Security issue in Website Optimizer - Real or Fake?

14 replies
I got this email from google this morning (well is it google).

I gotta say I am questioning it, but it is one of the best fake emails I have seen, but it gets better.

---------------
Security issue in Website Optimizer


Dear Website Optimizer user,

We are writing to inform you of a potential security issue with Website Optimizer. By exploiting a vulnerability in the Website Optimizer Control Script, an attacker might be able to execute malicious code on your site using a Cross-Site Scripting (XSS) attack. This attack can only take place if a website or browser has already been compromised by a separate attack. While the immediate probability of this attack is low, we urge you to take action to protect your site.
We have fixed the bug, and all new experiments are not susceptible. However, any experiments you are currently running need to be updated to fix the bug on your site. Additionally, if you have any Website Optimizer scripts from paused or stopped experiments created before December 3, 2010, you will need to remove or update that code as well.
There are two ways to update your code. You can either stop current experiments, remove the old scripts, and create a new experiment, or you can update the code on your site directly. We strongly recommend creating a new experiment as it is the simpler method.
Creating a New Experiment
1. Stop any currently running Website Optimizer experiments
2. Remove all the Website Optimizer scripts from your site
3. Create a new experiment as normal. New experiments are not vulnerable.
Updating the Website Optimizer Control Script Directly
1. Locate the Control Script on your site. It looks like this:
A/B Test Control Script
<!-- Google Website Optimizer Control Script -->
<script>
function utmx_section(){}function utmx(){}
(function(){var k='XXXXXXXXXX',d=document,l=d.location,c=d.cookie; function f(n){
if(c){var i=c.indexOf(n+'=');if(i>-1){var j=c.indexOf(';',i);return c.substring(i+n.
length+1,j
d.write('<sc'+'ript src="'+
'http'+(l.protocol=='https:'?'s://ssl':'://www')+'.google-analytics.com'
+'/siteopt.js?v=1&utmxkey='+k+'&utmx='+(x?x:'')+'&utm xx='+(xx?xx:'')+'&utmxtime='
+new Date().valueOf()+(h?'&utmxhash='+escape(h.substr(1 )):'')+
'" type="text/javascript" charset="utf-8"></sc'+'ript>')})();
</script><script>utmx("url",'A/B');</script>
<!-- End of Google Website Optimizer Control Script -->
Multivariate Test Control Script
<!-- Google Website Optimizer Control Script -->
<script>
function utmx_section(){}function utmx(){}
(function(){var k='XXXXXXXXXX',d=document,l=d.location,c=d.cookie; function f(n){
if(c){var i=c.indexOf(n+'=');if(i>-1){var j=c.indexOf(';',i);return c.substring(i+n.
length+1,j<0?c.length:j) } var x=f('__utmx'),xx=f('__utmxx'),h=l.hash;
d.write('<sc'+'ript src="'+
'http'+(l.protocol=='https:'?'s://ssl':'://www')+'.google-analytics.com'
+'/siteopt.js?v=1&utmxkey='+k+'&utmx='+(x?x:'')+'&utm xx='+(xx?xx:'')+'&utmxtime='
+new Date().valueOf()+(h?'&utmxhash='+escape(h.substr(1 )):'')+
'" type="text/javascript" charset="utf-8"></sc'+'ript>')})();
</script>
<!-- End of Google Website Optimizer Control Script -->
2. Locate the following in the Control Script: return c.substring(...
3. Modify the following line as shown:
BEFORE: return c.substring(i+n.length+1,j<0?c.length:j)
FIXED: return escape(c.substring(i+n.length+1,j<0?c.length:j))
Make sure to include the final closing parenthesis ")"
Fixed A/B Control Script
<!-- Google Website Optimizer Control Script -->
<script>
function utmx_section(){}function utmx(){} (function(){var k='XXXXXXXXXX',d=document,l=d.location,c=d.cookie; function f(n){ if(c){var i=c.indexOf(n+'=');if(i>-1){var j=c.indexOf(';',i);
return escape(c.substring(i+n.length+1,j<0?c.length:j)) } } }
var x=f('__utmx'),xx=f('__utmxx'),h=l.hash; d.write('<sc'+'ript src="'+
'http'+(l.protocol=='https:'?'s://ssl':'://www')+'.google-analytics.com'
+'/siteopt.js?v=1&utmxkey='+k+'&utmx='+(x?x:'')+'&utm xx='+(xx?xx:'')+'&utmxtime='
+new Date().valueOf()+(h?'&utmxhash='+escape(h.substr(1 )):'')+
'" type="text/javascript" charset="utf-8"></sc'+'ript>')})();
</script><script>utmx("url",'A/B');
</script>
<!-- End of Google Website Optimizer Control Script -->
Fixed Multivariate Control Script
<!-- Google Website Optimizer Control Script -->
<script>
function utmx_section(){}function utmx(){}
(function(){var k='XXXXXXXXXX',d=document,l=d.location,c=d.cookie; function f(n){
if(c){var i=c.indexOf(n+'=');if(i>-1){var j=c.indexOf(';',i);
return escape(c.substring(i+n.length+1,j<0?c.length:j)) } } }
var x=f('__utmx'),xx=f('__utmxx'),h=l.hash; d.write('<sc'+'ript src="'+
'http'+(l.protocol=='https:'?'s://ssl':'://www')+'.google-analytics.com'
+'/siteopt.js?v=1&utmxkey='+k+'&utmx='+(x?x:'')+'&utm xx='+(xx?xx:'')+'&utmxtime='
+new Date().valueOf()+(h?'&utmxhash='+escape(h.substr(1 )):'')+
'" type="text/javascript" charset="utf-8"></sc'+'ript>')})();
</script>
<!-- End of Google Website Optimizer Control Script -->
Note that the k=XXXXXXXXX line in the above Control Script examples is a placeholder.
Your experiment will continue as normal after you've made this update. There's no need to pause or restart the experiment.
We're committed to keeping Website Optimizer secure, and we're deeply sorry for this issue. We will continue to work hard to prevent future vulnerabilities.

