Do you know 76% of organizations are concerned about their cloud security? The seamless exchange and management of files stand as a key for businesses and individuals alike. Nevertheless, new information has highlighted serious vulnerabilities in a well-known file sharing application. 

If these vulnerabilities are not resolved, they pose a major threat to the security and privacy of shared documents. This investigation allows us to examine the intermediate vulnerabilities present in this file sharing app, as well as their repercussions and the urgent need for preventative action to safeguard user acceptability and the integrity of the facts.

What are Cloud Attacks?

Cloud attacks cover a wide range of threats that try to break into or harm the safety of online systems. They aim to mess with how secure, accurate, and easy-to-use these systems are. These threats can happen in different ways. Some attackers look for mistakes in how things are set up, while others find weaknesses in the computer programs used. They might also sneak into important information without permission. These attacks are a big deal because they can cause trouble for companies, schools, and people who use the internet to store, share, or manage their information.

Moreover, vulnerabilities within the software components utilized by cloud platforms serve as another gateway for attackers. If these vulnerabilities are not fixed, someone might use them to gain unauthorized access to the device and presumably modify statistics. Hackers can gain access to cloud systems, manipulating or pilfering crucial data using stolen credentials or bypassing authentication.

Book a Free Consultation with our Cyber Security Experts

Company Name
Phone Number

Cloud Vulnerability Exploitation

Cloud vulnerability exploitation refers to the practice of taking advantage of weaknesses or gaps in security within cloud-based systems. It exploits system setup flaws or software loopholes to gain unauthorized access, manipulate data, or disrupt services. Attackers actively seek out vulnerabilities in cloud infrastructures, applications, or configurations, leveraging these weaknesses to breach security defenses. Exploiting cloud vulnerabilities can cause data breaches, service outages, and unauthorized access to sensitive info. This affects both businesses and individuals who rely on cloud services for their operations and data. Understanding and addressing these vulnerabilities through proactive measures are critical to strengthening the security and resilience of cloud environments.

Recent Incident

A widely-used open-source file sharing app software disclosed three critical security vulnerabilities, one of which poses a serious threat by potentially exposing administrator passwords and mail server credentials. These vulnerabilities impact different parts, enabling attackers to misuse flaws in containerized setups and core library versions. This could jeopardize data integrity and grant file access without proper authentication. The urgency to address these vulnerabilities stems from the potential exposure of sensitive information and the consistent targeting of file sharing applications by cyber threat actors. Urgent measures like implementing fixes and updating libraries are vital to reduce risks and protect the organization’s security.

Causes behind the Vulnerability Exploitation

It’s critical to comprehend the root causes of vulnerability exploitation because they can reveal flaws in outdated software, devices, or security protocols. Hackers may use these vulnerabilities to gain unwanted access, steal data, or jeopardize the integrity of the device. In the recent attack here are a few places in which vulnerability was found:

Issues within CVE-2023-49103

The initial flaw, identified as CVE-2023-49103 and given the highest possible CVSS score of 10, presents a severe risk. This vulnerability enables the theft of credentials and configuration details in containerized deployments, impacting all web server environment variables.

This issue specifically affects the graphapi versions ranging from 0.2.0 to 0.3.0. The problem arises due to the application’s reliance on a third-party library. This library inadvertently exposes PHP environment specifics through a URL. Consequently, this exposure opens the door for potential exploitation, allowing threat actors to access critical information within the organization. This includes the revelation of admin passwords, mail server credentials, and license keys. 

Authentication Bypass Vulnerability

The second vulnerability, rated at a CVSS v3 score of 9.8, affects specific versions of the ownCloud core library (10.6.0 to 10.13.0), presenting an authentication bypass issue. This flaw allows attackers to modify files without proper authentication if they know the user’s username and the default signing key settings.

OAuth2 Vulnerability

The third vulnerability, rated at a CVSS v3 score of 9, affects all versions of the Oauth2 library prior to 0.6.1. Within the oauth2 app, it permits attackers to input a specialized redirect URL, evading the validation code. This flaw enables the redirection of callbacks to an attacker-controlled domain.

The suggested mitigation involves reinforcing the validation code within the Oauth2 app. As a temporary measure, users can disable the “Allow Subdomains” option, as advised in the provided option.

How does Kratikal prevent cloud attacks?

At Kratikal, we specialize in securing cloud environments through meticulous testing and evaluation. Our approach to cloud security testing is comprehensive, ensuring robust protection for your valuable data. We navigate the intricate policies set by diverse cloud service providers to identify permissible testing methods and services tailored to your specific environment. 

Through close collaboration with clients, we establish clear timelines for testing, dedicating time to understanding system intricacies, including source code, software versions, and potential access points. Post-testing, our expert analyzes the outcomes, documenting each response for a detailed assessment of potential risks. We focus on understanding the severity of identified issues and propose practical solutions to protect your cloud security effectively.

Kratikal culminates its cloud security testing methodology with a comprehensive report that outlines actionable recommendations to bolster your cloud infrastructure’s resilience and safeguard your data against evolving cyber threats. With our dedicated approach, rest assured that your cloud environment will be protected against potential risks, ensuring the safety and integrity of your digital assets.


The recent revelations of critical vulnerabilities within a widely used file sharing app highlight the ever-present risks to data security in cloud environments. Cloud attacks, exploiting weaknesses in systems and software, pose severe threats, potentially compromising sensitive information and system integrity. The recent incident involving CVE-2023-49103, authentication bypass vulnerabilities, and OAuth2 flaws exemplifies the urgency for proactive measures and immediate action to mitigate risks.

Understanding these vulnerabilities and their root causes is crucial in protecting cloud security. Kratikal’s role, being a CERT-In empanelled auditor in cloud security and VAPT testing stands pivotal in the cybersecurity environment. With their meticulous approach and comprehensive testing methodologies, they navigate the complexities of cloud environments, providing tailored solutions to protect against potential threats. Their commitment to assessing, analyzing, and suggesting solutions assures the resilience of your cloud infrastructure against evolving cyber threats. Trust in Kratikal’s expertise ensures the safety and integrity of your digital assets in an ever-evolving cloud security landscape.

Ref Link:

Leave a comment

Your email address will not be published. Required fields are marked *