未加星标

DJI Patches Forum Bug That Allowed Drone Account Takeovers

字体大小 | |
[前端(javascript) 所属分类 前端(javascript) | 发布者 店小二03 | 时间 2018 | 作者 红领巾 ] 0人收藏点击收藏

Bug opened door for malicious link attack, giving hacker access to stored DJI drone data of commercial and consumer customers.

Leading commercial drone maker DJI patched a cross-site scripting bug impacting its forums that could have allowed a hacker to hijack user accounts and gain access to sensitive online data, ranging from flight images, bank card data, flight records and even real time camera images.

The vulnerability is significant given DJI’s estimated 70 percent market share of the commercial and consumer market, according to IDC researchers. “Sectors ranging for energy, government and public safety could potentially have their entire drone programs exposed,” said Oded Vanunu, head of products vulnerability research at Check Point Software Technologies in an interview.

Check Point publicly disclosed the bug Thursday . Researchers said they found the flaw in March. DJI said it fixed the forum vulnerability in September.

Affected are DJI’s Web Platform, the DJI GO/4/pilot Mobile Application and its centralized drone operations management platform called DJI Flighthub. “By exploiting a loophole in DJI’s customer identification process, then, our research team was able to hijack a user’s account and take complete control over any one of these cloud-based platforms and the data stored there,” according to researchers.

In all, Check Point identified three vulnerabilities in the DJI identification process used by its DJI Forum, accessible to over 100,000 drone users, according to researchers. The vulnerabilities include XSS, a Secure Cookie bug and a Certificate Pinning flaw. Together they allowed for a hacker to malicious plant links in DJI forum posts that deliver the malicious payload.

“DJI uses a cookie that the attacker can obtain to identify a user and create tokens, or tickets, to access their platforms. Through the use of this cookie, an attacker is able to simply hijack any user’s account and take complete control over any of the user’s DJI Mobile Apps, Web Account or DJI FlightHub account,” according to a technical write-up describing the vulnerability posted Thursday.

An attack scenario would include first a malicious post with a link that included a javascript Injection. If a forum user is enticed to click on the forum link the JavaScript is instructed to grab a user’s DJI cookie and account token. Next, because of a vulnerability within the configuration of the forum platform an attacker is able to export the Secure Cookie from the target to an outside domain. The stolen user token can then be used to assume the identity of DJI account holder, which allows for the adversary to access the account holder’s cloud services that include archived drone images, flight plans and financial information.

Lastly, a misconfiguration of the security mechanism Certificate Pinning allows the attacker to use the same authentication token in the context of the DJI Mobile Apps. This could allow a successful adversary to not only hijack the user account, but also access real-time flight imagery and flight data.

In a statement the China-based DJI acknowledged the flaw stating the vulnerability was “high risk” with a “low probability” of execution by an adversary. “This is because the vulnerability required a complicated set of preconditions to be successfully exploited: The user would have to be logged into their DJI account while clicking on a specially-planted malicious link in the DJI Forum,” according to the DJI statement.

DJI said there is no indication that the vulnerability was exploited in the wild.

本文前端(javascript)相关术语:javascript是什么意思 javascript下载 javascript权威指南 javascript基础教程 javascript 正则表达式 javascript设计模式 javascript高级程序设计 精通javascript javascript教程

代码区博客精选文章
分页:12
转载请注明
本文标题:DJI Patches Forum Bug That Allowed Drone Account Takeovers
本站链接:https://www.codesec.net/view/611333.html


1.凡CodeSecTeam转载的文章,均出自其它媒体或其他官网介绍,目的在于传递更多的信息,并不代表本站赞同其观点和其真实性负责;
2.转载的文章仅代表原创作者观点,与本站无关。其原创性以及文中陈述文字和内容未经本站证实,本站对该文以及其中全部或者部分内容、文字的真实性、完整性、及时性,不作出任何保证或承若;
3.如本站转载稿涉及版权等问题,请作者及时联系本站,我们会及时处理。
登录后可拥有收藏文章、关注作者等权限...
技术大类 技术大类 | 前端(javascript) | 评论(0) | 阅读(50)