Search engine darling Google Inc. has patched a hole in its search engine the could have allowed malicious hackers to modify the content of the Google search results page or silently modify search results, but a new hole may have already appeared.
"Google was recently alerted to a potential security vulnerability affecting users of our website. We have since fixed this vulnerability, and all current and future Google.com users are protected," Tyler said.
The company is also aware of a second vulnerability, discovered by U.K. security firm Netcraft Ltd. and will be fixing its systems shortly to remove the vulnerability, he said.
The Custom WebSearch vulnerability was first reported in the online security newsgroup Bugtraq. Google's servers fail to validate URLs (uniform resource locators) for image files to make sure they actually point to images. Malicious hackers could trigger the vulnerability using a Google custom search form, or even through a customized HTML (Hypertext Markup Language) link, by feeding Google's servers computer script instead of an image URL, according to the notice's author, who used the name "Jim Ley."
According to the notice's author, the vulnerability has existed for around two years without being fixed by Google, which was notified twice of the hole. The recent release of a desktop search tool from Google worsened the impact of the flaw, allowing hackers to leverage the Desktop Search feature to search for and steal content, such as passwords or personal financial information, from files on the local hard drive.
A number of major Web sites use the Google Custom WebSearch service, including Netscape Communications Corp., The Washington Post Co. and Virgin.net, according to Google's Web page.
In another example of how the flaw could be used, Ley posted a link on his Web site, http://www.jibbering.com, that replaced Google's main page with a page announcing that Google was becoming a for-fee search service and asking visitors to provide credit card information to sign up for the service.
The Google hole is an example of a common security problem affecting Web sites that dynamically generate Web pages based on input from unknown sources, such as Web surfers, according to a vulnerability note written in 2000 by the Computer Emergency Readiness Team at Carnegie Mellon University in Pittsburgh. (See: http://www.cert.org/advisories/CA-2000-02.html.)
Google developers appear to have missed that four-year-old warning and the company did not respond to repeated e-mails sent to an address for reporting security holes, Ley said.
"The problem with this approach is that it relies on them thinking of every possible thing they could exclude...There's so many ways to execute script, attempting to cover all the bases with this approach is risky," he wrote.