained sensitive information about candidate feedback, offers, and rejections.”

OAuth, short for open authorization, refers to an open standard for access delegation, allowing users to grant websites or applications access to their information on other websites without having to give their passwords. This is accomplished by making use of an access token to verify the user’s identity and allow the service to access the resource the token is intended for.

Google OAuth Vulnerability

When “Sign in with Google” is used to sign in to an application such as Slack, Google sends the service a set of claims about the user, including their email address and the hosted domain, which could then be utilized to log users into their accounts.

This also means that if a service is solely relying on these pieces of information to authenticate users, it also opens the door to a scenario where domain ownership changes could allow an attacker to regain access to old employee accounts.

Truffle also pointed out Google’s OAuth ID token includes a unique user identifier – the sub claim – that could theoretically prevent the problem, but that has been found to be unreliable. It’s worth noting that Microsoft’s Entra ID tokens include the sub or oid claims to store an immutable value per user.

Cybersecurity

While Google initially responded to the vulnerability disclosure by stating that it is intended behavior, it has since re-opened the bug report as of December 19, 2024, awarding Ayrey a bounty of $1,337. It has also qualified the issue as an “abuse-related methodology with high impact.”

In the meantime, there are no protections that downstream software providers can take to protect against the vulnerability in Google’s OAuth implementation. The Hacker News has reached out to Google for further comment, and we will update the story if we hear back.

“As an individual, once you’ve been off-boarded from a startup, you lose your ability to protect your data in these accounts, and you are subject to whatever fate befalls the future of the startup and domain,” Ayrey said. “Without immutable identifiers for users and workspaces, domain ownership changes will continue to compromise accounts.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «4 reasons your saas attack surface can no longer be 4 Reasons Your SaaS Attack Surface Can No Longer be Ignored
Next Post: Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation microsoft uncovers macos vulnerability cve 2024 44243 allowing rootkit installation»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.