Risk
9/16/2013
01:04 PM
Connect Directly
RSS
E-Mail
50%
50%

Dropbox Responds To Security Flap

After questions from a security researcher, Dropbox says that it opens links in uploaded documents in conjunction with the preview feature. Dropbox also is trying to address DDoS concerns.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
Why has Dropbox been following links in uploaded documents?

That question surfaced Thursday after a security researcher found that links inside documents that he uploaded to the file-sharing service had been accessed. "I had the opportunity recently to beta-test HoneyDocs.com, a Web app that generates documents that can 'buzz home,'" wrote Daniel McCauley Thursday on WNC InfoSec Blog. "This is done by a unique embedded GET request that is initiated when the generated document has been opened."

The first "phone home" operation occurred just 10 minutes after McCauley uploaded a Zip file that contained a "sting" .doc file generated by HoneyDocs. The link-accessing activity traced to an IP address that appeared to be an Amazon EC-2 instance in Seattle, which listed "LibreOffice" in the HTTP user-agent header. "All in all, I made three attempts to upload embedded documents and all appeared to be opened from different Amazon instances," McCauley said, noting that the Dropbox infrastructure is also built to use Amazon S3 buckets.

It's well-known that Dropbox generates a checksum of uploaded files to allow the service to identify duplicates, so it only needs to store a single copy. But why would it be touching links inside those documents? "Several use cases came to mind, but I was most interested in seeing if my cloud storage services were manipulating my files in a way that I may not have been aware of," McCauley said.

[ Is coverage of the NSA's reach into private data overblown? Read The NSA And Your Cloud Data: Navigating The Noise. ]

Dropbox, however, quickly dismissed any security concerns, saying it was simply generating previews of uploaded documents. "Dropbox allows people to open and preview files from their browser," a company spokeswoman said Monday via email. She noted that the external resource loading behavior that McCauley observed relates to backend processes that automatically create these document previews, making it easier for users to view docs within their Dropbox.

McCauley likewise got that message. "Dropbox views/opens certain file types in order to convert them to a compatible format so they are easily accessible via Web browser for its users," he said in a follow-up post. "This makes sense and is common practice for many cloud storage services to provide the convenience of browser access while not needing any additional software to open these documents."

Even so, news of the link-checking feature quickly spawned related discussions about how the functionality might have information security or privacy repercussions if abused by attackers. "Could Dropbox perhaps let me disable this feature?" asked "Helium" on the Hackers News Site. "I almost never use the Web interface so I wouldn't miss it and I prefer that my documents are not opened after being synched."

Marcus Carey, principal developer of ThreatAgent.com -- which offers HoneyDocs.com -- said the Dropbox previews might be abused, perhaps to create a distributed denial-of-service (DDoS) attack against Dropbox.

Dropbox downplayed that possibility, but has promised to explore alternative approaches. "We do use LibreOffice to render previews of Office documents for viewing in a browser, and have permitted external resource loading to make those previews as accurate as possible," said Dropbox security team lead Andrew Bortz on Friday on Hacker News. "While this could theoretically be used for DDoS, we haven't seen any such behavior. However, just to be extra cautious we've temporarily disabled external resource loading while we explore alternatives."

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Laurianne
50%
50%
Laurianne,
User Rank: Apprentice
9/16/2013 | 6:24:54 PM
re: Dropbox Responds To Security Flap
What do users think about Dropbox's response? Quicker than we might have seen from larger companies. Chime in please.
jemison288
50%
50%
jemison288,
User Rank: Apprentice
9/17/2013 | 1:53:49 AM
re: Dropbox Responds To Security Flap
The quick response is nice, but Dropbox really needs it--the past history isn't great (disabling auth for four hours; bad internal InfoSec with employees reusing passwords and storing customer information on Dropbox), and Dropbox is basically synonymous with "shadow IT" and all of the problems with the consumerization of IT.

Ultimately, Dropbox just wasn't built with InfoSec in mind, and certainly doesn't have the features that are necessary if you care about securing data in a shared environment. Anyone using Dropbox for confidential information is just asking for trouble.
sconaty
50%
50%
sconaty,
User Rank: Apprentice
10/15/2013 | 8:09:38 PM
re: Dropbox Responds To Security Flap
If you want to add extra security to Dropbox then http://safeboxapp.com is worth considering. Safebox encrypts your content *before* it is synced to the cloud by Dropbox (disclaimer, I am on the Safebox development team). As a result Dropbox couldn't access your documents, even to create previews.
jemison288
50%
50%
jemison288,
User Rank: Apprentice
10/17/2013 | 4:11:06 PM
re: Dropbox Responds To Security Flap
Couldn't I just do this using TrueCrypt? And it still doesn't solve granularity in access problems, which I think is the core enterprise problem with Dropbox.
MohamedM0
50%
50%
MohamedM0,
User Rank: Apprentice
2/6/2014 | 9:01:10 AM
re: Dropbox Responds To Security Flap
Dropbox have a problem in security as i found 2 GB data for unknown person on my dropbox and i contacted them about this problem but help me about know the main reason for this case but they didn't answer me.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4725
Published: 2014-07-27
The MailPoet Newsletters (wysija-newsletters) plugin before 2.6.7 for WordPress allows remote attackers to bypass authentication and execute arbitrary PHP code by uploading a crafted theme using wp-admin/admin-post.php and accessing the theme in wp-content/uploads/wysija/themes/mailp/.

CVE-2014-4726
Published: 2014-07-27
Unspecified vulnerability in the MailPoet Newsletters (wysija-newsletters) plugin before 2.6.8 for WordPress has unspecified impact and attack vectors.

CVE-2014-2363
Published: 2014-07-26
Morpho Itemiser 3 8.17 has hardcoded administrative credentials, which makes it easier for remote attackers to obtain access via a login request.

CVE-2014-2625
Published: 2014-07-26
Directory traversal vulnerability in the storedNtxFile function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to read arbitrary files via crafted input, aka ZDI-CAN-2023.

CVE-2014-2626
Published: 2014-07-26
Directory traversal vulnerability in the toServerObject function in HP Network Virtualization 8.6 (aka Shunra Network Virtualization) allows remote attackers to create files, and consequently execute arbitrary code, via crafted input, aka ZDI-CAN-2024.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.