Azure OAuth 2.0 Vulnerability Grabs Tokens

  /     /     /  
Publicated : 23/11/2024   Category : security


Azure OAuth 2.0 Vulnerability Grabs Tokens


Security firm CyberArk is now finally able to discuss a major OAuth 2.0 vulnerability that affects Microsoft Azure web services.



Omer Tsarfati and his team at security firm CyberArk are now
finally able to discuss
a major OAuth 2.0 vulnerability that affects Microsoft Azure web services which they have been sitting on since October, according to their timeline.
To appreciate the problem, its needed to step back a bit and consider how OAuth functions in the first place.
OAuth is a protocol used for authorization. End users can grant websites or applications access to their information from other websites without having to give the requesting website access to app secrets or passwords. It is widely used by many companies because it works fairly well in most situations.
A permanent refresh token is used in the protocol to validate identification and obtain an access token.
But, as CyberArk puts it, The protocol itself is well built and secured, but a wrong implementation or inappropriate usage and configuration can have a colossal impact.
Certain of Microsofts OAuth2.0 applications (including Portfolios, O365 Secure Score and Microsoft Service Trust) will give unquestioning trust to the white-listed domains and sub-domains they use. These domains can be registered by anyone (including an attacker) and Microsoft does not maintain a central registry of them. The apps trust can be misapplied to a false but yet trusted domain. Use of these apps is mandated in the Microsoft Accounts approved applications portal.
To make things even more difficult for the security response to this vulnerability, these apps are allowed to ask for an access_token. This token functions in the protocol as a session identifier, and is needed to actually implement an action on behalf of the user.
The combination of these two factors being active at the same time meets the requirements needed to enable an action with the users permissions -- including gaining access to Azure resources, AD resources and more.
This means that a user encountering a specially-crafted link could initiate an OAuth workflow in Azure that ends up grabbing the users access tokens which then allows other data to be compromised, especially if the token is functionally a privileged credential.
CyberArk recommends some mitigation steps that can be done along with the fix that Microsoft has issued, according to CyberArk, on 11/19/2019. They are:
Make sure that all the trusted redirect URIs configured in the application are under your ownership.

Remove unnecessary redirect URIs.
Make sure the permissions that the OAuth application asks for are the least privileged one it needs.
Disable non-used applications.
This situation points how how security in the cloud may take unexpected turns. Vulnerabilities can arise from a myriad of sources when they are combined together in one project, and an approach that can get to the needed granularity of individual elements used in the resultant can greatly aid in the detection of malicious outcomes.
— Larry Loeb has written for many of the last centurys major dead tree computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Azure OAuth 2.0 Vulnerability Grabs Tokens