Avast SafeZone Browser Lets Attackers Access Your Filesystem

Shran

Level 5
Thread author
Verified
Well-known
Jan 19, 2015
230
By James Walker
5 Feb, 2016
"A major security flaw has been found in Avast's SecureZone browser, also known as Avastium, that allows an attacker to remotely read any file on the user's computer, over the Internet. Antivirus firm Avast quickly patched the embarrassing bug.

...

Avastium is based on Chromium, the open-source browser engine originally developed by Google for Chrome but now available for everyone. Avast modified a key security feature in Chromium, removing the protection it offers and exposing the user's filesystem to the Internet."


Major security flaw found in antivirus firm's 'secure' browser
 

Ink

Administrator
Verified
Staff Member
Well-known
Jan 8, 2011
22,361
Security vendors modifying Chromium, only to make it more vulnerable. In my opinion, they are unneeded features as most people have their preferred browsers, or run Incognito/InPrivate.
Let's see how Avira Scout turns out, or the next vulnerable 'Secure' browser. :p
 

Exterminator

Community Manager
Verified
Staff Member
Well-known
Oct 23, 2012
12,527
Just two days after Comodo's Chromodo browser was publicly shamed by Google Project Zero security researcher Tavis Ormandy, it's now Avast's turn to be publicly scorned for failing to provide a "secure" browser for its users.

While Chromodo was caught disabling a crucial security feature called Same Origin Policy (SOP), Avast's Chromium fork is much worse, featuring a series of problems, one of which allows attackers to list and read files from your computer after you click a simple malicious link.

Antivirus makers should stick to antivirus software
Called SafeZone, and also known as Avastium, Avast's custom browser is offered as a bundled download for all who purchase or upgrade to a paid version of Avast Antivirus 2016.

Just like Chromodo, SafeZone is built on top of Chromium, the open source browser project on which Google Chrome, Vivaldi, and Opera are based on as well.

As Mr. Ormandy explains, this poor excuse of a browser was allowing a third-party to carry out a series of attacks, all by fooling a user into clicking a link, which is not really that hard if you hide it under a short URL.

Users don't have to use the browser, only have it installed
According to the researcher's explanation, attackers could send malicious commands to an RPC endpoint that was left open in the browser's core engine.

These commands could be bundled inside malicious JavaScript code which was executed locally on the user's computer, where localhost access would allow it to reach these open RPC endpoints, even if SafeZone was not actually running, and the malicious links were clicked inside other browser.

An attacker wouldn't even need an info-stealing malware strain if he knew his target had Avast's SafeZone installed, browser which was dumping everything out in the open.

"Although this attack relies on Avastium (Avast's port of Chromium), the victim does *not* have to be using it, and never has to have used it, because your profile is automatically imported from Chrome on startup," Mr. Ormandy noted, saying that bookmarks, preferences, passwords and cookies are automatically added to SafeZone without the user's consent.

Avast purposely disabled a Chromium security feature
"Additionally, you can send arbitrary *authenticated* HTTP requests, and read the responses," Mr. Ormandy also explained. "This allows an attacker to read cookies, email, interact with online banking and so on."

If you have SafeZone installed on your PC, you're doomed, since the malicious link can be opened in other browsers, and work regardless.

This entire situation is extremely funny and tragic at the same time.

Users that purchased an antivirus to bolster their security are practically being delivered a live backdoor, even if they wanted it or not.

Ormandy told Avast about their problem on December 18, and ten days later, the company issued a quick fix that prevented this issue from being exploited. The latest version of the Avast antivirus released on February 3 included a complete fix for this issue.

The Google researcher blamed this entire fiasco on Avast decision to overwrite a security feature inside the default Chromium setup. This feature allowed only WebSafe URLs to be opened via command-line instructions (like the malicious ones sent to the open RPC endpoint).

In Chromium, users would only be allowed to open links from the command line if the URL started with http, https, javascript, data, etc.. In SafeZone, attackers could also launch links that started with "file://" which is the URL naming scheme used to access local files.

As an advice to all antivirus makers that create their own "secure browsers:" Leave Chromium's security features alone!

Accessing this URL will tell you if you have a vulnerable version of the SafeZone browser installed on your PC.

And yet another case of forking Chromium for "security" because of your virus expertise. Seriously, you're going to screw it up. — Tavis Ormandy (@taviso) February 3, 2016
 
C

Crystal_Lake_Camper

I wonder what the avast fanboys will have to say about this on their precious AVAST forums? but its nice to see that someone takes the time and trouble , to uncover bugs in programs regarded as being safe! I guess its hard to trust the safety of any program :(
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Terrible because Chrome version itself is already capable to protect against nasty vulnerabilities; as its undergone proper testing. The problem arise is the modification where the components may add are yet prone on attacks without proper study.

They should learn that AV can create vulnerabilities on which even though the expectation must be secure however they tend to revise little and instead add more features.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top