Microsoft has patched a misconfiguration subject impacting the Azure Lively Listing (AAD) identification and entry administration service that uncovered a number of “high-impact” purposes to unauthorized entry.
“One in every of these apps is a content material administration system (CMS) that powers Bing.com and allowed us to not solely modify search outcomes, but in addition launch high-impact XSS assaults on Bing customers,” cloud safety agency Wiz mentioned in a report. “These assaults might compromise customers’ private knowledge, together with Outlook emails and SharePoint paperwork.”
The problems have been reported to Microsoft in January and February 2022, following which the tech large utilized fixes and awarded Wiz a $40,000 bug bounty. Redmond mentioned it discovered no proof that the misconfigurations have been exploited within the wild.
The crux of the vulnerability stems from what’s referred to as “Shared Duty confusion,” whereby an Azure app might be incorrectly configured to permit customers from any Microsoft tenant, resulting in a possible case of unintended entry.
Curiously, a variety of Microsoft’s personal inner apps have been discovered to exhibit this conduct, thereby allowing exterior events to acquire learn and write to the affected purposes.
This consists of the Bing Trivia app, which the cybersecurity agency exploited to change search leads to Bing and even manipulate content material on the homepage as a part of an assault chain dubbed BingBang.
To make issues worse, the exploit may very well be weaponized to set off a cross-site scripting (XSS) assault on Bing.com and extract a sufferer’s Outlook emails, calendars, Groups messages, SharePoint paperwork, and OneDrive recordsdata.
“A malicious actor with the identical entry might’ve hijacked the preferred search outcomes with the identical payload and leak delicate knowledge from thousands and thousands of customers,” Wiz researcher Hillai Ben-Sasson famous.
Different apps that have been discovered vulnerable to the misconfiguration subject embrace Magazine Information, Central Notification Service (CNS), Contact Middle, PoliCheck, Energy Automate Weblog, and COSMOS.
Change into an Incident Response Professional!
Unlock the secrets and techniques to bulletproof incident response – Grasp the 6-Section course of with Asaf Perlman, Cynet’s IR Chief!
The event comes as enterprise penetration testing agency NetSPI revealed particulars of a cross-tenant vulnerability in Energy Platform connectors that may very well be abused to achieve entry to delicate knowledge.
Following accountable disclosure in September 2022, the deserialization vulnerability was resolved by Microsoft in December 2022.
The analysis additionally follows the discharge of patches to remediate Tremendous FabriXss (CVE-2023-23383, CVSS rating: 8.2), a mirrored XSS vulnerability in Azure Service Cloth Explorer (SFX) that might result in unauthenticated distant code execution.