Researchers recently uncovered two unrelated vulnerabilities in Google products. Imperva found a way to perform a side-channel attack on Google Photos that lets bad actors glean key location, time, and identifying information from personal accounts. The other, found by Positive Technologies, is a more dangerous Android exploit. It also exposes user data, and Google ranked its severity as “High.”
Because Google’s products are so popular, vulnerabilities such as these have the potential to impact hundreds of millions of users. Google Photos had over 500 million users as of May 2017. Android, meanwhile, powers over 2 billion devices, although the affected number is likely smaller, as the security vulnerability in question was introduced in Android 4.4 KitKat.
Who, where, and when in Google Photos
The vulnerability found in the web version of Google Photos could expose users’ location over time, as well as who they were with when photos were taken. Imperva’s Ron Masas penned a blog post detailing the issue and how he found it.
Google Photos uses metadata from your images, along with Google-powered machine learning like facial recognition, to generate a treasure trove of information. For example, it can recognize your son’s face in a photo and automatically tag him in every image in which he appears, even as he grows and changes over the years — whether he’s smiling, frowning, or not even directly facing the camera. Shots you take with your phone are tagged with precise geographical location information. If you upload additional photos taken with a DSLR that doesn’t geotag images automatically, the engine is still able to make an educated guess as to the location based on context.
From there, he was able to determine the time it took the service to perform a search query that returned zero results. When he performed a search that took any amount of time over the baseline, he knew Google Photos was returning results of some kind. With a certain level of access, a bad actor can throw searches at your Google Photos account and use the timing to learn which terms return a result.
WebView at fault
Positive Technologies said in a press release that the vulnerability (CVE-2019-5765) it found affects Android 4.4 and later, and the WebView component is to blame. On its developer site, Google explains that “WebView is useful when you need increased control over the UI and advanced configuration options that will allow you to embed web pages in a specially designed environment for your app.” WebView is fundamental to Android’s Instant Apps, a feature that essentially lets you try out an app on your phone without having to download the whole thing.
Because WebView is part of the Chromium engine, Positive Technologies said that any Chromium-based browser is vulnerable. Google Chrome is more popular, but the Samsung Internet Browser and Yandex Browser are affected as well.
Positive Technologies’ Leigh-Anne Galloway described how an attack could work: “The most obvious attack scenario involves little-known third-party applications. After an update containing a malicious payload, such applications could read information from WebView.” She said that attackers would then have access to users’ browser history, authentication tokens, headers, and more.
The Google Photos vulnerability has already been patched. A simple Chrome browser update should abate any threat from the WebView issue for those using Android 7.0 or higher, because the bug was patched in Chrome 72 (released in January). Users running earlier versions of Android will have to update WebView via Google Play. Positive Technologies said that absent Google Play on a given device, users need to get a WebView update directly from the device manufacturer.