Risk
9/16/2013
01:04 PM
50%
50%

Dropbox Responds To Security Flap

After questions from a security researcher, Dropbox says that it opens links in uploaded documents in conjunction with the preview feature. Dropbox also is trying to address DDoS concerns.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
Why has Dropbox been following links in uploaded documents?

That question surfaced Thursday after a security researcher found that links inside documents that he uploaded to the file-sharing service had been accessed. "I had the opportunity recently to beta-test HoneyDocs.com, a Web app that generates documents that can 'buzz home,'" wrote Daniel McCauley Thursday on WNC InfoSec Blog. "This is done by a unique embedded GET request that is initiated when the generated document has been opened."

The first "phone home" operation occurred just 10 minutes after McCauley uploaded a Zip file that contained a "sting" .doc file generated by HoneyDocs. The link-accessing activity traced to an IP address that appeared to be an Amazon EC-2 instance in Seattle, which listed "LibreOffice" in the HTTP user-agent header. "All in all, I made three attempts to upload embedded documents and all appeared to be opened from different Amazon instances," McCauley said, noting that the Dropbox infrastructure is also built to use Amazon S3 buckets.

It's well-known that Dropbox generates a checksum of uploaded files to allow the service to identify duplicates, so it only needs to store a single copy. But why would it be touching links inside those documents? "Several use cases came to mind, but I was most interested in seeing if my cloud storage services were manipulating my files in a way that I may not have been aware of," McCauley said.

[ Is coverage of the NSA's reach into private data overblown? Read The NSA And Your Cloud Data: Navigating The Noise. ]

Dropbox, however, quickly dismissed any security concerns, saying it was simply generating previews of uploaded documents. "Dropbox allows people to open and preview files from their browser," a company spokeswoman said Monday via email. She noted that the external resource loading behavior that McCauley observed relates to backend processes that automatically create these document previews, making it easier for users to view docs within their Dropbox.

McCauley likewise got that message. "Dropbox views/opens certain file types in order to convert them to a compatible format so they are easily accessible via Web browser for its users," he said in a follow-up post. "This makes sense and is common practice for many cloud storage services to provide the convenience of browser access while not needing any additional software to open these documents."

Even so, news of the link-checking feature quickly spawned related discussions about how the functionality might have information security or privacy repercussions if abused by attackers. "Could Dropbox perhaps let me disable this feature?" asked "Helium" on the Hackers News Site. "I almost never use the Web interface so I wouldn't miss it and I prefer that my documents are not opened after being synched."

Marcus Carey, principal developer of ThreatAgent.com -- which offers HoneyDocs.com -- said the Dropbox previews might be abused, perhaps to create a distributed denial-of-service (DDoS) attack against Dropbox.

Dropbox downplayed that possibility, but has promised to explore alternative approaches. "We do use LibreOffice to render previews of Office documents for viewing in a browser, and have permitted external resource loading to make those previews as accurate as possible," said Dropbox security team lead Andrew Bortz on Friday on Hacker News. "While this could theoretically be used for DDoS, we haven't seen any such behavior. However, just to be extra cautious we've temporarily disabled external resource loading while we explore alternatives."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MohamedM0
50%
50%
MohamedM0,
User Rank: Apprentice
2/6/2014 | 9:01:10 AM
re: Dropbox Responds To Security Flap
Dropbox have a problem in security as i found 2 GB data for unknown person on my dropbox and i contacted them about this problem but help me about know the main reason for this case but they didn't answer me.
jemison288
50%
50%
jemison288,
User Rank: Apprentice
10/17/2013 | 4:11:06 PM
re: Dropbox Responds To Security Flap
Couldn't I just do this using TrueCrypt? And it still doesn't solve granularity in access problems, which I think is the core enterprise problem with Dropbox.
sconaty
50%
50%
sconaty,
User Rank: Apprentice
10/15/2013 | 8:09:38 PM
re: Dropbox Responds To Security Flap
If you want to add extra security to Dropbox then http://safeboxapp.com is worth considering. Safebox encrypts your content *before* it is synced to the cloud by Dropbox (disclaimer, I am on the Safebox development team). As a result Dropbox couldn't access your documents, even to create previews.
jemison288
50%
50%
jemison288,
User Rank: Apprentice
9/17/2013 | 1:53:49 AM
re: Dropbox Responds To Security Flap
The quick response is nice, but Dropbox really needs it--the past history isn't great (disabling auth for four hours; bad internal InfoSec with employees reusing passwords and storing customer information on Dropbox), and Dropbox is basically synonymous with "shadow IT" and all of the problems with the consumerization of IT.

Ultimately, Dropbox just wasn't built with InfoSec in mind, and certainly doesn't have the features that are necessary if you care about securing data in a shared environment. Anyone using Dropbox for confidential information is just asking for trouble.
Laurianne
50%
50%
Laurianne,
User Rank: Apprentice
9/16/2013 | 6:24:54 PM
re: Dropbox Responds To Security Flap
What do users think about Dropbox's response? Quicker than we might have seen from larger companies. Chime in please.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.