Incident: Chrome OS Vulnerability in Extensions Allows Data Theft

Published Date: 2011-06-30

Postmortem Analysis
Timeline 1. The software failure incident where a security researcher found a flaw in a Chrome OS application and was able to exploit it to gain control of a Google e-mail account happened before the article was published on June 30, 2011 [6339]. Therefore, the software failure incident likely occurred sometime before June 30, 2011.
System 1. Chrome OS application extensions downloaded from the Google Chrome Web Store [6339]
Responsible Organization 1. WhiteHat Security researcher Matt Johansen [6339]
Impacted Organization 1. Google e-mail account users were impacted by the software failure incident reported in Article 6339. [6339]
Software Causes 1. The software cause of the failure incident was a flaw in a Chrome OS application that allowed a security researcher to exploit it and gain control of a Google e-mail account [6339].
Non-software Causes 1. Lack of proper access control mechanisms for extensions in Chrome OS [6339] 2. Design flaw in Chrome OS that gives extensions sweeping rights to access data stored on the cloud [6339] 3. Vulnerabilities in Chrome OS extensions developed by third parties with wide-open permission sets [6339]
Impacts 1. The software failure incident in Google's Chrome OS allowed a security researcher to exploit a flaw in a Chrome OS application, gaining control of a Google e-mail account [6339]. 2. The vulnerability in Chrome OS applications allowed hackers to potentially steal data as it moved between the cloud and the Chrome OS browser, compromising sensitive information like online banking, Facebook profiles, and emails [6339]. 3. The flaw in Chrome OS extensions from the Google Chrome Web Store raised concerns about the design flaw in Chrome OS that gave extensions sweeping rights to access data stored on the cloud, potentially compromising user data security [6339]. 4. The incident highlighted the need for improved security measures in Chrome OS to protect against vulnerabilities in extensions and prevent unauthorized access to user data [6339].
Preventions 1. Implementing stricter security reviews and controls for extensions downloaded from the Google Chrome Web Store could have prevented the software failure incident [6339]. 2. Conducting thorough security testing and audits on all applications and extensions within the Chrome OS ecosystem to identify and address vulnerabilities before they can be exploited [6339]. 3. Enhancing the isolation and access control mechanisms for extensions running on Chrome OS to limit their privileges and prevent unauthorized access to sensitive data [6339]. 4. Regularly monitoring and updating the security features and protocols of Chrome OS to stay ahead of emerging threats and vulnerabilities in the cloud-based environment [6339].
Fixes 1. Implement stricter security measures for Chrome OS extensions to limit their access privileges and ensure they run in isolation by default [6339]. 2. Enhance the review process for extensions in the Chrome Web Store to identify and tag questionable extensions without hindering developers' ability to distribute their extensions [6339]. 3. Continuously monitor and patch vulnerabilities in Chrome OS to address any potential security flaws in the system [6339].
References 1. WhiteHat Security researcher Matt Johansen 2. Google spokeswoman 3. Caesar Sengupta, director of Chrome OS 4. Spokesman for WhiteHat Security 5. Fellow researcher Kyle Osborn

