Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TwinH: A New Frontier in the Pursuit of Immortality?

How the Green Energy Transfer Will Increase Productivity in the UK

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft SharePoint Connector defects may have enabled qualifications on the entire power platform.
Identity

Microsoft SharePoint Connector defects may have enabled qualifications on the entire power platform.

userBy userFebruary 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

LingeringFebruary 4, 2025LingeringRavy LakshmananVulnerability / SharePoint

Microsoft SharePoint connector

Cyber ​​Security researchers disclose the details of the vulnerabilities that have been patched now, which affect Microsoft’s SharePoint connector, so that threat actors can harvest user qualifications and the subsequent attacks on the stage. can.

According to Zenity Labs, this is the form of an explosion that enables attackers to provide unauthorized access to sensitive data and send requests to SharePoint API on behalf of a phenomenal user. He said in a report shared with hacker news before publication. 。

“This vulnerability can be used through Power Automate, Power Apps, Copilot Studio, and Copilot 365, greatly expanding the potential damage.”

“Increasing the possibility that the attack will succeed, and the hacker can target multiple interconnected services within the power platform eco system.”

Cyber ​​security

Following the responsible disclosure in September 2024, Microsoft has worked on a security hole, which was evaluated for “important” significant evaluation as of December 13.

Microsoft Power Platform is a collection of low -code development tools that can be analyzed, processed, and promote data -driven productive applications.

The vulnerabilities are instances of server requests (SSRF) on the center of the “custom value” function in the SharePoint connector so that the attacker can insert its own URL as part of the flow. is.

However, in order for the attack to succeed, Rogue users need to play the role of environmental manufacturers and the basic user in Power Platform. This also means that you need to first access the target organization through other means and get these roles.

“Depending on the role of environmental manufacturers, you can create and share malicious resources such as apps and flows,” Zenity told Hacker News. “Depending on the role of the basic user, you can execute the app and interact with the resources owned by the power platform. If the attacker does not have these roles yet, you need to gain first.”

In the hypothetical attack scenario, threat actors may create a flow for SharePoint action, share it with modest users (read victims), and bring a leak in SharePoint JWT Access token.

Attackers armed with this captured token can send requests outside the power platform on behalf of users who have accessed access.

That’s not all. The vulnerability is even more for other services such as Power Apps and Copilot Studio by creating a seemingly good canvas application or user token and further escalating to the token of the user’s tokens. Can be expanded.

Cyber ​​security

“For example, by embedding a Canvas app on the Teams channel, you can further raise it,” says Zenity. “When the user interacts with the team’s app, the token can easily be harvested, the reach overall, and the attack can be further wider.”

“The main point is that, considering the extensive use of the SharePoint connector that contains many delicate corporate data, the interconnected properties of the power platform service can cause serious security risks. However, it is maintained in various environments.

In this development, binary security may have been abused to communicate with the metadata API endpoint, which may have been abused in detail the three SSRF vulnerabilities of Azure DevOps, which caused the attacker to the machine composition. You can now collect.

Did you find this article interesting? Follow on Twitter and Linkedin and read the exclusive content to post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleElon Musk tightens government grips and causes accusations of “coup” | Donald Trump News
Next Article Trump withdraws us from UN Rights Council and extends UNRWA funds: report | Donald Trump News
user
  • Website

Related Posts

TwinH: A New Frontier in the Pursuit of Immortality?

July 4, 2025

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

July 4, 2025

AI Agent may be leaking data – Watch this webinar and learn how to stop it

July 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TwinH: A New Frontier in the Pursuit of Immortality?

How the Green Energy Transfer Will Increase Productivity in the UK

Nighteagle apt exploits Microsoft Exchange flaws to target China’s military and technical sectors

Intestinal bacteria can cleanse the body of toxic PFAS chemicals

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.