Microsoft has patched a misconfiguration subject impacting the Azure Energetic Listing (AAD) id and entry administration service that uncovered a number of “high-impact” purposes to unauthorized entry.
“One in every of these apps is a content material administration system (CMS) that powers Bing.com and allowed us to not solely modify search outcomes, but additionally launch high-impact XSS assaults on Bing customers,” cloud safety agency Wiz stated in a report. “These assaults may compromise customers’ private information, together with Outlook emails and SharePoint paperwork.”
The problems have been reported to Microsoft in January and February 2022, following which the tech big utilized fixes and awarded Wiz a $40,000 bug bounty. Redmond stated it discovered no proof that the misconfigurations have been exploited within the wild.
The crux of the vulnerability stems from what’s referred to as “Shared Duty confusion,” whereby an Azure app could be incorrectly configured to permit customers from any Microsoft tenant, resulting in a possible case of unintended entry.
Curiously, a lot of Microsoft’s personal inside apps have been discovered to exhibit this conduct, thereby allowing exterior events to acquire learn and write to the affected purposes.
This consists of the Bing Trivia app, which the cybersecurity agency exploited to change search ends in Bing and even manipulate content material on the homepage as a part of an assault chain dubbed BingBang.
To make issues worse, the exploit may very well be weaponized to set off a cross-site scripting (XSS) assault on Bing.com and extract a sufferer’s Outlook emails, calendars, Groups messages, SharePoint paperwork, and OneDrive recordsdata.
“A malicious actor with the identical entry may’ve hijacked the most well-liked search outcomes with the identical payload and leak delicate information from tens of millions of customers,” Wiz researcher Hillai Ben-Sasson famous.
Different apps that have been discovered inclined to the misconfiguration subject embrace Magazine Information, Central Notification Service (CNS), Contact Heart, PoliCheck, Energy Automate Weblog, and COSMOS.
The event comes as enterprise penetration testing agency NetSPI revealed particulars of a cross-tenant vulnerability in Energy Platform connectors that may very well be abused to achieve entry to delicate information.
Following accountable disclosure in September 2022, the deserialization vulnerability was resolved by Microsoft in December 2022.
The analysis additionally follows the discharge of patches to remediate Tremendous FabriXss (CVE-2023-23383, CVSS rating: 8.2), a mirrored XSS vulnerability in Azure Service Cloth Explorer (SFX) that would result in unauthenticated distant code execution.