{"id":22340,"date":"2024-02-06T13:11:23","date_gmt":"2024-02-06T12:11:23","guid":{"rendered":"https:\/\/herolab.usd.de\/?p=22340"},"modified":"2024-02-06T13:11:24","modified_gmt":"2024-02-06T12:11:24","slug":"security-advisories-for-zimperium-and-filecloud","status":"publish","type":"post","link":"https:\/\/herolab.usd.de\/en\/security-advisories-for-zimperium-and-filecloud\/","title":{"rendered":"Security Advisories for Zimperium and FileCloud"},"content":{"rendered":"\n<p>The&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/our-experts\/\" target=\"_blank\" rel=\"noreferrer noopener\">pentest professionals<\/a>&nbsp;at usd HeroLab examined Zimperium and FileCloud during their&nbsp;<a href=\"https:\/\/www.usd.de\/en\/pentest\/\" target=\"_blank\" rel=\"noreferrer noopener\">pentests<\/a>. <\/p>\n\n\n\n<p>A critical vulnerability was discovered in the Drive application of FileCloud. This is related to an outdated Electron dependency. Exploiting the vulnerability allows attackers to gain unauthorized access to sensitive data.<\/p>\n\n\n\n<p>In Zimperium Mobile Threat Defense, a vulnerability has been discovered related to the use of a weak JWT secret that allows the creation of arbitrary JWT tokens. The exploitation of the vulnerability allows attackers to manipulate the tokens and gain unauthorized access to sensitive data, compromise administrator accounts and execute code on the underlying system.<\/p>\n\n\n\n<p>The vulnerabilities were reported to the vendors as part of the Responsible Disclosure Policy. Detailed information on the advisories can be found&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2023-0009\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2023-0009\/\" rel=\"noreferrer noopener\">here<\/a> and <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2023-0027\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2023-0027\/\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About usd HeroLab Security Advisories<\/h2>\n\n\n\n<p>In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.<\/p>\n\n\n\n<p>We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues \u2013 always in line with our&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Responsible Disclosure Policy<\/a>.<\/p>\n\n\n\n<p>Always in the name of our mission: \u201cmore security.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The&nbsp;pentest professionals&nbsp;at usd HeroLab examined Zimperium and FileCloud during their&nbsp;pentests. A critical vulnerability was discovered in the Drive application of FileCloud. This is related to an outdated Electron dependency. Exploiting the vulnerability allows attackers to gain unauthorized access to sensitive data. In Zimperium Mobile Threat Defense, a vulnerability has been discovered related to the use [&hellip;]<\/p>\n","protected":false},"author":90,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"<!-- wp:paragraph -->\n<p>The\u00a0<a href=\"https:\/\/herolab.usd.de\/en\/our-experts\/\" target=\"_blank\" rel=\"noreferrer noopener\">pentest professionals<\/a>\u00a0at usd HeroLab examined Zimperium and FileCloud during their\u00a0<a href=\"https:\/\/www.usd.de\/en\/pentest\/\" target=\"_blank\" rel=\"noreferrer noopener\">pentests<\/a>. <\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>A critical vulnerability was discovered in the Drive application of FileCloud. This is related to an outdated Electron dependency. Exploiting the vulnerability allows attackers to gain unauthorized access to sensitive data.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>In Zimperium Mobile Threat Defense, a vulnerability has been discovered related to the use of a weak JWT secret that allows the creation of arbitrary JWT tokens. The exploitation of the vulnerability allows attackers to manipulate the tokens and gain unauthorized access to sensitive data, compromise administrator accounts and execute code on the underlying system.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The vulnerabilities were reported to the vendors as part of the Responsible Disclosure Policy. Detailed information on the advisories can be found\u00a0<a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2023-0009\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2023-0009\/\" rel=\"noreferrer noopener\">here<\/a> and <a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2023-0027\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2023-0027\/\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading -->\n<h2 class=\"wp-block-heading\">About usd HeroLab Security Advisories<\/h2>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues \u2013 always in line with our&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Responsible Disclosure Policy<\/a>.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Always in the name of our mission: \u201cmore security.\u201d<\/p>\n<!-- \/wp:paragraph -->","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[76,85],"tags":[149,128,86,269],"class_list":["post-22340","post","type-post","status-publish","format-standard","hentry","category-news","category-security-advisories-en","tag-filecloud-2","tag-security-analysis-en","tag-security-research-en","tag-zimperium-2"],"_links":{"self":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/posts\/22340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/comments?post=22340"}],"version-history":[{"count":4,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/posts\/22340\/revisions"}],"predecessor-version":[{"id":22345,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/posts\/22340\/revisions\/22345"}],"wp:attachment":[{"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/media?parent=22340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/categories?post=22340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/herolab.usd.de\/en\/wp-json\/wp\/v2\/tags?post=22340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}