Subscribe via feed.

Google fixes Web site security bug

Posted by deepquest on October 11, 2005 – 8:27 pm

Google has fixed a security flaw on its Web site that opened the door to phishing scams, account hijacks and other attacks, security researchers said Monday.

The flaw, known as a cross-site scripting vulnerability, existed on the Web site for Google’s AdWords advertising program and a customer training site, according to security company Finjan Software, which discovered the problem.

Attackers could have exploited the flaw to hijack Google accounts, launch phishing scams or even download malicious code onto users’ computers, according to Finjan. Phishing scams are designed to trick people into giving up sensitive information such as usernames, passwords, credit card details and Social Security numbers.

Finjan informed Google of the bug late last month, and the problem was fixed within 30 hours, said Limor Elbaz, a vice president at Finjan, which is headquartered in San Jose, Calif. “Google’s responsiveness was very good,” she said.

Google confirmed that it was alerted “a little while ago” and fixed the flaw. “No user data was compromised, and we applaud Finjan for following industry best practices for vulnerability disclosure,” a Google representative said in an e-mailed statement.

The security problem existed because forms on Google’s Web site did not validate and filter data entered into certain fields. This allowed an attacker to inject extra content and scripts that would run on the user’s computer, according to Finjan. To take advantage of the flaw, an attacker would have to craft a special Web link and trick the user to follow it.

“The dangerous thing in the case of Google is that the link would look like an innocent Google link,” Elbaz said.

more from [url=http://news.com.com/Google+fixes+Web+site+security+bug/2100-1002_3-5892525.html?tag=nefd.top]News.com[/url]


This post is under “Security” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.