Details of the flaw
OAuth is a standard protocol that allows users to share data with other applications without having to enter their credentials every time. This particular flaw was in the way the Microsoft applications used OAuth to authenticate third-party applications.
“By doing nothing more than clicking or visiting a website, the victim can experience the theft of sensitive data, compromised production servers, lost data, manipulation of data, encryption of all the organization’s data with ransomware and more,” said Omer Tsarfati, researcher at CyberArk.
The attack
With some of Microsoft’s whitelisted URLs not a part of the previously registered Azure directory, attackers can take advantage by taking over these domains and registering them.
More details
This flaw has not been assigned a CVE because it was only in Microsoft’s Online Service. It was discovered on October 29 this year and a patch was made available on November 19.
“We resolved the issue with the applications mentioned in this report in November and customers remain protected,” a Microsoft spokesperson was reported to have told Threatpost.
Publisher