We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Gmail open to Internet Explorer hijacks

Microsoft denies researcher's security threat

Hackers can exploit an unpatched flaw in Microsoft's Internet Explorer browser to access Gmail accounts, according to security firm Cenzic.

Cenzic has warned Internet Explorer users than the browser contains an unspecified cached files bug that, when combined with a cross-site request forgery flaw in Gmail, exposes the webmail account sign-ons and lets others access those accounts and any messages or file attachments there.

Although not a bug that can be exploited remotely - an attacker must have local, physical access to the PC - as Cenzic pointed out, there are scenarios where that's not a limitation. "These vulnerabilities could be exploited such that all users of a shared computer, who use Internet Explorer and share a user account - a common practice at computer kiosks in a library or internet cafe - could be vulnerable," said Cenzic.

Gmail contributes to the overall vulnerability because its URLs display attachments when viewed using the 'View Source' command, the warning added. Internet Explorer, however, sports "improper use of caching directives [and] incorrect access checks on cached Internet Explorer files".

Together, the bugs could conceivably let someone at a public PC hijack any Gmail log-on credentials that had been entered on the machine since the Internet Explorer cache had last been purged. Internet Explorer deletes the contents of its cache only as new files are added - and the oldest are deleted - or when the user explicitly instructs the browser to clear the cache using the 'Delete Browsing History' command.

However, Microsoft denied that Internet Explorer even has a bug. "Microsoft has thoroughly investigated the claim and found that this is not a product vulnerability," said a company spokesman. "In the scenario in question, an attacker would need authenticated access to the system in order to modify files located in the cache. With that level of access, an attacker could install malicious programs that would have more impact than the scenarios described."

While true, that did not address Cenzic's scenario; by design, public PCs such as those in libraries, schools or web cafes do not require authentication to access. Microsoft was not available for clarification.

Google did not immediately respond to questions about Gmail's part in the threat.

For more security news, reviews and tutorials, see Security Advisor


IDG UK Sites

Samsung Galaxy Note 4 review: Great if you like big, expensive phones

IDG UK Sites

Why Sony's PS4 2.0 update is every gamer's dream (well, mine at least)

IDG UK Sites

This Grolsch ad combines stop-motion & CG for majestic results

IDG UK Sites

Apple rumours and predictions for 2015: What to expect from Apple in 2015