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization a) The software failure incident related to vulnerabilities in Chrome OS extensions has happened again within the same organization, Google. The incident involved a security researcher, Matt Johansen, discovering a flaw in a Chrome OS application that allowed him to gain control of a Google e-mail account. Google fixed the initial flaw reported by Johansen, but he claimed to have found other applications with the same vulnerability [6339]. b) The incident involving vulnerabilities in browser extensions, particularly in Chrome OS, is not unique to Google. The security researcher, Matt Johansen, also looked into extensions from other browsers such as Firefox and Safari to see if they faced similar security flaws. Johansen concluded that Chrome OS extensions act more like "mini Web applications," which can lead to Web application vulnerabilities affecting other browsers as well [6339].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article. The security researcher, Matt Johansen, discovered a flaw in a Chrome OS application that allowed him to exploit it to gain control of a Google e-mail account. This flaw was found in extensions downloaded from the Google Chrome Web Store, indicating a design flaw in Chrome OS that gives extensions "sweeping rights to access data stored on the cloud" [6339]. (b) The software failure incident related to the operation phase is also highlighted in the article. Johansen pointed out that hackers could steal data as it moves between the cloud and the Chrome OS browser, rather than hacking directly into a user's PC. This indicates a failure due to contributing factors introduced by the operation or misuse of the system, where vulnerabilities in the system's operation allowed for data theft [6339].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident reported in the articles is related to a flaw in a Chrome OS application that allowed a security researcher to exploit it and gain control of a Google e-mail account. The flaw was found in an extension downloaded from the Google Chrome Web Store, indicating an issue within the Chrome OS system itself [6339]. The vulnerability was specifically related to the design flaw in Chrome OS that gave extensions sweeping rights to access data stored on the cloud, highlighting an internal system weakness [6339]. (b) outside_system: The software failure incident also involved the aspect of data being stolen as it moves between the cloud and the Chrome OS browser, indicating a potential external factor contributing to the failure [6339]. Additionally, the vulnerability allowed hackers to access data like online banking, Facebook profiles, or e-mails as they were being loaded in the browser, suggesting an external threat exploiting the system weakness [6339].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: - The software failure incident in Chrome OS was due to a flaw in a Chrome OS application that allowed a security researcher to exploit and gain control of a Google e-mail account [6339]. - The vulnerability was found in extensions downloaded from the Google Chrome Web Store, indicating a flaw in the design of Chrome OS that gave extensions sweeping rights to access data stored on the cloud [6339]. - Google patched the initial extension reported by the researcher, but the incident highlighted potential security issues in how extensions interact with data in the cloud [6339]. (b) The software failure incident occurring due to human actions: - The security researcher, Matt Johansen, discovered and exploited the flaw in the Chrome OS application to gain control of a Google e-mail account, indicating human actions in identifying and exploiting the vulnerability [6339]. - Johansen and fellow researcher Kyle Osborn planned to reveal more information about the reported vulnerabilities in Chrome OS at the Black Hat hacking conference, suggesting human involvement in disclosing security flaws [6339].
Dimension (Hardware/Software) software (a) The software failure incident related to hardware: - The article does not mention any specific software failure incident related to hardware. Therefore, there is no information available in the provided article regarding a software failure incident occurring due to contributing factors originating in hardware. (b) The software failure incident related to software: - The software failure incident discussed in the article is related to a flaw in a Chrome OS application that allowed a security researcher to gain control of a Google e-mail account [6339]. - The vulnerability was found in Chrome OS applications, specifically in extensions downloaded from the Google Chrome Web Store, which gave sweeping rights to access data stored on the cloud [6339]. - Google patched the initial extension reported by the researcher but questioned the overall labeling of Chrome OS as vulnerable due to its use of extensions [6339]. - The security researcher highlighted that the security issues in Chrome OS were related to the permissions set by third-party developers in the extensions, which sometimes had wide-open access [6339]. - The article emphasizes that all modern browsers run extensions, and vulnerabilities in web-based apps are common across different platforms [6339].
Objective (Malicious/Non-malicious) non-malicious (a) The software failure incident reported in the articles is more aligned with a non-malicious objective. The security researcher, Matt Johansen, identified a flaw in a Chrome OS application that he was able to exploit to gain control of a Google e-mail account. He highlighted the vulnerability in Chrome OS applications, particularly extensions downloaded from the Google Chrome Web Store, which had a design flaw giving extensions sweeping rights to access data stored on the cloud [6339]. Johansen's findings were not aimed at causing harm but rather to expose security weaknesses in the Chrome OS and bring attention to potential vulnerabilities that could be exploited by malicious actors. Additionally, Google's response to the reported flaw focused on addressing the issue and enhancing security measures to protect against such vulnerabilities in the future [6339].
