URL Shorteners: Convenient But a Potential Security Risk

A

Alkajak

Thread author
Services that shorten URLs can be great. They help take a giant, messy, unwieldy string of text and make it a lot more manageable.

Unfortunately, some short URLs also have one major flaw: if the URL is tiny enough, they're pretty easy to guess. In most instances that doesn't matter; maybe you're just shortening an online article URL to share on Twitter. However, two security researchers published a paper yesterday that details how Microsoft's OneDrive and Google's Maps services are easily exploited by this method.

As Ars Technica reports, the URL shorteners these companies use to give users direct links to files, addresses, or directions are simply too short. Said researchers brute-forced a ton of different links and then used them as starting points for accessing the rest of a user's data or, in the case of Google Maps, a user's identity.

With OneDrive, the researchers scanned 100 million different six-digit bit.ly URLs—which map directly to the "1drv.ms" URL shortener Microsoft uses for OneDrive. Of these URLs, 42 percent were live, and 19,524 linked to OneDrive files (mostly live).

"OneDrive URLs have predictable structure. From the URL to a single shared document ("seed"), one can construct the root URL and automatically traverse the account, discovering all files and folders shared under the same capability as the seed document or without a capability," reads a blog post from one of the researchers, Cornell Tech professor Vitaly Shmatikov.

"The traversal-augmented scan yielded URLs to 227,276 publicly accessible OneDrive documents, including dozens of thousands of PDF and Word files, spreadsheets, media files, and executable binaries. A similar scan of 100,000,000 random seven-character bit.ly tokens yielded URLs to 1,105,146 publicly accessible OneDrive documents. We did not download their contents, but just from the metadata it is obvious that many of them contain private or sensitive information," he added.

Worse, around 7 percent of OneDrive folders the researchers found using this method had full write access. So, presumably, a person could easily dump malware into the folder, which would then synchronize to a person's various OneDrive-connected devices.

As for Google Maps, the researchers found just under 24 million live links when they scanned various five-digit permutations of shortened Google Maps URLs. Around 10 percent were links to maps with driving directions.

"The endpoints of driving directions often contain enough information (e.g., addresses of single-family residences) to uniquely identify the individuals who requested the directions. For instance, when analyzing one such endpoint, we uncovered the address, full name, and age of a young woman who shared directions to a Planned Parenthood facility. Conversely, by starting from a residential address and mapping all addresses appearing as the endpoints of the directions to and from the initial address, one can create a map of who visited whom," Shmatikov wrote.

Though Microsoft has said that these issues are not themselves security vulnerabilities—surprisingly—it has since disabled bit.ly-based URL shortening within OneDrive. It also changed its URL structures to prevent digging through a person's other shared data from one successful shortened URL. As for Google, the company has switched to much longer tokens for its shortened URLs, greatly increasing the difficulty of brute-forcing live ones.

"We're continually looking for ways to improve the usability, features and security of our products and services for customers. As part of these efforts, earlier this year we began removing shortened URLs from file sharing options to simplify for users and prepare for future developments," Microsoft told Wired.

Google told Wired the company "appreciate(s) [the Cornell Tech researchers] contributions to the safety of Google Maps and other Google products. The Cornell researchers notified us last year about this issue and we've since strengthened URL protections based on their findings and our own studies."
 

JM Safe

Level 39
Verified
Top Poster
Apr 12, 2015
2,882
Services that shorten URLs can be great. They help take a giant, messy, unwieldy string of text and make it a lot more manageable.

Unfortunately, some short URLs also have one major flaw: if the URL is tiny enough, they're pretty easy to guess. In most instances that doesn't matter; maybe you're just shortening an online article URL to share on Twitter. However, two security researchers published a paper yesterday that details how Microsoft's OneDrive and Google's Maps services are easily exploited by this method.

As Ars Technica reports, the URL shorteners these companies use to give users direct links to files, addresses, or directions are simply too short. Said researchers brute-forced a ton of different links and then used them as starting points for accessing the rest of a user's data or, in the case of Google Maps, a user's identity.

With OneDrive, the researchers scanned 100 million different six-digit bit.ly URLs—which map directly to the "1drv.ms" URL shortener Microsoft uses for OneDrive. Of these URLs, 42 percent were live, and 19,524 linked to OneDrive files (mostly live).

"OneDrive URLs have predictable structure. From the URL to a single shared document ("seed"), one can construct the root URL and automatically traverse the account, discovering all files and folders shared under the same capability as the seed document or without a capability," reads a blog post from one of the researchers, Cornell Tech professor Vitaly Shmatikov.

"The traversal-augmented scan yielded URLs to 227,276 publicly accessible OneDrive documents, including dozens of thousands of PDF and Word files, spreadsheets, media files, and executable binaries. A similar scan of 100,000,000 random seven-character bit.ly tokens yielded URLs to 1,105,146 publicly accessible OneDrive documents. We did not download their contents, but just from the metadata it is obvious that many of them contain private or sensitive information," he added.

Worse, around 7 percent of OneDrive folders the researchers found using this method had full write access. So, presumably, a person could easily dump malware into the folder, which would then synchronize to a person's various OneDrive-connected devices.

As for Google Maps, the researchers found just under 24 million live links when they scanned various five-digit permutations of shortened Google Maps URLs. Around 10 percent were links to maps with driving directions.

"The endpoints of driving directions often contain enough information (e.g., addresses of single-family residences) to uniquely identify the individuals who requested the directions. For instance, when analyzing one such endpoint, we uncovered the address, full name, and age of a young woman who shared directions to a Planned Parenthood facility. Conversely, by starting from a residential address and mapping all addresses appearing as the endpoints of the directions to and from the initial address, one can create a map of who visited whom," Shmatikov wrote.

Though Microsoft has said that these issues are not themselves security vulnerabilities—surprisingly—it has since disabled bit.ly-based URL shortening within OneDrive. It also changed its URL structures to prevent digging through a person's other shared data from one successful shortened URL. As for Google, the company has switched to much longer tokens for its shortened URLs, greatly increasing the difficulty of brute-forcing live ones.

"We're continually looking for ways to improve the usability, features and security of our products and services for customers. As part of these efforts, earlier this year we began removing shortened URLs from file sharing options to simplify for users and prepare for future developments," Microsoft told Wired.

Google told Wired the company "appreciate(s) [the Cornell Tech researchers] contributions to the safety of Google Maps and other Google products. The Cornell researchers notified us last year about this issue and we've since strengthened URL protections based on their findings and our own studies."
Thanks for this thread @Alkajak , really interesting.
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Definitely a risk, few or some people know to use a tool to reveal the long/origin URL but other than that; its a trigger click happy.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top