Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Hackers Find Use for Google Code Search 176

An anonymous reader wrote in to say that "Google has inadvertently given online attackers a new tool. The company's new source-code search engine, unveiled Thursday as a tool to help simplify life for developers, can also be misused to search for software bugs, password information and even proprietary code that shouldn't have been posted to the Internet, security experts said Friday. "
This discussion has been archived. No new comments can be posted.

Hackers Find Use for Google Code Search

Comments Filter:
  • by strider44 ( 650833 ) on Sunday October 08, 2006 @09:27AM (#16354429)
    Isn't the point of open source that anyone can fix the programs? If it can be used by attackers it can also be used by developers. This is a pretty pointless article anyway as it's not that easy to find security holes in programs - if it was that easy then the developers would have patched up the holes already.
  • OMG!!! (Score:2, Insightful)

    by Anonymous Coward on Sunday October 08, 2006 @09:28AM (#16354435)
    Tools can be used for evil purposes! News at 11!
  • by c0l0 ( 826165 ) on Sunday October 08, 2006 @09:37AM (#16354471) Homepage
    only to those whose "security" in reality consists of not much - or even nothing - more than obscurity.
  • Re:OMG!!! (Score:2, Insightful)

    by Tsunayoshi ( 789351 ) <tsunayoshi&gmail,com> on Sunday October 08, 2006 @09:37AM (#16354473) Journal
    In other news...

    Experts say that by selling cars, car dealers are giving criminals a means to escape from the scene of a crime.
  • by zecg ( 521666 ) on Sunday October 08, 2006 @09:41AM (#16354487)
    How is searching for something misuse of the search engine? I'd say that the Internet was misused by those who made the information public in the first place.
  • by Bromskloss ( 750445 ) <auxiliary,address,for,privacy&gmail,com> on Sunday October 08, 2006 @09:45AM (#16354505)
    If you accidentally put something publicly available on a web page, it can be found, manually or by a search engine. This is really no different from how it has always been with text, images and anything else that you can put on the web.
  • evolution (Score:5, Insightful)

    by doti ( 966971 ) on Sunday October 08, 2006 @09:55AM (#16354555) Homepage
    I think previous posters got it wrong. They say the cracker access to the code is just as easy as anyone else's who can fix it. But a developer looks only for the code he's involved to, while the cracker is looking for any exploitable program. That, and although coders eventually search for security holes, he's goal is to build features. So, it indeed is making it easier for the crackers.

    Which is a good thing, if you realize bad environment also leads to evolution. More bugs exposed, the more developers will fix them, and maybe one day software designers will get it right, stop using insecure programming language, and write safer code.
  • by LaughingCoder ( 914424 ) on Sunday October 08, 2006 @10:08AM (#16354619)
    I know my way around code pretty well. While poring through some source code I discover a code snippet with a particular vulnerability that I can exploit. Now if only I had a way to see if this same snippet appeared in other applications. I guess I'll have to wait for Google to introduce a source code search mechanism before I can figure that out. Bummer.
  • by Bing Tsher E ( 943915 ) on Sunday October 08, 2006 @10:15AM (#16354649) Journal
    True but by making it easy for third-parties to search for this problematic code, it can hopefully be fixed and the original coders notified, before the faulty code is melded into the 'code infrastruture' deeply and in ways that make it more difficult to fix.

  • by v1 ( 525388 ) on Sunday October 08, 2006 @10:20AM (#16354665) Homepage Journal
    People need to stop blaming those that provide tools and research for their finding or their ability to find bugs and errors. It's not their fault. If you screw up and someone finds it, it's not their fault, it's yours. Take responsibility and deal with the consequences.

    The people that make the problems usually cry that the entire world needs to tell them about their mistakes in a nice quiet, private way, so they can silently fix them and avoid any unnecessary damage. The reality of this, as we have seen time and time again, is that when they are informed of these problems, so often they go ignored for months and months. And then the issue is finally leaked and they cry you didn't give us enough time! No, it was your fault to begin with, it doesn't matter if someone else made your mistake worse, none of this would have hapened without you screwing it up to begin with. This is how the world encourages you to try harder to get it right the first time instead of tossing us crap and fixing it later.

    In summary, anyone that fights against auditing tools clearly has a quality control or security issue they are unwilling to fix and are afraid to have exposed.

    (The whole model of "sell crap, fix later" is broken from the get-go. That's why we have crappy software hustled to the store in "version 1.0.0" form and have to beg the authors for bug fixes for the next half year. Problem is they already have your money, and that upgrade is free, so why should they pour resources into a 1.1 when there's no more money to be made? It's a losing proposition if you don't intend to release a paid 2.0 later, or if you think you can sucker them a second time)
  • by asylumx ( 881307 ) on Sunday October 08, 2006 @10:23AM (#16354675)
    From the summary:
    ...even proprietary code that shouldn't have been posted to the Internet...


    Seems to me that it's NOT necessarily open source. Besides, Open Source isn't a magic bullet. "You found a bug in my open source app so you should fix it and upload a patch"... wow what a cop-out answer. If you think that anyone who uses any open source app is also a software developer... and a good one at that... well, no wonder Linux isn't more popular.

    I agree that it'd be nice if this article were actually an article though...
  • by Dirtside ( 91468 ) on Sunday October 08, 2006 @10:32AM (#16354727) Journal
    Isn't the point of open source that anyone can fix the programs?

    That's one point. Another point is that if your company, for example, uses an open source application, you can hire someone to fix it instead of having to rely on the company that sells it.

