Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

IE bug leaks private details from 50 million PDF files
The Register ^

Posted on 11/23/2009 2:31:32 PM PST by Gomez

A bug in Microsoft's Internet Explorer browser is causing more than 50 million files stored online to leak potentially sensitive information that could compromise user privacy, a security researcher said.

The documents stored in Adobe's PDF format display the internal disk location where the file is stored, an oversight that can inadvertently expose real-world names and login IDs of users, the operating system being used and other information that is better kept private. The data can then be retrieved using simple web searches.

Google searches such as this one expose almost 4 million documents residing on users' C drives alone. Combined with searches for other common drives, the technique exposes more than 50 million files that display the local disk path, according to Inferno, a security researcher for a large software company who asked that his real name not be used.

"If they have those kind of PDFs, somebody can use search engines to find out user names or do more reconnaissance on the operating systems used," he told The Register. "That actually invades the privacy of a user."

The potentially sensitive data is included in PDFs that have been printed using Internet Explorer. The full path location is appended to its contents as soon as the Microsoft browser is used to print the document. Although the data isn't always exposed when the document is viewed with Adobe Reader, it is easily readable when the file is opened in editors such as Notepad, and the text is also available to Google and other search engines.

This PDF, for example, was stored at C:\Program Files\Wids7\WizardReport.htm at time of printing. The path makes it clear that the file was stored on a Windows machine that has software from Worldwide Instructional Design System installed. Other PDFs give up directory names that reveal authors, projects or other data that may have been designated confidential.

The only way to remove the path is erase the text in an editor and save the document.

All versions of IE suffer from the bug. A Microsoft spokeswoman said company engineers are working to reproduce the reported behavior. "We can confirm that this is not a vulnerability," she wrote in an email. Adobe representatives didn't reply to requests for comment. Inferno's report is here.


TOPICS: Computers/Internet
KEYWORDS: microsofttax

1 posted on 11/23/2009 2:31:33 PM PST by Gomez
[ Post Reply | Private Reply | View Replies]

To: ShadowAce

ping


2 posted on 11/23/2009 2:33:16 PM PST by Gomez (killer of threads)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gomez

The only way to remove the path is erase the text in an editor and save the document.

What would you want IE default behavior to be?
Sounds like a default behavior with a trivial workaround.

At most I would add a registry setting to rmove the path
leading to the filename. This is not an OS bug.


3 posted on 11/23/2009 2:36:08 PM PST by rahbert (If not by the power of persuasion, then by the persuasion of power - Andy Stein)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gomez
All versions of IE suffer from the bug. A Microsoft spokeswoman said..."We can confirm that this is not a vulnerability"

LOL, it's not a bug, it's a feature. Yeah, that's the ticket!

4 posted on 11/23/2009 2:36:44 PM PST by Talisker (When you find a turtle on top of a fence post, you can be damn sure it didn't get there on it's own.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gomez
Okay, everyone here knows that I'm no fan of Microsoft but I'm having a hard time getting worried about this one.

It appears that no actual files are being exposed, just the path names.

While I understand that this is less than optimal, unless you've got stuff like this on your system:

C:\Documents and Settings\obinladen\Desktop\Jihad\Bombs\ANFO\Project Bomb the Synagogue on 3rd and Maple on December 18th\Project Plan.doc

...then there really isn't a lot to worry about.

Most things people would have would look like:

C:\Documents and Settings\joeuser\Desktop\Lists\Christmas List.doc

Moral: If you have sensitive data on your machine, don't name the folders with the sensitive data. Leave the data in a file.

Now granted, this shouldn't be information that leaks out and Microsoft needs to fix it, but I'm pretty sure that this really isn't a major breach unless you're pretty dumb in how you set up your directory structure.

5 posted on 11/23/2009 2:43:04 PM PST by Knitebane (Happily Microsoft free since 1999.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gomez

Regarding the http://wids.matcmadison.edu/10150170.pdf

LOL - That’s quite standard behavior for printing out web-documents, so I’m guessing that it was output viewed on a browser and then “printed” on a virtual PDF-producing printer.


6 posted on 11/23/2009 2:44:00 PM PST by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gomez

I don’t quite understand why this is a web browser bug.

It sounds like it’s a bug in whatever software created the PDF. That could be the fault of MS, if they wrote that code, or it could be Adobe, or some other software developer. It could be a “feature”. Was the file path part of the visible content of the PDF? They seemed to indicate it was part of the PDF markup that is not usually visible with typical PDF viewers, but I wonder.

Usually IE and other web browsers do not create PDF files. You’d usually have to print to a PDF from the browser, but that wouldn’t make the PDF visible on a public web server for searching.

Whoever wrote this article seems technically illiterate. The article seems poorly edited. Both are probably true.


7 posted on 11/23/2009 2:58:07 PM PST by MichiganConservative (Abolish the IRS, income tax, the 16th amendment and the Federal Reserve. Replace them with nothing.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: OneWingedShark
I agree the example highlighted in the article is stupid because the allged "privacy leak" is clearly visible in the PDF. But consider this file: http://www.wbabin.net/yuri/keilman10.pdf. It does not visibly contain any information on where the file came from, but Google (any anyone opening the PDF in a text editor) can tell that it was stored at file://C:\HTML Beauty 2\Paper\yuri\keilman10.htm
8 posted on 11/23/2009 2:59:23 PM PST by TennesseeProfessor
[ Post Reply | Private Reply | To 6 | View Replies]

To: MichiganConservative

Looks like it was stored in the “hidden” part of the file. That means it’s more like Google is the responsible party here, along with whatever software created the PDF.

Again, badly written article. in my opinion, NOT an IE “bug”.


9 posted on 11/23/2009 3:01:05 PM PST by MichiganConservative (Abolish the IRS, income tax, the 16th amendment and the Federal Reserve. Replace them with nothing.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: MichiganConservative

Absolutely agree about the poor writing/editing. And agreed that it is not clear what program created the documents (the article claims they were created by IE, but I’m sceptical).


10 posted on 11/23/2009 3:03:50 PM PST by TennesseeProfessor
[ Post Reply | Private Reply | To 7 | View Replies]

To: steelyourfaith; Golden Eagle; Swordmaker; ShadowAce
Like, *PING*, dudes.

Steel, the *real* source for the Hadley CRU email dump...? /sarc>

Cheers!

11 posted on 11/23/2009 4:05:14 PM PST by grey_whiskers (The opinions are solely those of the author and are subject to change without notice.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Knitebane
You *do* realize that there is a chance a DU lurker will read this thread, see your fictitious path name, and try to blame Sarah Palin for it, right?

Cheers!

12 posted on 11/23/2009 4:07:07 PM PST by grey_whiskers (The opinions are solely those of the author and are subject to change without notice.)
[ Post Reply | Private Reply | To 5 | View Replies]

Comment #13 Removed by Moderator

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson