At Black Hat, RSnake is expected to demonstrate a zero-day vulnerability that allows for information theft, spoofing, and authentication issues.
"Gmalware" may be coming soon to your iGoogle page.
In two weeks, at the Black Hat Conference on Wednesday, Aug. 6, Cenzic senior security analyst Tom Stracener and security researcher Robert Hansen, better known as "RSnake," plan to demonstrate a zero-day vulnerability that affects Google Gadgets.
"At the core of the talk is the concept of Gmalware, which is basically a malicious gadget," said Stracener. "The idea is that gadgets are supported by the gmodule domain and security architecture. And with the current security architecture, it doesn't protect individuals from malicious gadgets very well. Nor does it protect gadgets from one another."
Google Gadgets, said Stracener, are vulnerable to information theft, deceptive practices, content spoofing, and authentication issues.
A Google Gadget, for example, can log you into an account without your knowledge and monitor your Google Search queries, Stracener explained. It can also be made to attack another Google Gadget and steal information.
No malicious Google Gadgets have been spotted in the wild yet. Once details about the vulnerabilities emerge, however, that may change.
Google has been alerted to the researchers' findings but hasn't yet publicly acknowledged whether or not it sees a problem. The company did not respond to a request for comment.
"We alerted them to that and what they came back with was this is the expected behavior of this domain," said Hansen. "Both Tom and I found that to be a fairly contentious attitude. We alerted them to it and they decided not to fix it and now we're just demonstrating what we found."
Hansen said that the underlying problem is that Google's security architecture allows an attacker to put pretty much whatever he or she wants inside Google Gadgets. Likening the issue to a SQL injection vulnerability, he said that an attacker could put malicious Flash, HTML, or scripts into a Google Gadget.
Google has some measures at the perimeter to prevent bad gadgets from being introduced. "But there are some tricks that we've come up with to get the Google Gadget subversively added to somebody's iGoogle page," said Hansen.
Google also tries to sandbox the gmodules domain, where Google Gadgets operate, from Google.com. "The problem is that protects you from two or three very specific attacks but it leaves you open to a huge number of other attacks," said Hansen. "What we're outlining is everything else that's wrong with this model."
Google tries "to separate that into a different domain, the gmodules domain," said Hansen. "That protects you from two or three very specific attacks, but it leaves you open to a huge number of other attacks. What we're outlining is everything else that's wrong with this model."