Security Enhancements in Drone Harmony’s DJI Dock Integration
- Jeannine Stoll
- 1 day ago
- 2 min read
At Drone Harmony, we take the security of our systems and customers’ data seriously. That’s why we welcomed the opportunity to undergo a comprehensive penetration test of our DJI Dock implementation, conducted by the independent security testing firm MGM on behalf of Vattenfall, a national power grid provider.
No Critical Issues Found
First, the best news: no critical vulnerabilities were discovered. Among the 18 findings, the majority were of low or medium severity, with only six rated as high severity, and all of those have already been resolved.
Here’s a breakdown of the results:
0 critical findings
6 high-severity issues – resolved
6 additional issues – resolved
6 remaining low-severity issues – scheduled for resolution shortly
This outcome underscores the robustness of our current implementation, while also highlighting areas where we’ve now made targeted improvements.
Strengthening Password Security
Several findings revolved around password management. As a result, we’re implementing stricter password requirements across all Drone Harmony users, not just Dock users. In addition:
On-premise Dock customers can define and enforce their password policies.
Password rules will be strengthened globally to enhance user account security further.
Highlights from the Security Review
We coordinated closely with MGM on their findings and prioritized fixes based on severity and potential real-world impact. Here are a few notable areas of improvement:
1. Reflected Cross-Site Scripting (XSS)
A vulnerability could allow an attacker to inject JavaScript via a manipulated URL. This could have enabled session hijacking or user redirection to spoofed pages.
Fix: To prevent script execution, we’ve blocked the upload/download of HTML files and enforced stricter content header rules.
2. Session Token Exposure
Session tokens were previously exposed in cookies and URLs, which could increase the risk of session hijacking.
Fix: Session tokens are now handled securely and are no longer exposed via URLs.
3. Privilege Escalation
A vulnerability existed where a logged-in user might escalate their privileges and gain unauthorized access to other users’ data.
Fix: We’ve added robust server-side checks to ensure users can only access data they are authorized to see.
4. Arbitrary File Uploads
In some cases, file uploads didn’t verify file types, potentially allowing harmful files to be uploaded.
Fix: Both the web app and backend server now strictly validate uploaded file types.
5. MQTT Password Exposure
Previously, the web interface displayed the MQTT password in plain text.
Fix: Viewing the MQTT password now requires an additional login and is only accessible to administrators.
Ongoing Commitment
Security is not a one-time effort—it’s a continuous process. We’re grateful to MGM and Vattenfall for facilitating this important assessment and remain committed to making ongoing improvements to keep our systems secure.
We encourage you to contact us if you have any questions or feedback about our security measures.
Comments