BT

Facilitating the Spread of Knowledge and Innovation in Professional Software Development

Write for InfoQ

Topics

Choose your language

InfoQ Homepage News AVG Plugin Exposes Chrome User Data

AVG Plugin Exposes Chrome User Data

Anti-virus firm AVG released a plug-in for Google Chrome that purposefully overrode the web browser's safeguards that resulted in leaving user data exposed to malicious websites.  The plugin, named AVG Web TuneUp ostensibly is intended to warn users when they are visiting unsafe websites and/or search results.  Instead the plugin leaves users vulnerable to cross-site scripting attacks if they visit a malicious website that targets flaws in the AVG plugin.

Per the investigative work of Google security researcher Tavis Ormandy, it has been revealed that users of the AVG plugin will find that their systems are vulnerable to having their browsing history and personal data stolen by a malicious website.  As Ormandy notes, AVG’s extension specifically bypasses the Chrome malware checks rendering user’s systems vulnerable.  In a follow up on December 21 to his original post, Ormandy states that the latest version of AVG’s Web TuneUp now available (4.2.5.169) does fix the initial problem.  However it does so in part by forcing the plugin to only use the domains “mysearch.avg.com” and “webtuneup.avg.com”—the risk is not completely eliminated because if these sites are compromised, the vulnerability can still be exploited.

A further patch was submitted by AVG on December 28, but it remains under review by Google as they seek to investigate whether or not AVG’s plugin violated the privacy terms of the Chrome Web Store.  Users seeking the highest degree of safety should probably remove the plugin from their browser while the issue is resolved.  This isn’t AVG’s first brush with undesired attention, earlier this fall PC World’s Jared Newman pointed out that changes in their privacy policy meant that AVG was selling their user’s non-personal data.

Rate this Article

Adoption
Style

BT