A company called Secureworks discovered a case of privilege escalation associated with a Microsoft EntraID
(formerly Azure Active Directory application by taking advantage of an abandoned reply URL.
An attacker could leverage this abandoned URL to redirect authorization codes to themselves, exchanging the ill-gotten authorization codes for access tokens.
The threat actor could then call Power Platform API via a middle-tier service and obtain elevated privileges.
Following responsible disclosure on April 5, 2023, the issue was addressed by Microsoft via an update released a day later.
Secureworks has also made available an open-source tool that other organizations can use to scan for abandoned reply URLs.
Cybersecurity researchers have discovered a case of privilege escalations associated with an abandoned connection to a Microsoft ActiveDirectory application.
๐ Feeling the vibes?
Keep the good energy going by checking out my Amazon affiliate link for some cool finds! ๐๏ธ
If not, consider contributing to my caffeine supply at Buy Me a Coffee โ๏ธ.
Your clicks = cosmic support for more awesome content! ๐๐
Leave a Reply