Menu
Over 30 vulnerabilities found in Google App Engine

Over 30 vulnerabilities found in Google App Engine

Researchers escaped the Java sandbox on the cloud platform and executed code on the underlying system

Serious vulnerabilities exist in Google App Engine (GAE), a cloud service for developing and hosting Web applications, a team of security researchers has found.

The vulnerabilities could allow an attacker to escape from the Java Virtual Machine security sandbox and execute code on the underlying system, according to researchers from Security Explorations, a Polish security firm that found many vulnerabilities in Java over the past few years.

"There are more issues pending verification -- we estimate them to be in the range of 30+ in total," wrote Adam Gowdiak, the CEO and founder of Security Explorations, in a post on the Full Disclosure security mailing list that describes his company's GAE findings. The Security Explorations researchers couldn't fully investigate all of the issues because their test account on GAE was suspended, likely due to their aggressive probing, he said.

Security Explorations sent details about the vulnerabilities and the associated proof-of-concept code to Google on Sunday after being contacted by the company, Gowdiak wrote via email on Tuesday, adding that Google is now analyzing the material.

After breaking out of the Java sandbox, which separates Java applications from the underlying system, the Security Explorations team started to investigate another security layer, the sandbox of the operating system itself. They didn't have time to finish the research before their account got suspended, but they managed to gather information about how the Java sandbox is implemented in GAE and about internal Google services and protocols, according to Gowdiak

GAE allows users to build Web applications in Python, Java, Go, PHP and a variety of development frameworks associated with those programming languages. Security Explorations investigated only the platform's Java implementation.

Almost all of the issues found were specific to the Google Apps Engine environment, according to Gowdiak. "We didn't use any Oracle Java code sandbox escape."

Because the Security Explorations team didn't finish its investigation, it's not clear if the flaws they found could have allowed the compromise of other people's apps hosted on GAE.

Earlier this year, the company found vulnerabilities in Oracle's Java Cloud Service, which allows customers to run Java applications on WebLogic server clusters in data centers operated by Oracle. One of the issues allowed potential attackers to access the applications and data of other Java Cloud Service users in the same regional data center.

"By access we mean the possibility to read and write data, but also execute arbitrary (including malicious) Java code on a target WebLogic server instance hosting other users' applications; all with Weblogic server administrator privileges," Gowdiak said at the time. "That alone undermines one of key principles of a cloud environment -- security and privacy of users data."

A remote code execution flaw in Google App Engine would qualify for a $20,000 reward under the Google Vulnerability Reward Program, but it's not clear if Security Explorations followed all of the program's rules, which call for advance notice to Google before public disclosure and not disrupting or damaging the tested service.

"We are neither participating in, nor following any Bug Bounty programs," Gowdiak wrote. "Over the last 6 years of activity we have found dozens of security issues that impacted hundreds of millions of people (just to mention Oracle Java flaws) or devices (security issues in set-top-box chipsets). We have never received any reward for our work from any vendor. That said, we don't expect to receive anything this time either."

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags GooglesecuritySecurity ExplorationsExploits / vulnerabilitiesOracle

Slideshows

Top 50 defining moments of the New Zealand channel in 2016

Top 50 defining moments of the New Zealand channel in 2016

Reseller News looks back on a tumultuous 12 months for the New Zealand channel, assessing the fallout from a year of sizeable industry change. Whether it be local or global mergers and acquisitions, distribution deals or job changes, the channel that started the year differs somewhat to the one set to finish it - Reseller News assesses the key moments that made 2016.​

Top 50 defining moments of the New Zealand channel in 2016
​Hewlett Packard Enterprise honours high achieving NZ channel

​Hewlett Packard Enterprise honours high achieving NZ channel

Hewlett Packard Enterprise honoured its top performing Kiwi partners at the second running of its HPE Partner Awards in New Zealand, held at a glitzy ceremony in Auckland. Recognising excellence across eight categories - from distributors to resellers - the tech giant celebrated its first year as a standalone company, following its official split from HP in 2015.

​Hewlett Packard Enterprise honours high achieving NZ channel
Nutanix treats channel partners to Christmas cruise

Nutanix treats channel partners to Christmas cruise

Nutanix recently took to the seas for a Christmas Cruise around Sydney Harbour with its Australia and New Zealand staff, customers and partners to celebrate a stellar year for the vendor. With the sun out, they were all smiles and mingled over drinks and food.

Nutanix treats channel partners to Christmas cruise
Show Comments