fyi: post in bugtraq. You may wish to look for and remove any whitelists based on google, googlegroups, or gmail accounts until google fixes this.
-- Michael Scheidell, CTO >|SECNAP Network Security Winner 2008 Network Products Guide Hot Companies FreeBSD SpamAssassin Ports maintainer ------ Forwarded Message > From: <[EMAIL PROTECTED]> > Date: 7 May 2008 20:37:46 -0000 > To: <[EMAIL PROTECTED]> > Subject: Exploiting Google MX servers as Open SMTP Relays > > > Vulnerability Report: > > As part of our recent work on the trust hierarchy that exists among email > providers throughout the Internet, we have uncovered a serious security flaw > in Ggoogle's free email service, Gmail. This vulnerability exposes Google's > email servers in a way that allows an attacker to use them as open spam and > phishing relays. This issue is related to the risk of a malicious user abusing > Gmail's email forwarding functionality. This is possible because Gmail's email > forwarding functionality does not impose proper security restrictions during > its setup process and can be easily subverted. By exploiting this problem an > attacker can send unlimited spam and phishing (i.e. forged) email messages > that are delivered by Google's very own SMTP servers. Since the messages are > delivered by Google's own servers, an attack based on this flaw is able to > bypass all spam filters that are based on the blacklist / whitelist concept. > We were able to confirm that this vulnerability is indeed exploitable b > y crafting a proof of concept attack that allowed us to send any number of > forged email messages without restriction through Google's server > infrastructure. We have also verified that this flaw allows attackers to > bypass spam filters by using our method to send messages that are usually > flagged as spam. While sending these messages directly from our network in the > traditional way had the messages classified as spam, by sending the very same > messages using our exploit, the messages were delivered directly to the > victim's inbox, thus bypassing filters. > > Impact: > > All email providers that offer Google's SMTP servers any special level of > trust (e.g. whitelist status) are vulnerable. > > Disclosure: > We have contacted Google about this issue and are waiting for their position > before releasing further details. > > For more information, visit our homepage: > http://ece.uprm.edu/~andre/insert > > > Regards, > > > Pablo Ximenes, AndrĂ© dos Santos > > INSERT - Information Security Research Team > University of PR at Mayaguez (UPRM), USA > State University of CearĂ¡ (UECE), Brazil > > [EMAIL PROTECTED], [EMAIL PROTECTED] > ------ End of Forwarded Message _________________________________________________________________________ This email has been scanned and certified safe by SpammerTrap(r). For Information please see http://www.spammertrap.com _________________________________________________________________________