Thursday, March 10, 2011

How I Hacked Any Blogger Account



This is my first post in my blog and also my first post regarding my security vulnerabilities findings in Google Reward Program,

In the last 2 months, I participated in Google reward program and found some High, Serious vulnerabilities,

(First, I want to mention that Google has the best professional, brilliant security team, It amazing how much Google care about security and do a amazing job to secure their sites, Thanks Adam, Google Security Team  for giving me the chance to show my skills :))

The vulnerability that I want to share first, Is a critical vulnerability in Blogger (Google Service),

That vulnerability could be used by an attacker to get administrator privilege over any blogger account (Permission Issue),

Yes I know it sound kind of crazy but it's true :),

Here are the details regarding the issue in Blogger service,

I found a HTTP Parameter Pollution vulnerability in Blogger that allow an attacker to add himself as an administrator on the victim's blogger account,

Technical details:

Here are the steps for getting admin control permissions over any blogger accounts.


The attacker Use the invite author options in blogger (add authors):

Vulnerability location:


security_token=attackertoken&blogID=attackerblogidvalue&blogID=victimblogidvalue& email)&ok=Invite
As you can see I added two blogid value in my post request (blogID=attackerblogidvalue&blogID=victimblogidvalue)

The server checks the first blogid value and executes the second blogid value of the attacker


After that the attacker receives a mail to confirm him as a author (author invitation link),
After that, the attacker will be added as an author on the victim account.


At this step it becomes possible to modify the attacker permission from an author to an administrator,
Vulnerability Location:


PoC Video:

2.(Full Video Download): (The vulnerability mentioned here has been confirmed patched by the Google Security Team very fast.) Best Regards Nir.Goldshlager