*** Security Advisory *** Title: CRSF attack on the SpiderOak web interface -- Summary -- SpiderOak offers remote access to user data through a JavaScript web interface. This interface is vulnerable to JSONP CSRF attacks, using which an arbitrary website can retrieve a logged-in SpiderOak user's entire directory structure and the room keys for all her shared rooms (and hence, the plaintext for all her shared folders and files). -- Threat Model -- Any website can exploit this weakness provided that: - the target is logged into the SpiderOak web interface while she visits the website, and - the website knows or can guess the SpiderOak username of its target. -- Vulnerability description -- The SpiderOak web interface uses AJAX to populate the directory structure in the user's TreeView. Specifically, asynchronous requests to "https://spideroak.com/storage//" yield JSON-formatted data describing the contents of "device/path", but this URL also accepts a "callback" parameter to return a JSONP script, without checking the origin or referer of the request, relying solely on the user's login cookie for authentication. So, if a SpiderOak user visits a malicious webpage when she is logged into the SpiderOak web interfcace, the malicious website may execute a JSONP CSRF attack [1] by include the following script: