I just published two cryptography attacks on Uppy Companion, a tool for downloading/uploading documents from various cloud storage providers.
https://github.com/transloadit/uppy/issues/5705
https://github.com/transloadit/uppy/issues/5706
These attacks allow the recovery of the access tokens/refresh tokens of the various cloud provider, enabling an attacker having access to a stolen encrypted cookie value to get access to the cloud storage.
Once again, people: do not roll your own crypto! 😮💨
Using plain AES-CBC, deriving secrets with SHA256 and the sign-then-encrypt paradigm are not best practices.
#uppy #cryptography #aes #infosec #vulnerability #disclosure
Encryption Key Wear-out Leading to access_token/refresh_token Recovery in Uppy Companion · Issue #5705 · transloadit/uppy
Initial checklist I understand this is a bug report and questions should be posted in the Community Forum I searched issues and couldn’t find anything (or linked relevant results below) Link to run...