资讯

A bug left your Microsoft account wide open to complete takeover

字号+ 作者:87福利影视网 来源:行业动态 2024-09-23 10:31:27 我要评论(0)

Bug bounty hunter Sahad Nk recently uncovered a series of vulnerabilities that left Microsoft users&

Bug bounty hunter Sahad Nk recently uncovered a series of vulnerabilities that left Microsoft users’ accounts — from your Office documents to your Outlook emails — susceptible to hacking.

While working as a security researcher with cybersecurity site SafetyDetective, Nk discovered that he was able to take over the Microsoft subdomain, http://success.office.com, because it wasn’t properly configured. This allowed the bug hunter to set up an Azure web app that pointed to the domain’s CNAME record, which maps domain aliases and subdomains to the main domain. By doing this, Nk not only takes control of the subdomain, but also receives any and all data sent to it.

This is where the second major vulnerability comes into play.

Mashable Light SpeedWant more out-of-this world tech, space and science stories?Sign up for Mashable's weekly Light Speed newsletter.By signing up you agree to our Terms of Use and Privacy Policy.Thanks for signing up!
SEE ALSO:Microsoft’s redesigned Office icons showcase the future of the software suite

Microsoft Office, Outlook, Store, and Sway apps send authenticated login tokens to the http://success.office.comsubdomain. When a user logs in to Microsoft Live, login.live.com, the login token would leak over to the server controlled by Nk. He would then just have to send over an email to the user asking them to click a link, which would provide Nk with a valid session token — a way to log in to the user’s account without even needing their username or password. And, because Nk has access on Microsoft’s side, that link would come in the form of a login.live.com URL, bypassing phishing detection and even the savviest of internet users.

According to SafetyDetective, the issues were reported to Microsoft in June. They were fixed just last month, in November.


Featured Video For You
How to concoct (and remember!) an insanely secure password — Clarification Please

1.本站遵循行业规范,任何转载的稿件都会明确标注作者和来源;2.本站的原创文章,请转载时务必注明文章作者和来源,不尊重原创的行为我们将追究责任;3.作者投稿可能会经我们编辑修改或补充。

相关文章
  • 多措并举优治理  绘就幸福新图景

    多措并举优治理 绘就幸福新图景

    2024-09-23 10:21

  • 青岛银行业目标:争当小微企业的“双慧”银行

    青岛银行业目标:争当小微企业的“双慧”银行

    2024-09-23 09:05

  • 青岛联通联合部队深入田间地头宣传保护光缆干线

    青岛联通联合部队深入田间地头宣传保护光缆干线

    2024-09-23 09:02

  • 雅职院召开新型冠状病毒感染的肺炎疫情防控工作第二次领导小组会

    雅职院召开新型冠状病毒感染的肺炎疫情防控工作第二次领导小组会

    2024-09-23 08:06

网友点评