CrashPlan Backup is Vulnerable Allowing to a DoS Attack Against Uber's Backups to ```backup.uber.com```
Unknown
Vulnerability Details
```backup.uber.com``` hosts a CrashPlan backup server on port 443. CrashPlan allows users to backup to a friends computer by entering a 6 digit alphanumeric code. This means there are 2,176,782,336 total CrashPlan friend codes. While this is a high number, it is completely possible to brute force this as CrashPlan does not have any rate limiting on their end point to check the validity of a code.
By iterating through all the friend codes I would be able to find the friend code for the CrashPlan instance running on ```backup.uber.com``` thereby allowing me to upload my data to the server hosting ```backup.uber.com```.
I wasn't quite sure what to categorize this as so I put it down as a denial of service vulnerability since it would allow me to fill the ```backup.uber.com``` server up with data so that employees would not be able to backup their data.
In order to patch this you have to go into the settings in CrashPlan and disable "Inbound backup from other computers". If you are using this feature, you should add a firewall between ```backup.uber.com``` to block connections not originating from Uber.
I am also reporting this to Code42 (creators of CrashPlan) to suggest that they switch to a secure default.
Thanks,
David Dworken
Actions
View on HackerOneReport Stats
- Report ID: 131560
- State: Closed
- Substate: duplicate
- Upvotes: 1