Sincerely,
Trevor
Google Website Optimizer Team

----------------------------

I google it to see if its real and a # of sites are saying it is real
"Security issue in Website Optimizer" - Google Search

hhmmm....I think that whoever behind this also knows people will do that and has dominated google search before others post.

Is it real or not real? I am not sure, but I would think other warriors have got it as well.

Cheers,
Mukul
#fake #issue #optimizer #real #security #website
  • {{ DiscussionBoard.errors[2977484].message }}
  • Profile picture of the author Mukul Verma
    Not to self, read other posts....

    I hope we get some responses on it since I dont think we are alone
    {{ DiscussionBoard.errors[2977519].message }}
    • Profile picture of the author NoOne1
      Found this forum through a Google search regarding the same email, which I also received.

      But, one thing stands out - the email I received and the one noted above uses the term Website Optimi
      zer with a Z, but the one pasted by WillR uses an S:

      Security Issue in Website Optimiser

      Dear Website Optimiser user,

      We are writing to inform you of a potential security issue with Website Optimiser. By exploiting a vulnerability in the Website Optimiser Control Script, an attacker might be able to execute malicious code on your site using a Cross-Site Scripting (XSS) attack. This attack can only take place if a website or browser has already been compromised by a separate attack. While the immediate probability of this attack is low, we urge you to take action to protect your site.

      Just seems odd.......why wouldn't ALL emails be EXACTLY the same?? And are all the scripts the same?
      {{ DiscussionBoard.errors[2977930].message }}
  • Profile picture of the author Caleb Spilchen
    I got it with a Z in it.

    Security issue in Website Optimizer
    <img alt="Google Website Optimizer" align="right" width="232" height="30"> Dear Website Optimizer user,
    We are writing to inform you of a potential security issue with Website Optimizer. By exploiting a vulnerability in the Website Optimizer Control Script, an attacker might be able to execute malicious code on your site using a Cross-Site Scripting (XSS) attack. This attack can only take place if a website or browser has already been compromised by a separate attack. While the immediate probability of this attack is low, we urge you to take action to protect your site.
    We have fixed the bug, and all new experiments are not susceptible. However, any experiments you are currently running need to be updated to fix the bug on your site. Additionally, if you have any Website Optimizer scripts from paused or stopped experiments created before December 3, 2010, you will need to remove or update that code as well.
    There are two ways to update your code. You can either stop current experiments, remove the old scripts, and create a new experiment, or you can update the code on your site directly. We strongly recommend creating a new experiment as it is the simpler method.
    Creating a New Experiment
    1. Stop any currently running Website Optimizer experiments
    2. Remove all the Website Optimizer scripts from your site
    3. Create a new experiment as normal. New experiments are not vulnerable.
    Updating the Website Optimizer Control Script Directly

