A researcher discovered that a database connected to the mobile version of Microsoft’s careers website was not properly configured, potentially allowing malicious actors to abuse it for various purposes.
According to Chris Vickery, a researcher who over the past months discovered hundreds of millions of records exposed online due to misconfigured databases, unauthenticated attackers could have accessed and modified the content of a MongoDB database maintained by mobile web development firm Punchkick Interactive for Microsoft’s careers site (m.careersatmicrosoft.com).
Vickery, who recently joined MacKeeper, found that the database contained the details of some Microsoft employees, including their name, email address, password hash and token.
Another problem was that since the database was not write-protected, an attacker could have inserted arbitrary HTML code. This could have been exploited to host a phishing page or to launch watering hole attacks against the site’s visitors.
The vulnerability was reported to Punchkick on February 5 and it was resolved within an hour, Vickery said. The web development firm told the expert that the misconfigured database is a separate service that is “consumed” by the mobile version of Microsoft’s careers website.
Contacted by SecurityWeek, Microsoft said it was made aware of the issue, and confirmed that it was addressed. However, Vickery believes the database was left unprotected for at least a few weeks.
“The lesson to learn here is that if you’re a big name player like Microsoft, it’s acceptable for third-parties to handle mundane operations like job posting webpages. But be aware that a hole in the third-party’s security can quickly become a hole in your security,” the researcher noted in a blog post.
Last month, Vickery warned that hackers can abuse misconfigured enterprise printers for storage. The expert’s analysis focused on HP printers, which are accessible over port 9100 and provide an anonymous FTP server to malicious actors.