Vulnerability in Google ClientLogin Protocol !
May 17, 2011
Vulnerability in Google ClientLogin Protocol ! A group of security and privacy researchers from the Institute of Media Informatics at Ulm University in Germany, is claiming to have discovered a serious security vulnerability in Google's ClientLogin protocol. In a recent analysis of the Android platform, the group discovered that when Android users are connected to an unencrypted open Wifi network, an attacker could both read transmitted synchronization data of Google Contacts, Calendar and Picasa Web Albums, and capture the authToken that's user for authentication. Bastian Könings, one of the researchers from the group, told SecurityWeek, "The adversary could use this authToken to gain full access to the data API of the specific service and view, modify or delete any contacts, calendar events, and web albums of that user." "The vulnerability isn't limited to Android Google apps, but to any apps and desktop applications that use Google's ClientLogin protocol over HTTP r...