The latest target for the malware criminal element is those popular widget-driven applications, both desktop and browser-based, thanks to their explosion in popularity and relatively insecure model.

Security firm Finjan issued a recent report that found that widgets (or gadgets) are exposing computer users to a whole host of attacks because they were designed as these cool little innocuous applets without any real security model but have all the power of a full-blown app.

Worse, this vulnerability is not limited to Yahoo Widgets or the Windows Vista sidebar applets. Finjan also found sample exploit code to insert malicious widgets into Microsoft's and Google's iGoogle pages.

"It's an environment that's designed to look really cool and provide some basic functionality, but no one thought about basic security," said Istach Amit, director of security research at Finjan's malicious code research center. "There are inherent problems in the security model of those widget engines."

There's a lot of widgets out there. Finjan found 3,720 widgets available on, 3,197 on and 3,959 on The companies offer their own but they also host thousands of third-party widgets for users to install and there's no guarantee they will catch a widget with malicious code in it.

The problem is widgets are full-blown apps that the hosting environment, whether it's iGoogle or Yahoo Widgets, doesn't take into account and they should be restricted or scrutinized a lot more than they are now, said Amit. "They should not access the file system or access the network if they do not need to," he said.

Already Microsoft and Yahoo have had to make fixes to their widgets and Google is also updating its Desktop and portal pages. Microsoft had to fix the Vista Sidebar after Finjan found a vulnerability in the contacts widget. It also had to fix a problem in the RSS reader used on

Finjan also found a problem in Yahoo Widgets Contacts and one in iGoogle that installed itself without user approval or knowledge. It could then access their contents, GMail mailbox and browser history. Yahoo was unavailable for comment, while Google said this:

"Javascript is a supported part of Google Gadgets, which many developers use to provide unique functionality to users. We recognize the potential for misuse of this feature and we mitigate this risk by putting it in a domain of its own. This area of vulnerability research is a moving target and we are currently working to find innovative solutions to these problems. Google takes security issues very seriously and will respond swiftly to fix known security issues," said a Google spokesperson in a statement to

"They are fixing the vulnerability pretty quickly, but I can't say what they are doing with the security model. It's more than just fixing a widget that has been coded badly," Amit said.

It's a matter of following a World Wide Web Consortium (W3C) object model for security involving objects and widgets. Only two companies have embraced the W3C object model, according to Amit: Apple and Opera.

The Opera browser uses the W3C widget policy on security and policies. Firefox and Microsoft's Internet Explorer don't have a widget environment so there is no comparison, although in its most recent security report, Symantec found that browser plug-ins are also becoming popular malware targets.

This article was first published on To read the full article, click here.