線上訂房服務-台灣趴趴狗聯合訂房中心
發文 回覆 瀏覽次數:836
推到 Plurk!
推到 Facebook!

Google patches one security hole, but another surf

 
conundrum
尊榮會員


發表:893
回覆:1272
積分:643
註冊:2004-01-06

發送簡訊給我
#1 引用回覆 回覆 發表時間:2005-05-17 21:11:44 IP:218.175.xxx.xxx 未訂閱
http://www.computerworld.co.nz/news.nsf/UNID/BF5DD407EDC3FEC7CC256F34007EACC6 Google patches one security hole, but another surfaces Script injection flaw allows text on Google home page to be changed Paul Roberts, Boston Search engine darling Google has patched a hole in its search engine the could have allowed malicious hackers to modify the content of the Google search results page or silently modify search results, but a new hole may have already appeared. The vulnerability concerns the Google Custom WebSearch service, which allows third party web portals and other websites to use Google's servers to search content on their website. A flaw in Google's Web servers allowed malicious hackers to insert javascript instead of links to image files, allowing them to alter the appearance of the Google search results page or steal search data. After being alerted to the hole, Google fixed the vulnerability, says Nathan Tyler, a Google spokesman. "Google was recently alerted to a potential security vulnerability affecting users of our website. We have since fixed this vulnerability, and all current and future Google.com users are protected," Tyler says. The company is also aware of a second vulnerability, discovered by UK security firm Netcraft and will be fixing its systems shortly to remove the vulnerability, he says. The Custom WebSearch vulnerability was first reported in the online security newsgroup Bugtraq. Google's servers fail to validate URLs for image files to make sure they actually point to images. Malicious hackers could trigger the vulnerability using a Google custom search form, or even through a customised HTML link, by feeding Google's servers computer script instead of an image URL, according to the notice's author, who used the name Jim Ley. According to Jim Ley the vulnerability has existed for around two years without being fixed by Google, which was notified twice of the hole. The recent release of a desktop search tool from Google worsened the impact of the flaw, allowing hackers to leverage the Desktop Search feature to search for and steal content, such as passwords or personal financial information, from files on the local hard drive. A number of major websites use the Google Custom WebSearch service, including Netscape Communications, The Washington Post and Virgin.net, according to Google's web page. In another example of how the flaw could be used, Ley posted a link on his website that replaced Google's main page with a page announcing that Google was becoming a for-fee search service and asking visitors to provide credit card information to sign up for the service. The Google hole is an example of a common security problem affecting websites that dynamically generate web pages based on input from unknown sources such as web surfers, according to a vulnerability note written in 2000 by the Computer Emergency Readiness Team at Carnegie Mellon University. Google developers appear to have missed that four-year-old warning and the company did not respond to repeated emails sent to an address for reporting security holes, Ley said. In patching it, Google developers changed their code to prevent javascript and vbscript, but may have left open other avenues of attack, Ley wrote in an email. "The problem with this approach is that it relies on them thinking of every possible thing they could exclude ... There's so many ways to execute script, attempting to cover all the bases with this approach is risky," he wrote. However, even as the company patched one hole, security firm Netcraft said it discovered a different vulnerability that could allow attackers to inject malicious content in the Google website for online identity theft scams or other purposes. The new hole is a script injection hole similar to the one reported by Ley and was found in a Google search feature that is accessible by anybody, says Paul Mutton, an internet services developer at Netcraft. Like the vulnerability reported in Bugtraq, the new hole also allows malicious hackers to use malicious script to replace the content of the Google search results page and could be used to trick users into trusting the content displayed, Mutton says. The company does not want to discuss specific details about the vulnerability. Mutton notified Google and was informed that the hole would be patched, he says.
系統時間:2024-07-04 2:19:03
聯絡我們 | Delphi K.Top討論版
本站聲明
1. 本論壇為無營利行為之開放平台,所有文章都是由網友自行張貼,如牽涉到法律糾紛一切與本站無關。
2. 假如網友發表之內容涉及侵權,而損及您的利益,請立即通知版主刪除。
3. 請勿批評中華民國元首及政府或批評各政黨,是藍是綠本站無權干涉,但這裡不是政治性論壇!