Shadow attacks allow replacing content in signed PDF filesSecurity Affairs


Boffins from the Ruhr University Bochum (Germany) have disclosed a series of new attack methods, dubbed Shadow attacks, against signed PDF files.

Security researchers from the Ruhr University Bochum (Germany) have devised a series of new attack techniques, dubbed Shadow attacks, against signed PDF files.

In February 2019, the same team of experts found several flaws in popular PDF viewers and online validation services that allow to deceive the digital signature validation process.

Shadow attacks can allow an attacker to manipulate the content of a signed PDF document keeping its signature valid. The attacker can create a document with two different contents:

  • the content expected by the authority reviewing and signing the PDF;
  • the hidden content that will be displayed once the PDF document will be signed.

“The Signers of the PDF receive the document, review it, and sign it. The attackers use the signed document, modify it slightly, and send it to the victims. After opening the signed PDF, the victims check whether the digital signature was successfully verified. However, the victims see different content than the Signers,” wrote the researchers.

The researchers devised three different variants of the Shadow Attacks, allowing to HideReplace, and Hide-and-Replace content in digitally signed PDFs.

The experts tested their attacks against 28 PDF viewer applications and discovered that 15 of them were vulnerable to at least one of the attacks. The list of vulnerable viewers includes Adobe, Foxit, and LibreOffice.

The software firms behind these three applications have already released security fix to prevent Shadows attacks, unfortunately, many other companies behind impacted apps did not respond to the researchers.

The vulnerabilities exploited by the researchers in the Shadow attacks are tracked as CVE-2020-9592 and CVE-2020-9596.

The “Hide” variant of the Shadow Attacks consists in hiding a portion of the content in a PDF behind another layer, such as a full-page image. The attacker sends a document to the signer that contains an image placed on top of the content to hide. Once the document has been signed and sent back to the attacker, they can manipulate it to hide the image from the PDF viewer.

Shadow Attacks

The “Replace” attack sees the attacker appending an object to a signed document, the object is considered harmless and can impact the way the content is presented.

“The main idea of the *Replace* variant is to append new objects to the signed document which are considered harmless but directly influence the presentation of the signed content.” continues the experts.

“For instance, the (re)definition of fonts does not change the content directly. However, it influences the view of the displayed content and makes number or character swapping possible.”

The last attack, the “Hide-and-Replace” variant, allows an attacker to change the entire content of a signed document. The attacker inserts both hidden and visible content into the document using two objects that have the same object ID, and sends it to the signer. Once the attacker receives the signed document, they will append a new Xref table and a new Trailer so that the hidden content is displayed.

“In Hide-and-Replace attack variant, the PDF document contains a second, hidden document with different content. Since the signers cannot detect the hidden (malicious) content, they sign the document. After signing, the attackers receive the document and append only a new Xref table table and Trailer. Within the Xref table table, only one change takes place: the reference to the Description.” the experts explained.

shadow attacks

Experts shared all the exploits here.

Pierluigi Paganini

(SecurityAffairs – hacking, Shadow attacks)








Source link

Recent articles

Google Threat Analysis Group took down ten influence ops in Q2 2020Security Affairs

Google published its second Threat Analysis Group (TAG) report which reveals the company has taken...

Marvel’s Avengers – New Gameplay Today Live

After years of anticipation, Marvel's Avengers is almost here. But before we get to the full release of Crystal Dynamics' take on Earth's...

Letters to the Editor – The New York Times

The Way I SpeakTo the Editor:My personal experience countermands John McWhorter’s contention, in his Aug. 2 review of Katherine D. Kinzler’s “How You...

With 5G, edge computing and IoT will surge: Now’s the time to upgrade your edge

Moving computing to the edge eases the stress on bandwidth and speeds processing and responsiveness,...

Trump wants to ban WeChat. What is WeChat?

The popular Chinese messaging app is used across the Chinese diaspora but may be unfamiliar outside of those circles.WeChat, called Weixin in China,...

Leave a reply

Please enter your comment!
Please enter your name here