    Yet another point is transparency -- being able to know WHAT the software is really doing, instead of having to trust the company that sells it.
  • I call this FUD (Score:5, Insightful)

    by Opportunist ( 166417 ) on Sunday October 08, 2006 @10:52AM (#16354873)
    Today's "hacks" mostly go for widely spread software. Why? Simple. For maximum impact. There are, of course, still targetted attacks, but those targets tend to be machines and nets of high interest for the hackers. If you use insecure software there, you earned that hack well.

    So the key target is to get access to as many machines as possible, to create spambots, to phish for information, in other words, the key target for attacks is the machine of the common man.

    Now, which approach would be more fruitful? To find a neat exploit, find out which software contains it and then match it against the software usually used by Joe Average? Or to do it reverse, find out what Joe uses and find exploits in that software?

    I think the recent revelation of buffer overflows in MS-Office and the Javascript exploit in the IE answers that question.
  • by Fordiman ( 689627 ) <fordiman @ g m a i l . com> on Sunday October 08, 2006 @11:06AM (#16354987) Homepage Journal
    "Never ever trust your fate to a black box when you are unaware of its contents" - the US Military.
  • by imroy ( 755 ) <imroykun@gmail.com> on Sunday October 08, 2006 @11:27AM (#16355125) Homepage Journal
    ...somebody posted a link to a result page that included a rather large number of php scripts that were vulnerable to SQL injections.

    And you're surprised? Go to any site trying to teach programming in PHP and you'll likely find tons of vulnerable code. There seem to be very few PHP "programmers" who actually know anything about programming, let alone security. Most just copy from others (who copied from someone else, ad nauseum) and tweak. It will be quite a while before the amount of "secure" PHP code out there on the internet reaches critical mass.

  • Re:evolution (Score:5, Insightful)

    by Tim C ( 15259 ) on Sunday October 08, 2006 @11:40AM (#16355201)
    stop using insecure programming language

    No language offers 100% security. Some offer features that are easy to misuse in such a way as to inadvertently introduce security holes, but there is no such thing as a "secure" programming language; bad/inexperienced coders will produce dross whatever language they use.
  • by DNS-and-BIND ( 461968 ) on Sunday October 08, 2006 @12:41PM (#16355603) Homepage
    Q: Why is beginning a comment in the Subject: line annoying?
  • by julesh ( 229690 ) on Sunday October 08, 2006 @01:24PM (#16355849)
    Oh, yeah. My current day-job is as a PHP+javascript programmer. I know the messes of code you see from a variety of sources. I've read the textbooks and see how they instruct beginners down the path to security failure at every turn. You're preaching to the choir.
  • by mooncaine ( 778422 ) on Sunday October 08, 2006 @01:52PM (#16356043) Journal
    About customer relations: I have heard it said that your most important customers are your current ones, so keep 'em happy, because they've already overcome the first hurdle between their money and your pocket: they decided to choose your product [or service] instead of another.

    If you keep them happy, they are more likely to be repeat customers than to shop elsewhere, I'm told, because shopping is, itself, a cost to them [time, effort, risk ...]. They'd rather stick with you if you're keeping them happy. Plus, of course, your product is satisfying them, so that's the main reason they'd stick around, right?

    Of course this depends a bit on the product... Music sellers know that music fans are fickle, and some businesses thrive on variety of choice [clothing?*], but software and computer gear vendors probably benefit more from maintaining current customers than marketing to find new ones to replace them.

    In the context of your company, then, this advice suggests that you should keep them happy and make the changes they want, if it seems cost effective, taking into account the potential cost of replacing that customer.

    In other words, it's not just the chance of referrals that make customers worth keeping. Even users whose needs are met can be pretty bitchy about software -- we can all relate to being angry at our tools -- so referrals might not be the best reason to value your current clients.

    But since they are more likely to buy again from you, and since you don't have to spend marketing dollars to get them to make that first purchase decision, they are valuable for those reasons.

    *I use the question mark because, as a computer geek and gearhead, I don't really know or care much about clothes.
  • by cdrguru ( 88047 ) on Sunday October 08, 2006 @04:00PM (#16357011) Homepage
    Hear, hear. You have probably stumbled across one of the true secrets of computer programming.

    It is hard work.

    Lots of people don't get that at all. Lots of management types assume that because person A wrote this code in a week that person B should be able to fix it in a week. Not true at all.

    Sometimes it takes person B a week (or a month) to figure out what in the heck person A was doing. Open source is not immune to this. Hiring someone that was not involved in the original development of some random open-source project of moderate complexity can be an exercise in training the person in the coding style and knowledge of the original developer. Having the source is not understanding the source, or even being able to fix problems in it. As a general rule, if you don't know what you are doing trying to "fix" something is far more likely to cause problems than it is to actually fix the original problem.
  • by 1110110001 ( 569602 ) <(slashdot-0904) (at) (nedt.at)> on Sunday October 08, 2006 @11:06PM (#16359631)
    Show me how to write clean HTML in Frontpage, because I already know how to write clean code in PHP. Otherwise all or none of the languages should be on the same level as Frontpage, because none of them are safe against stupid programmers.
  • by julesh ( 229690 ) on Monday October 09, 2006 @05:45AM (#16361837)
    Also, for a while now PHP's default configuration has been to add slashes to $_POST/etc input, so most of these scripts would be safe even if they are poorly written.

    Yeah. This works right until somebody asks "how do I get rid of all those \'s that turn up in stuff?" and the answer is "oh, disable magic_quotes_gpc." I've seen it happen before, and I'm sure it'll happen again. Relying on particular settings being enabled for security reasons in a disaster waiting to happen.

This restaurant was advertising breakfast any time. So I ordered french toast in the renaissance. - Steven Wright, comedian

Working...