Flaw Enables Folder/File Access To Unauthorized Users Flaw Enables Folder File Access To Unauthorized Users 1

A critical flaw in cloud-storage solution was recently discovered that make files stored in the service accessible by external unauthorized users if users are not security-conscious. is a mainstream cloud-storage service with many corporate account holders storing their personal and business files in the encrypted storage service. The corporate account is at risk, given that not everyone using such account sets the access restrictions under “people in your company” when sharing a file or folder from to other people. Leaving the default settings for sharing links makes the files shared public, anyone that gets a hold of the URL address gets access to the file without a need to authenticate themselves first. also allows their corporate customers to create “Vanity” URLs, links to files shared through the service by customizing the URL itself instead of a machine-generated URL. The special subdomain using a Vanity URL can be subjected to a brute-force attack to guess the entire URL. Access to the URL means access to the entire folder structure that the link points to. It was first reported more than 18-months ago by Nenad Zaric, but no one from took the bug seriously, and it was left open for many months until now.

Shared files are under the following URL format:


The attacker only needs to create a simple program that will attempt to guess the folder name structure in succession using a dictionary attack or a brute-force attack, this will reveal files underneath those folders. To mitigate the concern, Box launched a microsite where they give the instructions on how to harden the weak system, lessening the chances of a successful infiltration of storage by unauthorized users.

To ensure that the right people have access to shared content, you can configure access controls on a Box Shared Link: People with the link (public/open); People in your company or People in this folder/file setting. You can also enable security controls such as password-protection and expiration policies on shared links. In addition to user-level security controls, company  Box administrators can apply enterprise wide security controls on Shared Links. Coupled with appropriate security controls based on the sensitivity of the content, Shared Links provide a frictionless and secure way to collaborate,” explained spokesperson. also discourage the use of Vanity URL for sharing files to other people outside the organization. “We provide admins tools to run various reports on open links across their enterprise, as well as to disable open and custom URLs for their enterprise. Admins can also ensure that ‘People in the Company’ is the default setting for all shared links to limit the potential for a user to set a [file] as public inadvertently. We don’t proactively scan our customers’ deployments, but if customers need assistance or need to examine a specific issue we will work with them to examine their links and identify any potential issues,” added spokesperson.

Related Resources:

7 Tips on How Firms can Prevent Successful RDP Backdoor Attacks


Leave a Comment


Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password