HTTP: Google Apps URI Argument Injection

This signature detects attempts to exploit a known vulnerability in Google Apps. An attacker can create a malicious Web site with Web pages containing Google App URI's. If the Web page is accessed by a victim, it allows the attacker to execute arbitrary code on the victim's computer.

Extended Description

Google Apps is prone to a vulnerability that lets attackers inject commands through a protocol handler. This issue occurs because the application fails to adequately sanitize user-supplied input. Exploiting this issue would permit remote attackers to inject and execute commands with the privileges of a user running the application. An attacker can launch arbitrary applications from the local computer or an accessible network share. This issue is reported to affect Google Apps 1.1.110.6031 when used with Microsoft Internet Explorer 7 and Google Chrome 2.0.172.43

Affected Products

Google apps

Short Name
HTTP:STC:GOOGLE-APP-MAILTO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Apps Argument Google Injection URI bid:36581
Release Date
10/19/2009
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Google

Found a potential security threat?