A safety researcher recognized a extreme XSS vulnerability affecting the Microsoft Groups software program. Exploiting the bug merely required an adversary to ship a maliciously crafted sticker through the app.
Microsoft Groups Vulnerability
Sharing the small print in a weblog submit, safety researcher Numan Turle acknowledged how he found an XSS vulnerability in Microsoft Groups.
As elaborated, the researcher discovered this bug whereas inspecting Microsoft Groups for a doable safety flaw. The researcher primarily targeted on how the Groups function permitting sending and receiving stickers labored.
Particularly, Turle observed that Groups converts the sticker to a picture whereas sending it as a RichText/Html message. After sending the sticker, the researcher noticed that tapping on it displayed the alt attribute in a popup on the backside. That’s the place the researcher meddled by including sure characters which have been interpreted by the app.
Whereas Microsoft carried out a CSP to forestall XSS assaults, the researcher observed a CSP fault that allowed HTML injection assaults. Utilizing Google’s CSP Evaluator instrument, the researcher noticed how the “script-src
” discipline was marked as unsafe within the script, permitting HTML injection towards a number of domains. The researcher may then additional analyze the app and discover an outdated angular-jquery model (1.5.14). This discovery enabled the researcher to bypass the CSP and set off the XSS flaw following the person interplay.
Microsoft Patched The Bug
After discovering the vulnerability, the researcher reached out to Microsoft officers through their bug bounty program. The researcher disclosed the bug to the MSRC workforce in January 2022, in response to which Microsoft began engaged on a repair.
Ultimately, the tech large patched the vulnerability and acknowledged the researcher’s effort with a $6000 bounty because the reward.
So now, it signifies that Microsoft Groups customers don’t have to fret about potential exploitation through this bug. Nonetheless, customers should guarantee working the newest app variations on their gadgets to make sure receiving the patch.
Tell us your ideas within the feedback.