複数のEE2Eクラウドストレージサービスにおいてセキュリティ上の問題があるとする分析報告が公開 [36iiM2★] (4)

←← 掲示板一覧に戻る ← スレッド一覧に戻る

2 枯れ果てた名無し@転載禁止 2024/10/22 (火) 17:21:14.104 ID:ZbX1SaATD

The ETH Zurich researchers found serious vulnerabilities in all five products, including implementations that allow a malicious actor to inject files, tamper with data, or gain access to user files. Here's an overview of the discovered issues:

1. Sync
Sync's vulnerabilities include unauthenticated key material, allowing attackers to inject their own encryption keys and compromise data. The lack of public key authentication in file sharing further enables attackers to decrypt shared files.
Shared links expose passwords to the server, breaking confidentiality. Additionally, attackers can rename or move files undetected and even inject folders into user storage, making them appear as if the user uploaded them.

2. pCloud
pCloud's main issues stem from unauthenticated key material, allowing attackers to overwrite private keys and force encryption with attacker-controlled keys.
Public keys are also unauthenticated, giving attackers access to encrypted files. Additionally, attackers can inject files, manipulate metadata like file size, and reorder or remove chunks due to the lack of authentication in the chunking process.

3. Icedrive
Icedrive's use of unauthenticated CBC encryption makes it vulnerable to file tampering, allowing attackers to modify file contents.
File names can also be truncated or altered. The chunking process lacks authentication, meaning attackers can reorder or remove file chunks, compromising file integrity.

4. Seafile
Seafile is vulnerable to protocol downgrades, making password brute-forcing easier.
Its use of unauthenticated CBC encryption allows file tampering, and unauthenticated chunking lets attackers manipulate file chunks.
File names and locations are also unsecured, and the server can inject files or folders into user storage.

5. Tresorit
Tresorit's public key authentication relies on server-controlled certificates, which attackers can replace to access shared files.
Metadata is also vulnerable to tampering, allowing attackers to alter file creation details and mislead users.

Out of the examined group of five, Tresorit fared relatively better, as the issues discovered do not directly expose file contents or allow for easy data manipulation.

https://i.imgur.com/Nr6FTnR.png" data-lightbox="image">https://i.imgur.com/Nr6FTnR.png" loading="lazy">
https://i.imgur.com/Nr6FTnR.png