Java Security Feature FAIL: Researcher Bypasses Java Sandbox, Security Settings

  /     /     /  
Publicated : 22/11/2024   Category : security


Java Security Feature FAIL: Researcher Bypasses Java Sandbox, Security Settings


High and Very High Java security settings wont stop attacks, researcher says



Zero-day bugs in Java have been coming fast and furious lately. In the latest twist, a researcher says he was able to cheat built-in security features in Java applications.
Adam Gowdiak, founder and CEO of Security Explorations in Poland, has alerted Oracle that he and his team found security holes that could allow an attacker to both escape Javas sandboxing protection and cheat the highest security settings in the application.
His
discovery of new flaws
in the software -- which could allow an attacker to bypass Javas security features in the High and Very High security settings -- basically shot down Oracles
recent recommendations
to use those settings to
avert a zero-day attack
that began earlier this month.
Oracle issued a security update for the CVE-2013-0422 vulnerability that included a change in Javas Security Level setting from Medium to High so users would be prompted before allowing an unsigned Java applet to run.
But the newest Java bug can be exploited to cheat those security settings altogether. Regardless of the new security level configured by the user ... the new bug could be used to execute untrusted Java applications on the machine, Gowdiak says. Only users with Java plug-ins enabled in their browsers are at risk, he says.
[Most enterprises might be stuck with Java, but there are ways to reduce the effectiveness of recent and future zero-day exploits. See
Tech Insight: 5 Approaches To Decaffeinating Java Exploits
.]
The researcher wont publicly reveal details on the specific vulnerabilities he discovered, but he says the only way to protect systems from these and other Java-borne attacks is to disable the application or employ the click-to-play feature found in some browsers that lets you pick and choose where you can run Java as needed.
At the moment, disabling Java or relying on the so called click-to-play feature implemented by several Web browsers seems to be the only solution that could help mitigate Java-based attacks, Gowdiak told
Dark Reading
.
He revealed earlier this month
that he could bypass the sandbox security feature in Java
that runs untrusted code in isolation in the newest version of the software, Java 7 Update 11 and Java Runtime Environment Version 1.7.0_11-b21. He found two new bugs and provided Oracle proof-of-concept code on how they could be abused to escape the sandbox.
It was only a matter of time before another sandbox escape was identified in the Java Runtime. Although there is no doubt that 7u11 patch was incomplete, we have to keep in mind that it was released under duress and did help with the immediate problem of consumers being compromised, says HD Moore, CTO at Rapid7 and creator of Metasploit.
While the obvious targets are the Java plug-ins used in Web browsers, any Java application that uses the Java Runtime Environment (JRE) could suffer the sandbox bypass attack. We have demonstrated the vulnerability in the context of Java Plugin and the so-called Java Applet application run in the Web browser, Gowdiak says. However, any Java app relying on the vulnerable Java Runtime Environment might be vulnerable to it as long as the attacker finds its way to run its code inside a vulnerable Java environment.
An attacker could run malware in the Java environment and gain remote control of the users Java Web application, he says.
Rapid7s Moore says it seems Oracles efforts to shore up security didnt end up helping much. It sounds like they put a lot of effort into all-new security settings, but it really didnt make much difference security-wise, he says. The only folks making a difference here are the browser [vendors]. They are detecting actual [Java] attacks in the wild, Moore says.
George Tubin, a security strategist at Trusteer, says Java exploits will continue to be a problem. And short-term fixes arent the answer.
We have to get away from this back-and-forth reactive game. The way software is, youre going to find vulnerabilities, and youre not going to find a way to eliminate them, even when vulns are patched, Tubin says.
Oracle was not available for comment at the time of this posting.
So can Oracle rebound with a more secure Java? Gowdiak says the wave of vulnerabilities and other security issues with Java revealed during the past few months demonstrate problems with Oracles security processes. He says multiple bugs were introduced into Java 7, and its patch-testing process appears to be flawed.
The companys analysis of security issues as well as its patch-testing processes are not thorough enough: There are cases of bugs being found in the same code as previously patched issues or bugs that are not fixed properly, he says. The number of bugs discovered in new features introduced into Java 7 indicate that these features were not [likely] subject to any security review.
Have a comment on this story? Please click Add Your Comment below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ Car Sector Speeds Up In Security. ◂
Discovered: 23/12/2024
Category: security

▸ Making use of a homemade Android army ◂
Discovered: 23/12/2024
Category: security

▸ CryptoWall is more widespread but less lucrative than CryptoLocker. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Java Security Feature FAIL: Researcher Bypasses Java Sandbox, Security Settings