Intent (Poor/Accidental Decisions) unknown (a) The intent of the software failure incident related to poor decisions is not explicitly mentioned in the provided article. Therefore, it is unknown whether the software failure incident was due to contributing factors introduced by poor decisions. (b) The intent of the software failure incident related to accidental decisions is not explicitly mentioned in the provided article. Therefore, it is unknown whether the software failure incident was due to contributing factors introduced by mistakes or unintended decisions.
Capability (Incompetence/Accidental) development_incompetence, unknown (a) The software failure incident related to development incompetence is evident in the article as a security researcher, Matt Johansen, found a flaw in a Chrome OS application that allowed him to exploit it to gain control of a Google e-mail account. Despite Google fixing the flaw after it was reported, Johansen claimed to have discovered other applications with the same flaw, indicating a potential oversight or lack of thorough testing during the development process [6339]. (b) The software failure incident related to accidental factors is not explicitly mentioned in the provided article.
Duration temporary The software failure incident reported in the articles is more aligned with a temporary failure rather than a permanent one. This is evident from the fact that the security researcher, Matt Johansen, identified a flaw in a Chrome OS application that allowed him to exploit it to gain control of a Google e-mail account. Google subsequently fixed the flaw after it was reported, indicating that the issue was addressed and resolved [6339]. Additionally, the article mentions that Google has been working on security measures to protect extensions running on Chrome, such as limiting access privileges, running in isolation by default, and enforcing whitelisting for enterprises. This proactive approach to addressing security vulnerabilities suggests that the incident was temporary in nature and not a permanent failure [6339].
Behaviour value, other (a) crash: The articles do not mention any specific instance of a system crash where the software completely loses its state and fails to perform any of its intended functions [6339]. (b) omission: There is no direct mention of a failure due to the system omitting to perform its intended functions at an instance in the articles [6339]. (c) timing: The articles do not discuss any failure related to the system performing its intended functions correctly but at the wrong time (too late or too early) [6339]. (d) value: The software failure incident discussed in the articles is related to a failure where the system performs its intended functions incorrectly, allowing a security researcher to exploit a flaw in a Chrome OS application to gain control of a Google e-mail account [6339]. (e) byzantine: The incident does not involve the system behaving erroneously with inconsistent responses and interactions, as described in a byzantine failure [6339]. (f) other: The behavior of the software failure incident can be categorized as a security vulnerability where the system allows unauthorized access to sensitive data due to a design flaw in the Chrome OS applications and extensions [6339].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure In the reported software failure incident related to Google's Chrome OS, a security researcher named Matt Johansen discovered a flaw in a Chrome OS application that allowed him to exploit it and gain control of a Google e-mail account. This vulnerability could potentially lead to hackers stealing sensitive data like online banking information, Facebook profiles, or emails as they are being loaded in the browser [6339]. Johansen highlighted that the vulnerable applications were extensions downloaded from the Google Chrome Web Store, indicating a potential risk to users' data and privacy [6339].
Domain information (a) The software failure incident reported in the articles is related to the information industry. The incident involved a security flaw in a Chrome OS application that allowed a security researcher to exploit it and gain control of a Google e-mail account, potentially compromising sensitive information like online banking, Facebook profiles, and emails [6339]. The vulnerability was found in extensions downloaded from the Google Chrome Web Store, highlighting a security issue in the cloud-based OS that could impact the production and distribution of information [6339]. (b) There is no specific mention of the transportation industry in the articles. (c) There is no specific mention of the natural resources industry in the articles. (d) There is no specific mention of the sales industry in the articles. (e) There is no specific mention of the construction industry in the articles. (f) There is no specific mention of the manufacturing industry in the articles. (g) There is no specific mention of the utilities industry in the articles. (h) There is no specific mention of the finance industry in the articles. (i) There is no specific mention of the knowledge industry in the articles. (j) There is no specific mention of the health industry in the articles. (k) There is no specific mention of the entertainment industry in the articles. (l) There is no specific mention of the government industry in the articles. (m) The software failure incident is not related to any of the industries mentioned in options (a) to (l) in the articles.

Sources

Back to List