Google TEZ account takeover

Akshay Jain
1 min readNov 5, 2017

I don’t do bug bounties as much as I used to do, but still here is one of my findings which I recently reported to google.

Product name: GOOGLE TEZ

The vulnerability lies in the ios version of the app which doesn’t implement rate limitation during the login procedure.

Steps to reproduce:
1. Open Google Tez app link: https://itunes.apple.com/in/app/tez-a-payments-app-by-google/id1193357041?mt=8

2. Enter the phone number
3. It will send the OTP to the number
4. Keep on entering the wrong OTP. The OTP won’t expire.You can use burp intruder or anything other tools.

Browser/OS: IOS 11

For the POC purposes, I wrote a small Frida script to automate it.

Unfortunately, it was marked duplicate.

Timeline of Events

OCT 20 2017 — Report Submitted to Google Security Team

OCT 21 2017 — Google acknowledged and confirmed the issue and sent it to the appropriate product team for investigation

OCT 23rd 2017 — Google confirmed that the issue is duplicate

OCT 25th 2017 — Google fixed the bug and rolled out the patch.

PS: Stay tuned. I have reported some interesting bugs in CYLANCE and some next-gen products.

--

--