Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Microsoft SharePoint Connector Link may allow you to enable Power Power Account credentials
Global Security

Microsoft SharePoint Connector Link may allow you to enable Power Power Account credentials

AdminBy AdminFebruary 4, 2025No Comments3 Mins Read
Microsoft SharePoint Connector
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


04 February 2025Red LakshmananVulnerability / SharePoint

Microsoft SharePoint Connector

Cybersecurity researchers have revealed details of the vulnerability affecting Microsoft affecting Microsoft Connector SharePoint upon Platform of Power This, if used successfully, can allow the threat to gather the user’s powers and subsequent next attacks.

This may manifest as actions after operation that allows the attacker to send requests to API SharePoint on behalf of the withdrawal user, allowing unauthorized access to sensitive data, the said.

“This vulnerability can be used via Power Automate, Power Apps, Copilot Studio and Copilot 365, which greatly expands the scale of potential damage,” said the senior security researcher Dmitry Lazava.

“This increases the likelihood of a successful attack, allowing hackers to focus on several interconnected services in the Power Platform ecosystem.”

Cybersecurity

Following the responsible disclosure of information in September 2024, Microsoft addressed the safety hole, assessed by an “important” assessment of the severity as of December 13.

Microsoft Power Platform is a low code development collection that allow users to promote analytics, automation of processes and applications caused by data.

Inherently vulnerability-is an instance of forgery of a request on the server (Ssrf) Following the use of the “custom value” function in the SharePoint connector that allows the attacker to insert your own URL -dashes as part of the flow.

However, in order for the attack to be successful, the user will need to have The role of the environmental manufacturer and The main role of the user On the Power Platform. It also means that they will need to first access the target organization in other ways and acquire these roles.

“With the role of the environmental manufacturer, they can create and share malicious resources such as applications and flows,” said Zenity The Hacker News. “The main role of the user allows them to launch applications and interact with the resources they possess on the Power Platform. If the attacker does not have these roles yet, they would need to get them first.”

In a hypothetical attack scenario, the threatening actor can create a sharePoint action stream and share it with a low -income user (read victim), which will leak their JWT SharePoint access marker.

Armed with this captured token, the attacker could send requests on the power platform on the username provided access.

That’s not all. The vulnerability can be extended further to other services such as Power Apps and Copilot Studio, creating a seemingly benign canvas app, or Copilot agent to collect the user marker and expand access to.

Cybersecurity

“You can take it even more by built, for example, into the team channel,” Zenity said. “Once the users interact with the team app, you can assemble your tokens just as easily, expanding its reach throughout the organization and making the attack even wider.”

“The main conclusion is that the interconnected nature of the power platform services can lead to serious safety risks, especially given the widespread use of the SharePoint connector, which houses many sensitive corporate data, and it may be difficult to provide proper access right in different conditions ”.

Development comes as binary security minute Three SSRF’s three vulnerabilities in Azure Devops that could be abused to chat with Final points of metadata APIIn doing so, allowing an attacker to get information about the machine’s configuration.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025

Google Chrome Zero-Day Cve-2025-2783 is operated by Taxoff to expand Trinper Backdoor

June 17, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.