Menu
Researcher warns popular gaming plug-in puts millions of web users at risk from data thieves

Researcher warns popular gaming plug-in puts millions of web users at risk from data thieves

In a demo posted on YouTube, the researcher shows how a flaw in the Unity Web Player could let an attacker access a Gmail account

Flaw in Unity Web Play puts users at risk

Flaw in Unity Web Play puts users at risk

A researcher is warning that a gaming plug-in installed on over 200 million PCs contains a flaw that could let attackers steal users' data from websites they're logged into, such as their Web mail and social networking accounts.

The technology in question, from Unity Technologies, is used by hundreds of thousands of developers to create online games and other interactive 3D content. The flaw, which the researcher says hasn't been patched yet, is located in the Unity Web Player, a plug-in that needs to be installed inside browsers in order to display Unity-based Web apps.

Unity Technologies, based in San Francisco, didn't immediately respond to a request for comment.

The Unity engine allows developers to create 3D content that will work across a variety of mobile, desktop and gaming platforms, including in browsers such as Firefox, Chrome, Internet Explorer, Safari and Opera. The technology is popular with online game developers and is even endorsed by Facebook, which offers a software development kit for integrating Unity-based games with Facebook features.

According to Unity Technologies, the Unity Web Player was installed on over 200 million computers as of March 2013. The company says it serves over 700,000 monthly active developers, ranging from large publishers to hobbyists, and that it "touches" 600 million gamers all over the world through games made using its engine.

This week, Finnish security researcher Jouko Pynnönen reported finding a way to bypass the cross-domain policy enforced by the plug-in to access other websites with the credentials of the active browser user.

The cross-domain policy is normally supposed to prevent a Unity-based Web application loaded from a particular domain name from accessing resources from other domains, Pynnönen said Tuesday in a blog post.

However, the researcher found a vulnerability that allows a malicious app to trick the player into allowing requests to be made to third-party websites.

He created a proof-of-concept Unity app that, when loaded by the browser plug-in, accesses the user's Gmail account if he has an active Gmail session and sends his emails back to the attacker.

The same attack could be done against users logged into Facebook or any other website as long as they have the Unity Web Player installed.

"Depending on the web browser and its version, the plugin may or may not start directly without confirmation," the researcher said.

The attack will no longer work by default in the recent versions of Chrome, because starting with Chrome version 42, released in April, the browser no longer supports plug-ins based on the aging Netscape Plugin Application Programming Interface (NPAPI). There is currently a workaround to manually re-enable NPAPI plug-ins in Chrome, but it will only work for a few more months as Google plans to completely ban NPAPI plug-ins from Chrome later this year.

The researcher claims that he tried to report the bug to Unity Technologies, once in February and once in April. However, he only heard back from the company Wednesday, a day after he disclosed the vulnerability publicly.

"According to their email, the QA team has picked up the bug reports today and an improved security response procedure is in the works," he said.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags privacyFacebookonline safetyExploits / vulnerabilitiesUnity Technologies

Featured

Slideshows

The making of an MSSP: a blueprint for growth in NZ

The making of an MSSP: a blueprint for growth in NZ

Partners are actively building out security practices and services to match, yet remain challenged by a lack of guidance in the market. This exclusive Reseller News Roundtable - in association with Sophos - assessed the making of an MSSP, outlining the blueprint for growth and how partners can differentiate in New Zealand.

The making of an MSSP: a blueprint for growth in NZ
Reseller News Platinum Club celebrates leading partners in 2018

Reseller News Platinum Club celebrates leading partners in 2018

The leading players of the New Zealand channel came together to celebrate a year of achievement at the inaugural Reseller News Platinum Club lunch in Auckland. Following the Reseller News Innovation Awards, Platinum Club provides a platform to showcase the top performing partners and start-ups of the past 12 months, with more than ​​50 organisations in the spotlight.​​​

Reseller News Platinum Club celebrates leading partners in 2018
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP has honoured its leading partners in New Zealand during 2018, following 12 months of growth through the local channel. Unveiled during the fourth running of the ceremony in Auckland, the awards recognise and celebrate excellence, growth, consistency and engagement of standout Kiwi partners.

Meet the top performing HP partners in NZ
Show Comments