Google Email Recovery Vulnerability (Removing Secondary E-mail Address -Self Exploitation)

December 20, 2011

#Title: Google Email Recovery Vulnerability (Removing Secondary E-mail Address -Self Exploitation)
#Author: Sandeep Kamble
#Risk Factor: Low (Why low please read below)
#Attack Type: A User can access B User account Link to remove secondary E-mail address
#Reported Date: OCT 21 , 2011


In Google account setting page, when you reset Google account password, it send Reset Password link to your secondary email address. Into that mail there is one more link which can be used remove your secondary email address.

Vulnerability Description:

This Vulnerability can be used to remove secondary email address. In this vulnerability we needed to guess ?C variable token to access the any users account link that can be used to remove secondary email address ?C variable token is generating at sever side so that it is not possible to guess this token and so that it can be performed at victim side only. (Self Exploitation)

Vulnerable Link

Link it has two options, one option is to remove the Secondary and one option to negated email removing operation.
The above like is accessible to everyone. We cannot generate the token number so we can find the token using

Google Dork: Inurul : /AccountDisavow?c=

If you click on the radio button, “No, I didn’t create ******* – remove my email address, ********, from this Google Account. “ and then click continue it will remove the email and delete the link token.
This link will be dead, No one can access it again !

But if you click on the,” Yes, ******* is my Google Account. ” and press continue.
When u Click on the this radio button the token is not getting deleted, so that may be pages are indexed into Google

Proof of Concept


Finally I got Awarded By Google

Google Hall Of fame

Special thanks to Amol Naik , Anil , veenu bhai

Warm Regards

Sandeep Kamble

We Provide Penetration Testing

We Provide Penetration Testing