Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Security Firm Claims It Found Google App Engine Flaws

    By
    Jaikumar Vijayan
    -
    December 9, 2014
    Share
    Facebook
    Twitter
    Linkedin
      Google security

      Polish firm Security Explorations claims it has discovered more than two-dozen vulnerabilities in the Google App Engine Java environment, some of which allow native code execution and Java security sandbox escape.

      There are potentially several more vulnerabilities in the environment that the company has not been able to verify so far, Adam Gowdiak, CEO of Security Explorations, wrote in a Sept. 7 advisory on Full Disclosure, a mailing list for discussing security vulnerabilities and exploits.

      Google App Engine (GAE) is a Google-hosted service that allows businesses to build and maintain applications written in Java, Python, PHP, Go and other programming languages. The company offers software development kits in the supported languages. Each contains the APIs and libraries available to App Engine, a secure sandbox environment that emulates App Engine services on the developer’s local computer and numerous deployment tools for the cloud.

      The flaws enable attackers to bypass GAE’s Java Runtime Environment (JRE) Class whitelist, escape the Java Virtual Machine security sandbox and issue arbitrary library and system-level calls. At least 22 of the vulnerabilities allowed an escape from the security sandbox, Gowdiak said, adding that Security Explorations was able to exploit 17 of them via proof-of-concept code.

      Google’s Java security sandbox is designed to prevent Web-hosted applications from interfering with each other. According to Google Applications, running in this environment can execute code and store and query data in the App Engine data store but cannot write to the file system or make other kinds of system calls.

      “We gained access to the files (binary/classes) comprising the JRE sandbox, that includes the monster libjavaruntime.so binary,” Gowdiak said. Security Explorations was also able to learn a lot about the GAE environment’s Java sandbox by extracting information from debugging tools and protocol buffering methods, he said.

      “There are more issues pending verification—we estimate them to be in the range of 30+ in total,” Gowdiak wrote.

      Security Explorations has been forced to halt its research because Google has suspended its GAE account. “This week we did poke a little bit more aggressively around the underlying OS sandbox [and] issued various system calls in order to learn more about the nature of the [sandbox],” he conceded. “Without any doubt, this is an opsec failure on our end,” he added, expressing hope that Google would reinstate the company’s account.

      “Taking into account an educational nature of the security issues found in GAE Java security sandbox and what seems to be an appreciation Google has for arbitrary security research … we hope the company makes it possible for us to complete our work,” Gowdiak said. Reinstating the account will allow researchers at Security Explorations to verify the remaining vulnerabilities and potential exploits and to provide a report documenting all the findings for the security community.

      In an email response to an eWEEK query, Gowdiak said it is impossible presently to assess the severity of the discovered flaws because Security Explorations no longer has access to its GAE account. “We broke out of GAE Java security sandbox and gained native code execution in the environment,” he said. That meant Security Explorations had the ability to execute code outside the sandbox and start poking into the operating system sandbox layer. “This is still local code execution though, not a remote one,” he said.

      The flaws are the result of some simple mistakes pertaining to known Java security problems, he said. “Google is currently looking into the material we delivered to the company. We don’t know of any other status regarding the reported issues,” he said.

      In an emailed comment, a Google spokesman said the company takes all reports of vulnerabilities in its products very seriously. “We are investigating Security Explorations’ posting to the Full Disclosure mailing list,” the spokesperson said. “We have no reason to believe that customer data and applications are at risk.”

      Avatar
      Jaikumar Vijayan
      Vijayan is an award-winning independent journalist and tech content creation specialist covering data security and privacy, business intelligence, big data and data analytics.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×