    1. Locate the Control Script on your site. It looks like this:
    A/B Test Control Script
    <!-- Google Website Optimizer Control Script -->
    <script>
    function utmx_section(){}function utmx(){}
    (function(){var k='XXXXXXXXXX',d=document,l=d.location,c=d.cookie; function f(n){
    if(c){var i=c.indexOf(n+'=');if(i>-1){var j=c.indexOf(';',i);return c.substring(i+n.
    length+1,j<0?c.length:j) } var x=f('__utmx'),xx=f('__utmxx'),h=l.hash;
    d.write('<sc'+'ript src="'+
    'http'+(l.protocol=='https:'?'s://ssl':'://www')+'.google-analytics.com'
    +'/siteopt.js?v=1&utmxkey='+k+'&utmx='+(x?x:'')+'&utm xx='+(xx?xx:'')+'&utmxtime='
    +new Date().valueOf()+(h?'&utmxhash='+escape(h.substr(1 )):'')+
    '" type="text/javascript" charset="utf-8"></sc'+'ript>')})();
    </script><script>utmx("url",'A/B');</script>
    <!-- End of Google Website Optimizer Control Script -->
    Multivariate Test Control Script
    <!-- Google Website Optimizer Control Script -->
    <script>
    function utmx_section(){}function utmx(){}
    (function(){var k='XXXXXXXXXX',d=document,l=d.location,c=d.cookie; function f(n){
    if(c){var i=c.indexOf(n+'=');if(i>-1){var j=c.indexOf(';',i);return c.substring(i+n.
    length+1,j<0?c.length:j) } var x=f('__utmx'),xx=f('__utmxx'),h=l.hash;
    d.write('<sc'+'ript src="'+
    'http'+(l.protocol=='https:'?'s://ssl':'://www')+'.google-analytics.com'
    +'/siteopt.js?v=1&utmxkey='+k+'&utmx='+(x?x:'')+'&utm xx='+(xx?xx:'')+'&utmxtime='
    +new Date().valueOf()+(h?'&utmxhash='+escape(h.substr(1 )):'')+
    '" type="text/javascript" charset="utf-8"></sc'+'ript>')})();
    </script>
    <!-- End of Google Website Optimizer Control Script -->
    1. Locate the following in the Control Script: return c.substring(...
    2. Modify the following line as shown:
      BEFORE: return c.substring(i+n.length+1,j<0?c.length:j)
      FIXED: return escape(c.substring(i+n.length+1,j<0?c.length:j))
      Make sure to include the final closing parenthesis “)”
    Fixed A/B Control Script
    <!-- Google Website Optimizer Control Script -->
    <script>
    function utmx_section(){}function utmx(){} (function(){var k='XXXXXXXXXX',d=document,l=d.location,c=d.cookie; function f(n){ if(c){var i=c.indexOf(n+'=');if(i>-1){var j=c.indexOf(';',i);
    return escape(c.substring(i+n.length+1,j<0?c.length:j)) }
    var x=f('__utmx'),xx=f('__utmxx'),h=l.hash; d.write('<sc'+'ript src="'+
    'http'+(l.protocol=='https:'?'s://ssl':'://www')+'.google-analytics.com'
    +'/siteopt.js?v=1&utmxkey='+k+'&utmx='+(x?x:'')+'&utm xx='+(xx?xx:'')+'&utmxtime='
    +new Date().valueOf()+(h?'&utmxhash='+escape(h.substr(1 )):'')+
    '" type="text/javascript" charset="utf-8"></sc'+'ript>')})();
    </script><script>utmx("url",'A/B');
    </script>
    <!-- End of Google Website Optimizer Control Script -->
    Fixed Multivariate Control Script
    <!-- Google Website Optimizer Control Script -->
    <script>
    function utmx_section(){}function utmx(){}
    (function(){var k='XXXXXXXXXX',d=document,l=d.location,c=d.cookie; function f(n){
    if(c){var i=c.indexOf(n+'=');if(i>-1){var j=c.indexOf(';',i);
    return escape(c.substring(i+n.length+1,j<0?c.length:j)) }
    var x=f('__utmx'),xx=f('__utmxx'),h=l.hash; d.write('<sc'+'ript src="'+
    'http'+(l.protocol=='https:'?'s://ssl':'://www')+'.google-analytics.com'
    +'/siteopt.js?v=1&utmxkey='+k+'&utmx='+(x?x:'')+'&utm xx='+(xx?xx:'')+'&utmxtime='
    +new Date().valueOf()+(h?'&utmxhash='+escape(h.substr(1 )):'')+
    '" type="text/javascript" charset="utf-8"></sc'+'ript>')})();
    </script>
    <!-- End of Google Website Optimizer Control Script -->
    Note that the k=XXXXXXXXX line in the above Control Script examples is a placeholder.
    Your experiment will continue as normal after you’ve made this update. There’s no need to pause or restart the experiment.
    We’re committed to keeping Website Optimizer secure, and we’re deeply sorry for this issue. We will continue to work hard to prevent future vulnerabilities.

    Sincerely,
    Trevor
    Google Website Optimizer Team






    Signature

    Canadian Expat Living in Medellin, Colombia

    {{ DiscussionBoard.errors[2977959].message }}
  • Profile picture of the author Caleb Spilchen
    Note that the e-mail is actually encoded in base64. View original in GMAIL.
    Signature

    Canadian Expat Living in Medellin, Colombia

    {{ DiscussionBoard.errors[2977971].message }}
  • {{ DiscussionBoard.errors[2978025].message }}
  • Profile picture of the author Caleb Spilchen
    Official Google Website Optimizer Blog

    And youd think they would have a blog post about it as well.
    Signature

    Canadian Expat Living in Medellin, Colombia

    {{ DiscussionBoard.errors[2978102].message }}
  • Profile picture of the author Bane
    Actually, the descrepancy could be cause by geotargetting on their end.

    If you live in US, you get a Z, if you live in england, you get an S.

    Google have been doing that with all their mails for a long time now, and if anything causes me to suspect this is legit as opposed to fake.
    {{ DiscussionBoard.errors[2978322].message }}
  • Profile picture of the author newayexpress
    I also have one. Becareful...
    {{ DiscussionBoard.errors[2978476].message }}

Trending Topics