what you don't know can hurt you

DropBox iOS / Android App File Theft

DropBox iOS / Android App File Theft
Posted Oct 20, 2012
Authored by Roi Saltzman

DropBox version 1.4.6 on iOS, 2.0.1 on Android, and Google Drive version 1.0.1 on iOS suffer from a file theft vulnerability due to allowing arbitrary javascript to be executed inside of the privileged file zone.

tags | advisory, arbitrary, javascript
systems | apple
SHA-256 | 1100900c25b938d98c9dde4e251799a63bd5241f918b5ca23fa9c84977c34291

DropBox iOS / Android App File Theft

Change Mirror Download
1 Introduction
================================================
Recently, I discovered a security vulnerability in several file-sharing apps:
DropBox iOS app, DropBox Android app and Google Drive iOS app.

Exploiting this vulnerability, an attacker could steal arbitrary files
from a DropBox / Google Drive user by tricking him into viewing a malicious
HTML file inside the mobile app.

The full blog post, including the advisories, can be found at:
http://bit.ly/R6nNee


2 Vulnerability
================================================
A significant feature of file-sharing apps is allowing a user to view either
his files or files shared with him. The apps achieve this by using an embedded
browser (using the UIWebView/WebView classes in iOS/Android respectively)
to display the contents of these files. Amongst numerous file types,
these apps allow the user to view HTML files in a rendered format.
To do so, these apps use an embedded browser window to render the
locally stored HTML file.

The method in which these apps render an HTML file has two side effects:
1. JavaScript code contained in the HTML file is automatically executed
2. The HTML content is loaded in a privileged file zone

Execution of malicious JavaScript code allows an attacker to steal potentially
valuable information from the DOM of the embedded browser, an attack dubbed
"Cross-Application Scripting" (XAS). However, because these apps load the HTML
file from a privileged zone such as
"file:///var/mobile/Applications/APP_UUID/…/maliciousfile.html"
(in iOS), the malicious JavaScript can also access the file system with the
same permissions as the app.


3 Impact
================================================
By exploiting this vulnerability, an attacker could read and retrieve files
that the apps themselves can access. For instance, previously cached files,
application configuration files, the device's address book, etc.
Furthermore, additional access can be achieved pending on the OS:

- In iOS, read access to the user's DropBox unencrypted credentials
(../Library/Preferences/com.getdropbox.Dropbox.plist). Having access to
the user's credentials allows the attacker to retrieve arbitrary files from
the user's account as well as to persist the attack by modifying other
HTML files.

- In Android, read access to the device's SD card is possible if the app
has permission to do so.

Once the HTML file is rendered, the JavaScript code executes immediately.
However, when the user has finished viewing the file (e.g. pressed the
Home button),
code execution is suspended until the user views the file again.


4 Vulnerable versions
================================================
DropBox:
- Version 1.4.6 (iOS)
- Version 2.0.1 (Android)
Google Drive:
- Version 1.0.1 (iOS)


5 Credit
================================================
Discovered by Roi Saltzman <roisaltzman () [google's mail server] com>


6 Acknowledgments
================================================
I'd like to thank the DropBox / Google security response teams for
the quick fixes!
Login or Register to add favorites

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    12 Files
  • 27
    May 27th
    12 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close