Document Title: =============== Microsoft Office 365 Outlook - Persistent Vulnerability References (Source): ==================== http://www.vulnerability-lab.com/get_content.php?id=811 Microsoft Security Response Center (MSRC) ID: 14095 Release Date: ============= 2014-02-28 Vulnerability Laboratory ID (VL-ID): ==================================== 811 Common Vulnerability Scoring System: ==================================== 4.3 Vulnerability Class: ==================== Cross Site Scripting - Persistent Current Estimated Price: ======================== 1.000€ - 2.000€ Product & Service Introduction: =============================== Office 365 primarily denotes a set of subscription based software services that require monthly or periodic payment of fees to Microsoft Corporation. By contrast, Office 20XX generally refers to a suite of desktop applications that alone by themselves are not subscription based and do not carry monthly fees. Although Office 365 also often refers to cloud-based services rather than desktop applications, certain Office 365 subscription plans include a subscription to Office 20XX desktop applications in addition to cloud-based services. The subscription to Office 20XX desktop applications, by virtue of the subscription, makes the subscription part of an Office 365 offering. Office 365 was initially announced in the autumn of 2010, and was made available to the public on June 28, 2011. The initial subscription plans included a Professional plan (for organizations of 25 and smaller) and an Enterprise plan (for organizations with more individuals). Microsoft also offers a Dedicated and ITAR subscription model for large companies. The Office 365 Dedicated offering isolates servers to be used for only a single customer while ITAR (AKA Federal) offers a higher level of security (individual background checks and extremely-limited access to sensitive parts of the system by knowledge workers) that complies with the ITAR standard. Depending on the subscription plan, Office 365 can include a subscription to Office 20XX desktop applications, in addition to hosted versions of Microsoft`s Server products (including Exchange Server, SharePoint Server, and Lync Server) that are delivered and accessed over the Internet, in effect, the next version of Business Productivity Online Suite (BPOS). In December 2011, Microsoft launched Trust Center and announced that Office 365 now complies with EU privacy regulations. (Copy of the Homepage: http://en.wikipedia.org/wiki/Microsoft_Office_365) Abstract Advisory Information: ============================== The Vulnerability Laboratory Research Team discovered a filter bypass issue and persistent input validation vulnerability in the official Microsoft (cloud-based) Outlook Office 365 web-application. Vulnerability Disclosure Timeline: ================================== 2013-02-02: Researcher Notification & Coordination (Benjamin Kunz Mejri) 2013-02-06: Vendor Notification (Microsoft Security Response Team - MSRC) 2013-02-07: Vendor Response/Feedback (Microsoft Security Response Team - MSRC) 2014-02-23: Vendor Fix/Patch (Microsoft Developer Team by Check) 2014-02-28: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Microsoft Corp. Product: Office 365 (cloud-based) Exploitation Technique: ======================= Remote Severity Level: =============== Medium Authentication Type: ==================== Restricted Authentication (Guest Privileges) User Interaction: ================= Low User Interaction Disclosure Type: ================ Independent Security Research Technical Details & Description: ================================ A persistent input validation web vulnerability has been discovered in the official Microsoft (cloud-based) Outlook Office 365 web-application. The vulnerability allows remote attackers to inject own malicious script codes on the application-side (persistent) of the vulnerable module. The bug is located in the `Send Message` section when processing to request via the `Editor` module the connected vulnerable url - link application insert function via POST method. Remote attackers can inject own malicious links with a splitted request to bypass the encoding and validation of the outlook cloud formular. The second effect is the url block filter get evaded by processing to request the public message in office 365. Exploitation of the vulnerability requires low user interaction with a low privileged application user account. The vulnerability can be exploited in all outlook cloud to office 365 available editors via reply, forward & direct message. The execution of the persistent injected script code after the filter bypass occurs in the mail messages & mail item preview list context. Second execution occurs when processing to answer, forward or reply to a prepared malicious email in the link mouseover label information. The security risk of the filter bypass and persistent input validation web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 4.3. Successful exploitation of the vulnerability result in session hijacking, persistent outlook mail phishing, persistent external redirects by mail malicious context on mouseovers and persistent manipulation of affected or connected module context. Vulnerable Section(s): [+] Microsoft Corp - Office 365 (cloud-based) Application - Outlook (Cloud) Vulnerable Module(s): [+] Message Editor Vulnerable Parameter(s): [+] URL - Link Affected Module(s): [+] Message Editor (Local) [+] Message Listings (Remote) Affected Module(s): [+] URL Block Filter Bypass - Mail Listing & Preview [+] Edit Outlook Mail - mouseover - link Proof of Concept (PoC): ======================= The Vulnerability can be exploited by remote and local attackers with low required user interaction and with low privileged application user account. For demonstration or reproduce ... Review: Message Editor - URL - Link
<[PERSISTENT INJECTED SCRIPT CODE!])<">sadasdasd <[PERSISTENT INJECTED SCRIPT CODE!]) <">