- Mar 15, 2011
- 13,070
A security researcher claims that Dropbox is vulnerable to a design flaw that makes it easy for attackers to copy data from people's accounts if they obtain access to a particular file.
According to security expert Derek Newton, after adding a computer to the sync chain, the Windows Dropbox client generates an unique host_id token and stores it in the %APPDATA%\Dropbox\config.db file.
This host_id is used to authenticate the computer with the service and, apparently, it can be easily transferred to another system and used to download a copy of the data on it.
The problem is that Dropbox does not perform any additional checks to determine if the host_id is actually located on the computer it was generated on.
Newton explains that a trojan can be configured to extract the host_id from config.db and send it to hackers for accessing the victim's data.
Link