AVG's Web TuneUp Chrome add-on poses security risk

The vulnerability overrides security features in the Chrome browser built to stop personal data being distributed

Google has uncovered a vulnerability in AVG's Web TuneUP software, which was specifically built to safeguard users against hidden threats.

The flaw was uncovered by the search engine's Tavis Ormandy, who works on Google's security team. He explained that the software force installs a plugin in the Chrome browser without asking for the user's permission.

In doing so, the software could expose the user's personal details and internet history to criminals trawling the web for such details. The code could also let hackers spy on victims' emails and other online activities, he said.

"This extension adds numerous JavaScript API's to chrome, apparently so that they can hijack search settings and the new tab page," Ormandy wrote in the bug report.

"The installation process is quite complicated so that they can bypass the chrome malware checks, which specifically tries to stop abuse of the extension API.

He added: "Anyway, many of the API's are broken, the attached exploit steals cookies from avg.com. It also exposes browsing history and other personal data to the internet, I wouldn't be surprised if it's possible to turn this into arbitrary code execution."

After discovering the problem, Ormandy wrote a letter to AVG, highlighting the issue and advising the company to fix the problem immediately.

"My concern is that your security software is disabling web security for nine million Chrome users, apparently so that you can hijack search settings and the new tab page," he wrote.

"There are multiple obvious attacks possible, for example, here is a trivial universal xss in the 'navigate' API that can allow any website to execute script in the context of any other domain. For example, attacker.com can read email from mail.google.com, or corp.avg.com, or whatever else. I hope the severity of this issue is clear to you, fixing it should be your highest priority."

AVG responded to the concerns, thanking Google for discovering the flaw and then claiming it had fixed the issue, although Google then responded, saying it hadn't prevented the addition from auto-installing as a Chrome extension.

Featured Resources

Humility in AI: Building trustworthy and ethical AI systems

How humble AI can help safeguard your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Leadership compass: Privileged Access Management

Securing privileged accounts in a high-risk environment

Download now

Why you need to include the cloud in your disaster recovery plan

Preserving data for business success

Download now

Recommended

IBM: Hackers are targeting COVID-19 vaccine 'cold chain'
Security

IBM: Hackers are targeting COVID-19 vaccine 'cold chain'

3 Dec 2020
GitHub: Open source vulnerabilities can go undetected for four years
Security

GitHub: Open source vulnerabilities can go undetected for four years

3 Dec 2020
Google buys Actifio to bring disaster recovery to Google Cloud
disaster recovery (DR)

Google buys Actifio to bring disaster recovery to Google Cloud

3 Dec 2020
What is shoulder surfing?
Security

What is shoulder surfing?

2 Dec 2020

Most Popular

Samsung Galaxy Note might be discontinued in 2021
Mobile Phones

Samsung Galaxy Note might be discontinued in 2021

1 Dec 2020
Microsoft Teams no longer works on Internet Explorer
Microsoft Office

Microsoft Teams no longer works on Internet Explorer

30 Nov 2020
Sopra Steria cyber attack costs to hit €50 million
Security

Sopra Steria cyber attack costs to hit €50 million

26 Nov 2020