Tech and Digital Media

Thursday, March 30, 2023

[New post] “Huge Microsoft exploit allowed users to manipulate Bing search results and access Outlook email accounts” by Jess Weatherbed

Site logo image jaydiaz2013 posted: " Microsoft has since patched the "BingBang" exploit and made changes to reduce similar vulnerabilities from occurring. | Illustration: Beatrice Sala A dangerous vulnerability was detected in Microsoft's Bing search engine earlier th" Technopreneurph

"Huge Microsoft exploit allowed users to manipulate Bing search results and access Outlook email accounts" by Jess Weatherbed

jaydiaz2013

Mar 30

A cartoon illustration shows a shadowy figure carrying off a red directory folder, which has a surprised-looking face on its side.
Microsoft has since patched the "BingBang" exploit and made changes to reduce similar vulnerabilities from occurring. | Illustration: Beatrice Sala

A dangerous vulnerability was detected in Microsoft's Bing search engine earlier this year that allowed users to alter search results and access other Bing users' private information from the likes of Teams, Outlook, and Office 365. Back in January, security researchers at Wiz discovered a misconfiguration in Azure — Microsoft's cloud computing platform — that compromised Bing, allowing any Azure user to access applications without authorization.

The vulnerability was detected in the Azure Active Directory (AAD) identity and access management service. Applications using the platform's multi-tenant permissions are accessible by any Azure user, requiring developers to validate which users can access their apps. This responsibility isn't always clear, making misconfigurations a common occurrence — Wiz claims 25 percent of all multi-tenant apps it scanned lacked proper validation.

I hacked into a @Bing CMS that allowed me to alter search results and take over millions of @Office365 accounts.
How did I do it? Well, it all started with a simple click in @Azure…
This is the story of #BingBang ⬇pic.twitter.com/9pydWvHhJs

— Hillai Ben-Sasson (@hillai) March 29, 2023

https://platform.twitter.com/widgets.js

One of these apps was Bing Trivia. Researchers were able to log in to the app using their own Azure accounts, where they discovered a content management system (CMS) that allowed them to control live search results on Bing.com. Wiz highlights that anyone who landed on the Bing Trivia app page could have potentially manipulated Bing's search results to launch misinformation or phishing campaigns.

An investigation into Bing's Work section also revealed that the exploit could be used to access other users' Office 365 data, exposing Outlook emails, calendars, Teams messages, SharePoint documents, and OneDrive files. Wiz demonstrated that it successfully used the vulnerability to read emails from a simulated victim's inbox. Over 1,000 apps and websites on Microsoft's cloud were discovered with similar misconfiguration exploits, including Mag News, Contact Center, PoliCheck, Power Automate Blog, and Cosmos.

"A potential attacker could have influenced Bing search results and compromised Microsoft 365 emails and data of millions of people," Ami Luttwak, Wiz's chief technology officer, said to The Wall Street Journal. "It could have been a nation-state trying to influence public opinion or a financially motivated hacker."

The exploit was patched on February 2nd, just days before Microsoft launched Bing's AI-powered Chat feature

The Bing vulnerability was reported to Microsoft's Security Response Center on January 31st. Microsoft fixed the problem on February 2nd, according to Luttwak (seen via The Wall Street Journal). Wiz later flagged the other vulnerable applications on February 25th and said Microsoft confirmed all reported issues had been fixed on March 20th. Microsoft also said that the company has made additional changes to reduce the risk of future misconfigurations.

Bing has been enjoying a surge in popularity of late, surpassing a milestone of 100 million daily active users earlier this month following the launch of its AI-powered Bing Chat feature on February 7th. Had the issue not been patched a few days prior, Bing's explosive growth could have pushed the dangerous, highly accessible security exploit more widely to millions of users — according to Similarweb, Bing is the 30th most visited website in the world.

In October last year, a similarly misconfigured Microsoft Azure endpoint resulted in the BlueBleed data breach that exposed the data of 150,000 companies across 123 countries. The latest vulnerability in Microsoft's cloud network is also being retroactively disclosed in the same week that the company is attempting to sell its new Microsoft Security Copilot cybersecurity solution to businesses.

Wiz said there isn't any evidence that the vulnerability had been exploited before it was patched. That said, Azure Active Directory logs won't necessarily provide details regarding previous activity, and Wiz claims that the issue could have been exploitable for years. Wiz recommends that organizations with Azure Active Directory applications check their application logs for any suspicious logins that would indicate a security breach.

source https://www.theverge.com/2023/3/30/23661426/microsoft-azure-bing-office365-security-exploit-search-results

Comment
Like
Tip icon image You can also reply to this email to leave a comment.

Unsubscribe to no longer receive posts from Technopreneurph.
Change your email settings at manage subscriptions.

Trouble clicking? Copy and paste this URL into your browser:
https://technopreneurph.wordpress.com/2023/03/30/huge-microsoft-exploit-allowed-users-to-manipulate-bing-search-results-and-access-outlook-email-accounts-by-jess-weatherbed/

WordPress.com and Jetpack Logos

Get the Jetpack app to use Reader anywhere, anytime

Follow your favorite sites, save posts to read later, and get real-time notifications for likes and comments.

Download Jetpack on Google Play Download Jetpack from the App Store
WordPress.com on Twitter WordPress.com on Facebook WordPress.com on Instagram WordPress.com on YouTube
WordPress.com Logo and Wordmark title=

Learn how to build your website with our video tutorials on YouTube.


Automattic, Inc. - 60 29th St. #343, San Francisco, CA 94110  

at March 30, 2023
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

[New post] ‘Everyone Is Freaking Out’: Disney Explores Sale of ABC Network and Stations Amid Financial Challenges

...

  • [New post] Asus is recruiting Android 12 beta testers for Zenfone 8
    Top Tech posted: " The Zenfone 8 announced in May with Android 11 already got a couple of Android 12 beta builds, but those...
  • [New post] Xiaomi’s Mi Smart Band 6 NFC is finally available in Europe officially
    Tech News For Today posted: "Xiaomi's Mi Smart Band 6 NFC is finally available in Europe officially At Xiaomi's bi...
  • [New post] ‘Everyone Is Freaking Out’: Disney Explores Sale of ABC Network and Stations Amid Financial Challenges
    ...

Search This Blog

  • Home

About Me

Tech and Digital Media
View my complete profile

Report Abuse

Labels

  • 【ANDROID STUDIO】navigation
  • 【FLUTTER ANDROID STUDIO and IOS】backdrop filter widget
  • 【GAMEMAKER】Scroll Text
  • 【PYTHON】split train test
  • 【Visual Studio Visual Csharp】Message Box
  • 【Visual Studio Visual VB net】Taskbar properties
  • 【Vuejs】add dynamic tab labels labels exceed automatic scrolling

Blog Archive

  • September 2023 (502)
  • August 2023 (987)
  • July 2023 (954)
  • June 2023 (1023)
  • May 2023 (1227)
  • April 2023 (1057)
  • March 2023 (985)
  • February 2023 (900)
  • January 2023 (1040)
  • December 2022 (1072)
  • November 2022 (1145)
  • October 2022 (1151)
  • September 2022 (1071)
  • August 2022 (1097)
  • July 2022 (1111)
  • June 2022 (1117)
  • May 2022 (979)
  • April 2022 (1013)
  • March 2022 (982)
  • February 2022 (776)
  • January 2022 (681)
  • December 2021 (1197)
  • November 2021 (3156)
  • October 2021 (3212)
  • September 2021 (3140)
  • August 2021 (3271)
  • July 2021 (3205)
  • June 2021 (2984)
  • May 2021 (732)
Powered by Blogger.