UPDATE, 5:45 PDT: Unity Technologies said it had identified the codepaths leading to the vulnerabilities and that it planned to release fixes on Friday. "Updates about progress on the release will be posted to our blog," the company said. It's main blog is here.
A researcher is warning that a gaming plug-in installed on over 200 million PCs contains a flaw that could let attackers steal users' data from websites they're logged into, such as their Web mail and social networking accounts.
The technology in question, from Unity Technologies, is used by hundreds of thousands of developers to create online games and other interactive 3D content. The flaw, which the researcher says hasn't been patched yet, is located in the Unity Web Player, a plug-in that needs to be installed inside browsers in order to display Unity-based Web apps.
Unity Technologies, based in San Francisco, didn't immediately respond to a request for comment.
The Unity engine allows developers to create 3D content that will work across a variety of mobile, desktop and gaming platforms, including in browsers such as Firefox, Chrome, Internet Explorer, Safari and Opera. The technology is popular with online game developers and is even endorsed by Facebook, which offers a software development kit for integrating Unity-based games with Facebook features.
According to Unity Technologies, the Unity Web Player was installed on over 200 million computers as of March 2013. The company says it serves over 700,000 monthly active developers, ranging from large publishers to hobbyists, and that it "touches" 600 million gamers all over the world through games made using its engine.
This week, Finnish security researcher Jouko Pynnönen reported finding a way to bypass the cross-domain policy enforced by the plug-in to access other websites with the credentials of the active browser user.
The cross-domain policy is normally supposed to prevent a Unity-based Web application loaded from a particular domain name from accessing resources from other domains, Pynnönen said Tuesday in a blog post.
However, the researcher found a vulnerability that allows a malicious app to trick the player into allowing requests to be made to third-party websites.
He created a proof-of-concept Unity app that, when loaded by the browser plug-in, accesses the user's Gmail account if he has an active Gmail session and sends his emails back to the attacker.
The same attack could be done against users logged into Facebook or any other website as long as they have the Unity Web Player installed.
"Depending on the web browser and its version, the plugin may or may not start directly without confirmation," the researcher said.
The attack will no longer work by default in the recent versions of Chrome, because starting with Chrome version 42, released in April, the browser no longer supports plug-ins based on the aging Netscape Plugin Application Programming Interface (NPAPI). There is currently a workaround to manually re-enable NPAPI plug-ins in Chrome, but it will only work for a few more months as Google plans to completely ban NPAPI plug-ins from Chrome later this year.
Sign up for Computerworld eNewsletters.