Salesforce Ghost Sites Expose Sensitive Corporate Data

  /     /     /  
Publicated : 23/11/2024   Category : security


Salesforce Ghost Sites Expose Sensitive Corporate Data


Some companies have moved on from using Salesforce. But without remembering to fully deactivate their clouds, Salesforce wont move on from them.



Salesforce customers are abandoning their sites without deactivating them, leaving sensitive corporate, vendor, and user data behind.
The problem occurs within what the service calls Communities, busy sites that allow partners, vendors, and customers to collaborate within a companys Salesforce environment. By their nature, Communities contain lots of potentially high-value business and personal information, which can be exposed
when administrators arent diligent enough
.
Sometimes, for example, companies will move from Salesforce to other providers, taking their domains with them. When they do that, though, many forget to erase what theyve left behind. Researchers from Varonis are calling these forgotten Communities ghost sites, in
a report published May 31
.
Ghost sites may be forgotten, but theyre not without their hidden treasures. Its the same website, the same Community, emphasizes Nitay Bachrach, security researcher for Varonis, but now that things have changed, its more problematic. All of [the unerased data] is available for anyone.
Every company wants a good, clean URL. For instance, a Salesforce customer called Acme might choose the custom domain partners.acme.org to point to its Community site at partners.acme.org/00d400.live.siteforce.com.
If Acme one day decides to leave Salesforce for another provider, it might choose to take partners.acme.org with them, modifying the DNS record to point to a new site hosted by, say, AWS. In this process, the researchers found, many companies stop at just modifying DNS records. They do not remove the custom domain in Salesforce, nor do they deactivate the site.
Put simply: While the URL has moved on, the site continues to exist, with all of the potentially sensitive communications, business records, and other business and personal information therein.
And it gets worse: Salesforce enables companies to automate the uploading of certain data streams that they may wish to share with partners and customers, using
sharing rules
.
Basically, you set up a rule — you set up conditions — and any data that meets these conditions are shared, explains Or Emanuel, Varonis director of research. And this still applies for ghost sites because, again, Salesforce doesnt know the difference. So the data, as long as it still meets the requirements, keeps [being sent out].
So whats the problem with this situation? No malicious actor could easily know the precise internal domain associated with a companys extant Salesforce site, after all. However, these sites can nonetheless be exploited.
The researchers pointed out that tools that index and archive DNS records — such as
SecurityTrails
and other similar tools — makes identifying ghost sites much easier.
Also, because ghost sites are still active in Salesforce, the siteforce domain still resolves, meaning its available under the right circumstances, according to the Varonis analysis. A straightforward GET request results in an error — but there is another way to gain access.
Specifically, attackers can simply change the host header: This would trick Salesforce into believing that the site was accessed as https://partners.acme.org/ and Salesforce would serve the site to the attacker.
Adding to the risk is the fact that old, obsolete sites are less maintained and therefore less secure, increasing the ease of an attack.
Bottom line? When a Salesforce site is no longer active or needed, companies
should always deactivate
.
If they dont, they leave not only their own data exposed, but also the data of the partners and users who have connected to their Community. And of course, partners and users dont have the same ability to account for and deactivate sites theyve merely connected to.
So its [also] a risk management sense, Bachrach says of the third-parties caught up in any potential mess.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Salesforce Ghost Sites Expose Sensitive Corporate Data