Tal<p>The research team in Astrix uncovered <a href="https://infosec.exchange/tags/GhostToken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GhostToken</span></a> - a 0-day <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> in Google Cloud Platform (<a href="https://infosec.exchange/tags/GCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GCP</span></a>) allowing malicious <a href="https://infosec.exchange/tags/OAuth" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OAuth</span></a> apps to become unremovable for Google users who installed them.</p><p>We had disclosed the vulnerability to Google who recently rolled out a patch for all users. <br>I've written a technical blog where you can read how we found the vulnerability and exploited it: <br><a href="https://astrix.security/ghosttoken-exploiting-gcp-application-infrastructure-to-create-invisible-unremovable-trojan-app-on-google-accounts/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">astrix.security/ghosttoken-exp</span><span class="invisible">loiting-gcp-application-infrastructure-to-create-invisible-unremovable-trojan-app-on-google-accounts/</span></a></p><p>For those who are tight on time, the issue resides in the fact that any Google OAuth application is forcibly tied to a single GCP project. This supposedly makes easier to use any of GCP's services to develop OAuth apps.<br>However, we discovered that when the project associated with an OAuth app is deleted, the app enters a "limbo" state, being hidden from the user's management page (and thus unremovable), while its OAuth tokens are not revoked.</p><p>This primitive can be turned into an attack flow (as described in the blog), where an attacker controlling a malicious app can access the user's data without the user being able to revoke the access.</p>