Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Dropbox Responds To Security Flap

After questions from a security researcher, Dropbox says that it opens links in uploaded documents in conjunction with the preview feature. Dropbox also is trying to address DDoS concerns.

9 Android Apps To Improve Security, Privacy
9 Android Apps To Improve Security, Privacy
(click image for larger view)
Why has Dropbox been following links in uploaded documents?

That question surfaced Thursday after a security researcher found that links inside documents that he uploaded to the file-sharing service had been accessed. "I had the opportunity recently to beta-test HoneyDocs.com, a Web app that generates documents that can 'buzz home,'" wrote Daniel McCauley Thursday on WNC InfoSec Blog. "This is done by a unique embedded GET request that is initiated when the generated document has been opened."

The first "phone home" operation occurred just 10 minutes after McCauley uploaded a Zip file that contained a "sting" .doc file generated by HoneyDocs. The link-accessing activity traced to an IP address that appeared to be an Amazon EC-2 instance in Seattle, which listed "LibreOffice" in the HTTP user-agent header. "All in all, I made three attempts to upload embedded documents and all appeared to be opened from different Amazon instances," McCauley said, noting that the Dropbox infrastructure is also built to use Amazon S3 buckets.

It's well-known that Dropbox generates a checksum of uploaded files to allow the service to identify duplicates, so it only needs to store a single copy. But why would it be touching links inside those documents? "Several use cases came to mind, but I was most interested in seeing if my cloud storage services were manipulating my files in a way that I may not have been aware of," McCauley said.

[ Is coverage of the NSA's reach into private data overblown? Read The NSA And Your Cloud Data: Navigating The Noise. ]

Dropbox, however, quickly dismissed any security concerns, saying it was simply generating previews of uploaded documents. "Dropbox allows people to open and preview files from their browser," a company spokeswoman said Monday via email. She noted that the external resource loading behavior that McCauley observed relates to backend processes that automatically create these document previews, making it easier for users to view docs within their Dropbox.

McCauley likewise got that message. "Dropbox views/opens certain file types in order to convert them to a compatible format so they are easily accessible via Web browser for its users," he said in a follow-up post. "This makes sense and is common practice for many cloud storage services to provide the convenience of browser access while not needing any additional software to open these documents."

Even so, news of the link-checking feature quickly spawned related discussions about how the functionality might have information security or privacy repercussions if abused by attackers. "Could Dropbox perhaps let me disable this feature?" asked "Helium" on the Hackers News Site. "I almost never use the Web interface so I wouldn't miss it and I prefer that my documents are not opened after being synched."

Marcus Carey, principal developer of ThreatAgent.com -- which offers HoneyDocs.com -- said the Dropbox previews might be abused, perhaps to create a distributed denial-of-service (DDoS) attack against Dropbox.

Dropbox downplayed that possibility, but has promised to explore alternative approaches. "We do use LibreOffice to render previews of Office documents for viewing in a browser, and have permitted external resource loading to make those previews as accurate as possible," said Dropbox security team lead Andrew Bortz on Friday on Hacker News. "While this could theoretically be used for DDoS, we haven't seen any such behavior. However, just to be extra cautious we've temporarily disabled external resource loading while we explore alternatives."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MohamedM0
50%
50%
MohamedM0,
User Rank: Apprentice
2/6/2014 | 9:01:10 AM
re: Dropbox Responds To Security Flap
Dropbox have a problem in security as i found 2 GB data for unknown person on my dropbox and i contacted them about this problem but help me about know the main reason for this case but they didn't answer me.
jemison288
50%
50%
jemison288,
User Rank: Apprentice
10/17/2013 | 4:11:06 PM
re: Dropbox Responds To Security Flap
Couldn't I just do this using TrueCrypt? And it still doesn't solve granularity in access problems, which I think is the core enterprise problem with Dropbox.
sconaty
50%
50%
sconaty,
User Rank: Apprentice
10/15/2013 | 8:09:38 PM
re: Dropbox Responds To Security Flap
If you want to add extra security to Dropbox then http://safeboxapp.com is worth considering. Safebox encrypts your content *before* it is synced to the cloud by Dropbox (disclaimer, I am on the Safebox development team). As a result Dropbox couldn't access your documents, even to create previews.
jemison288
50%
50%
jemison288,
User Rank: Apprentice
9/17/2013 | 1:53:49 AM
re: Dropbox Responds To Security Flap
The quick response is nice, but Dropbox really needs it--the past history isn't great (disabling auth for four hours; bad internal InfoSec with employees reusing passwords and storing customer information on Dropbox), and Dropbox is basically synonymous with "shadow IT" and all of the problems with the consumerization of IT.

Ultimately, Dropbox just wasn't built with InfoSec in mind, and certainly doesn't have the features that are necessary if you care about securing data in a shared environment. Anyone using Dropbox for confidential information is just asking for trouble.
Laurianne
50%
50%
Laurianne,
User Rank: Apprentice
9/16/2013 | 6:24:54 PM
re: Dropbox Responds To Security Flap
What do users think about Dropbox's response? Quicker than we might have seen from larger companies. Chime in please.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 4/7/2020
The Coronavirus & Cybersecurity: 3 Areas of Exploitation
Robert R. Ackerman Jr., Founder & Managing Director, Allegis Capital,  4/7/2020
'Unkillable' Android Malware App Continues to Infect Devices Worldwide
Jai Vijayan, Contributing Writer,  4/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18375
PUBLISHED: 2020-04-10
The ASG and ProxySG management consoles are susceptible to a session hijacking vulnerability. A remote attacker, with access to the appliance management interface, can hijack the session of a currently logged-in user and access the management console.
CVE-2019-18376
PUBLISHED: 2020-04-10
A CSRF token disclosure vulnerability allows a remote attacker, with access to an authenticated Management Center (MC) user's web browser history or a network device that intercepts/logs traffic to MC, to obtain CSRF tokens and use them to perform CSRF attacks against MC.
CVE-2019-7305
PUBLISHED: 2020-04-10
Information Exposure vulnerability in eXtplorer makes the /usr/ and /etc/extplorer/ system directories world-accessible over HTTP. Introduced in the Makefile patch file debian/patches/debian-changes-2.1.0b6+dfsg-1 or debian/patches/adds-a-makefile.patch, this can lead to data leakage, information di...
CVE-2020-8832
PUBLISHED: 2020-04-10
The fix for the Linux kernel in Ubuntu 18.04 LTS for CVE-2019-14615 ("The Linux kernel did not properly clear data structures on context switches for certain Intel graphics processors.") was discovered to be incomplete, meaning that in versions of the kernel before 4.15.0-91.92, an attacke...
CVE-2020-1633
PUBLISHED: 2020-04-09
Due to a new NDP proxy feature for EVPN leaf nodes introduced in Junos OS 17.4, crafted NDPv6 packets could transit a Junos device configured as a Broadband Network Gateway (BNG) and reach the EVPN leaf node, causing a stale MAC address entry. This could cause legitimate traffic to be discarded, lea...