Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Twitter Programming IT Technology

Tiny Twitter Thumbnail Tweaked To Transport Different File Types (theregister.co.uk) 45

Security researcher David Buchanan has found that Twitter image uploads can be polyglot files, meaning they can be valid simultaneously in multiple formats, such as a .jpg, a .rar archive and a .zip archive. From a report: Using some Python code he wrote, he created a thumbnail image of William Shakespeare overlaid with the words, "Unzip Me" and posted it to Twitter. The .jpg image is also a valid .zip file, so if you download it, you can unzip it and extract the contents, a multipart .rar archive of the text of Shakespeare's plays. [...] Twitter performs some processing on uploaded images, which has the potential to mess with the data. But Buchanan found that his multi-format file survived this process. It may be that image itself (excluding the rather bulky metadata) is light enough not to trigger any compression or post-upload processing.
This discussion has been archived. No new comments can be posted.

Tiny Twitter Thumbnail Tweaked To Transport Different File Types

Comments Filter:
  • Who? (Score:2, Offtopic)

    I am not sure if anyone has told this WIlliam Shakespeare fellow about this, but he should sue for copyright violation.
  • by suso ( 153703 ) * on Wednesday October 31, 2018 @05:07PM (#57570795) Journal

    A while back I tried posting an image with a hidden steganographic message in it to Twitter and to my surprise the hidden message was preserved and not lost due to recompression. Also, the recent Banksy-style shreded image [twitter.com] I posted to climagic that was basically a corrupted jpg file was preserved pretty well. In other words the corrupted part looks identical to what I see with the original on my own computer. However posting it to Mastodon.social resulted in a reprocessed image with compression artifacts [mastodon.social]

  • Malware been downloading crap to your computer disguised as JPG and ZIP for years, and now we've gone full circle and become the malware
    • Are you saying ...

      Social Media IS malware? =P

    • Re:As an IT Pro... (Score:5, Informative)

      by tlhIngan ( 30335 ) <slashdot.worf@net> on Wednesday October 31, 2018 @06:26PM (#57571201)

      Malware been downloading crap to your computer disguised as JPG and ZIP for years, and now we've gone full circle and become the malware

      No, these are not merely renamed files, these are polyglot files - files that can be other files. But unlike say steganography, they aren't even hidden.

      So this guy created a JPEG image that is a valid JPEG image. But inside it he stuffed in a ZIP file that can be extracted using any ZIP utility as-is.

      The ability to combine two arbitrary files is relatively limited - ZIP is one of the few file formats that puts the important metadata at the end of the file (and most formats will ignore trailing junk if they encounter it) so you can use the ability of many file formats to create holes to put ZIP data into them (ZIP data is stored as offsets that need not be contiguous, so you can place ZIP data in holes created by the other format).

      • > The ability to combine two arbitrary files is relatively limited

        I disagree. Any file format that has a "comment" field (or other optional meta data field) can potentially be abused this way. And most non-trivial file formats have something similar to a comment field.

        The surprising thing is when sites that host these files -- whether Twitter, Imgur, etc -- don't re-process the images and drop the extra information.

        • by Anonymous Coward

          The surprising thing is when sites that host these files -- whether Twitter, Imgur, etc -- don't re-process the images and drop the extra information.

          I'm sure they will soon start to. Remember a few years back when you could extract EXIF tags from images? You rarely can today.

  • 0.01 BTC says Twitter uses the image resolution to determine if they mangle it. Which means you can likely embed a significant amount of data before it hits their max upload size.

For God's sake, stop researching for a while and begin to think!

Working...