Dropbox SDK Flaw Could Allow Attackers to Reroute Data
Third-party Android apps that use Dropbox's software development kit could have allowed an attacker to reroute any saved data to a different Dropbox account.A vulnerability in the software development kit (SDK) that allows third-party Android applications to save data to a Dropbox user's account could have allowed attackers to reroute data to an alternate account, IBM stated in an analysis of the issue published on March 11. The exfiltration flaw, dubbed DroppedIn by IBM, affects version 1.5.4 and later of the Dropbox SDK, and could be exploited by a malicious Website or an application installed on a victim's smartphone. Exploitation of the vulnerability would unlink a targeted third-party application from the victim's Dropbox account and link the app to the attacker's account. While the attacker would not gain access to files stored on Dropbox's servers, any data that the victim intended to save from the targeted application to their Dropbox account would be copied to the attacker's account instead. The attack uses a weakness in how the software development kit handled "intents," an Android programming construct that allows linking one application to others. "The idea is that you bait the end user to go to a rogue site, which messes with the intents on Android and causes a chain of events to occur that switches the storage from being the victim's Dropbox account to the attacker's Dropbox account," Caleb Barlow, vice president of mobile management and security for IBM, told eWEEK.
Dropbox classified the issue as a "minor" security vulnerability, noting that Android users would only be vulnerable if three conditions were true: an app targeted by attackers is installed on the user's device, the Dropbox app is not installed, and the user visited a malicious Web page or installed a malicious application.