Taking over Azure DevOps accounts with one click(blog.assetnote.io) |
Taking over Azure DevOps accounts with one click(blog.assetnote.io) |
I don’t know enough about dev.azure.com, but if they could do more than read info, like spin up VMs, then $3k is an insulting joke. Doubly so if there are credit cards attached to those accounts. The idea of someone spinning up resources on my Azure account gives me nightmares.
It’s also worth noting the combo here is really nasty because DNS takeover means you could send phishing emails from a legit sub domain.
What’s the damage to MS if someone nefarious had found that and launched a huge phishing campaign?
Having worked on authentication code across companies, this is really the typical kind of mistakes one sees. Nothing special to MS.
It's not even a simple stupid bug, like allowing open redirections. There was some checks on domain and an abandoned whitelisted domain that could be acquired by a new user.
Offering low bounties for something like this can act as an incentive for people who find something like this to sell it somewhere else.
A bug like this would be orders of magnitude more valuable in the wrong hands.
wondering how many hours did he put on this.
A lot of bug bounties have been getting paid out this way. I can't share the details, but we did it as a graph analytics demo with a financial partner bigger than many countries, and 30min later, tickets filed. IMO every sec team > 5 people should have something like this setup.
From: bob@project-cascade.visualstudio.com
SPF: pass
DKIM: pass
DMARC: none
“Hi it’s Bob from Project Cascade. We’re giving away Azure credits to anyone who used our trial in 2019 or earlier. Visit project-cascade.visualstudio.com/credits to check if you’re eligible.”
Click.
“Sorry, you’re not eligible.”
I’d fall for that :-(
Reply-to is a bug. But it might be a configuration fix, as opposed to code fix. But without knowing how it is implemented we cannot say.
And maybe more importantly the boundary between misconfiguration bugs and code bugs is irrelevant from an outsider's perspective.
How reply-to is implemented is irreverent, the result is identical.
"We found that we could exchange the stolen authentication token for a Bearer token through app.vsaex.visualstudio.com"
For me this exchange should always require an additional secret they should not have access to (exception would be for an app where securing the secret is not trivial, but not the case here I believe).Is that full stack overflow development where some one is copying and pasting things they don’t understand?
Measures like filtering/whitelisting are always pushed back in my experience because it's legitimately preventing developers to support authentication.
If you knew that Microsoft would pay you a couple thousand for this and the black market would offer hundreds of thousands of dollars. It could influence a decision to not report the vulnerability to the developer.