exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Optical Society of America's Prism Information Leak

Optical Society of America's Prism Information Leak
Posted Aug 14, 2014
Authored by Peter Wiedekind

Reviewer information stored in metadata can be leaked for submissions sent to the Optical Society of America's Prism system.

tags | advisory
SHA-256 | cb86d182e6ced767696ef53f3a189c454daee96a6be0ec6aa702a8536cf84291

Optical Society of America's Prism Information Leak

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Optical Society of America's peer-review system can leaks reviewers' usernames

Hi,

the Optical Society of America uses an article tracking
system called "Prism" [1] to manage the submissions of
authors and the comments of the reviewers. Reviewers
can upload their reviews as MS Word or PDF documents.

Under certain circumstances, when an MS Word document
is converted to PDF on the reviewer's computer, the
username of the reviewer is embedded into the XMP
metadata of the resulting PDF document as a dc:creator
element. However, the article tracking system does not
seem to know about XMP metadata in PDF documents and only
clears the author field in the regular PDF metadata, thus
leaving the dc:creator field for the author of the reviewed
paper to see, potentially revealing the reviewer's identity.
Note that a malicious reviewer could of course easily fake
the user name field.

Since the leak can only be seen when a paper is submitted
and reviewed, I could not do a study on how many reviews
are affected.

Best regards,

Peter Wiedekind

[1] https://prism.opticsinfobase.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=fPRH
-----END PGP SIGNATURE-----




Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close