Issue 81: Vulnerabilities in Microsoft Teams 👥, Auth0, smart home hubs

The Latest API Security News, Vulnerabilities and Best Practices
Issue: #81
Vulnerabilities in Microsoft Teams, Auth0, smart home hubs

This week, we check out how Microsoft Teams could be breached with a single GIF image sent in a chat, and Auth0 by changing the case of a single character.

In other news, a report on security issues in smart home hubs has been published, and a new online training on OAuth2.0 and OpenID Connect is available.

Vulnerability: Microsoft Teams
 

Researchers from CyberArk found a serious vulnerability in Microsoft Teams that the vendor promptly fixed.

The attack vector was how Teams handled authentication to image resources and then allowed expansion to full API access. Here’s how the scenario went in a nutshell:

  1. Researches were able to take over two abandoned subdomains of teams.microsoft.com.
  2. The researchers used the subdomains to host a simple GIF file that they could then send to a target user. Just the victim seeing the GIF was enough to return an authentication cookie to the attackers.
  3. The researches then made an API call to exchange that cookie to an authentication token for the Teams APIs.
  4. With full API access, the researchers could scrape the victim’s chat history for messages and information. They could also use the APIs to spread the attack with messages to the victim’s colleagues.

Now, since this attack did not require any interaction from the user, it could be scaled up easily without it being in anyway obvious. A co-worker suddenly spamming a GIF to everyone could raise suspicions quickly. However, a single GIF sent to a Teams group would provide the attacker authentication tokens of several users with no one batting an eye.

This is a brilliant illustration of the dangers of wildcards in URLs, token exchange, and the power that APIs can give to attackers once they get past authentication.

Vulnerability: Auth0
 

JSON Web Tokens (JWT) is the prevalent format of authentication tokens in modern APIs. One of the common attack vectors on JWT is forging a token and then setting the signature algorithm in the token header to alg:none. This makes poor JWT implementations blindly trust such a token and do not verify its signature. For more details on the JWT standard and JWT attack vectors, see this AppSec California session recording.

Modern tools and frameworks typically include out-of-the-box protection against this attack. However, Ben Knight found a flaw in how this protection was implemented in Auth0.

Auth0’s check for alg:none was case-sensitive. Thus attackers could go around it simply by sending alg:nonE instead. This tiny change was enough to get the check to pass and disable the signature verification, in turn allowing attackers to forge tokens.

Luckily, Auth0 has since fixed the issue. Lessons learned:

  • Case-sensitive checks are dangerous
  • Blacklisting (when you test for what should not happen) is more error-prone than whitelisting (when you only let through what is expecting)
Vulnerability: Fibaro, eQ‑3, and Elko smart home hubs
 

Researchers from ESET have disclosed API (and other) flaws in Fibaro Home Center Lite, Homematic Central Control Unit (CCU2), and eLAN-RF-003 smart home hubs that they found.

The list of vulnerabilities includes such classics as:

  • Unencrypted HTTP calls
  • Unsecured APIs
  • Injections in URL parameters

These cases are not exactly new: they were found and reported to vendors 2 years ago. However, the details were responsibly only published now to protect the users of unpatched models.

Online training: Getting Started with OAuth and OpenID Connect
 

More opportunities to learn new things online: Curity has published a free online course, “Getting Started with OAuth and OpenID Connect“.

The course topics include:

  1. Introduction to OAuth
  2. OAuth vs OpenID Connect
  3. Tokens and APIs
  4. Server to Server Communication with OAuth
  5. Design tokens for your APIs
  6. Dynamic Clients and Metadata
  7. OAuth for Mobile Applications
  8. OAuth for Single Page Applications

Each lesson takes about 30 minutes, so they do not make a huge dent to your day, and you can slot them in when it bests suits you.

 
dmitry_apisec-1  

Dmitry Sotnikov

APIsecurity.io

 
Thanks for reading.

That's it for today. If you have any feedback or stories to share, simply reply to this email.

Please forward the newsletter to your friends and colleagues who might benefit from it.

 
42Crunch Ltd   71-75 Shelton Street  Covent Garden  London  Greater London   WC2H 9JQ   United Kingdom
You received this email because you are subscribed to API Security News from 42Crunch Ltd.

Update your to choose the types of emails you receive or   
 
 

Older messages

Issue 80: API vulnerabilities IBM DRM and Cisco USC ☎️

Thursday, April 23, 2020

Hi, this week, we look at API vulnerabilities in IBM and Cisco products, and upcoming APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #80 API vulnerabilities IBM

Issue 79: 1.4 million doctor records scraped using API 👩‍⚕️

Thursday, April 16, 2020

Hi, this week we look at recent vulns at GitLab and findadoctor.com, conference talk APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #79 1.4 million doctor

Issue 78: Vulnerabilities in WordPress Rank Math, Tapplock, and TicTocTrack ⌚

Thursday, April 9, 2020

Hi, this week we look into details of 3 API vulnerabilities and SAST for composite OAS APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #78 Vulnerabilities in

You Might Also Like

Ranked | Visualizing Major Asset Class Returns in 2024 📈

Wednesday, January 8, 2025

From bitcoin to the US dollar, asset class returns in 2024 were stellar, in a year marked by elevated rates and a robust US economy. View Online | Subscribe | Download Our App FEATURED STORY

Spyglass Dispatch: Meta Miscues

Wednesday, January 8, 2025

Meta's Social AI Content • Anthropic at $60B • Bluesky at $700M • Dick Wolf's 30 Minute Show • NVIDIA's CPU Aspirations The Spyglass Dispatch is a newsletter sent on weekdays featuring

Top Tech Deals 💰 Anker Power Station, GoPro, 8BitDo Controller, and More!

Wednesday, January 8, 2025

Upgrade your life with a new power station, Wi-Fi 7 router, or AirTags at a big discount. How-To Geek Logo January 8, 2025 Top Tech Deals: Anker Power Station, GoPro Hero, 8BitDo Controller, and More!

Is Claude.ai worth $60 billion? 🎩

Wednesday, January 8, 2025

+ AI will mow my lawn ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

Post from Syncfusion Blogs on 01/08/2025

Wednesday, January 8, 2025

New blogs from Syncfusion Effortlessly Manage Large File Uploads with Blazor File Manager By Keerthana Rajendran This blog explains the new chunk upload feature added in the Blazor File Manger

⚙️ Waymo's big moment

Wednesday, January 8, 2025

The road to AGI ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

The best AI tech of CES 2025

Wednesday, January 8, 2025

✨ A Linux desktop for AI devs; OTC CGMs; Big Delta upgrades -- ZDNET ZDNET Tech Today - US January 8, 2025 Robotics and AI tech at CES 2025 shown on a universe colorful background. The best robotics

[Guide] AWS Security Essentials in Two Steps

Wednesday, January 8, 2025

Download the quick guide and take control of your AWS security now! The Hacker News The best AWS environments benefit from layered security and smart automation. Securing AWS environments is crucial

FCC Launches 'Cyber Trust Mark' for IoT Devices to Certify Security Compliance

Wednesday, January 8, 2025

THN Daily Updates Newsletter cover Generative AI, Cybersecurity, and Ethics ($88.00 Value) FREE for a Limited Time Equips readers with the skills and insights necessary to succeed in the rapidly

The Sequence Engineering #464: OpenAI’s Relatively Unknown Agent Framework

Wednesday, January 8, 2025

OpenAI Swarm provides the key building blocks for implementing agents. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