Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Misconfigured Database Exposed Microsoft Site to Attacks

A researcher discovered that a database connected to the mobile version of Microsoft’s careers website was not properly configured, potentially allowing malicious actors to abuse it for various purposes.

A researcher discovered that a database connected to the mobile version of Microsoft’s careers website was not properly configured, potentially allowing malicious actors to abuse it for various purposes.

According to Chris Vickery, a researcher who over the past months discovered hundreds of millions of records exposed online due to misconfigured databases, unauthenticated attackers could have accessed and modified the content of a MongoDB database maintained by mobile web development firm Punchkick Interactive for Microsoft’s careers site (m.careersatmicrosoft.com).

Vickery, who recently joined MacKeeper, found that the database contained the details of some Microsoft employees, including their name, email address, password hash and token.

Another problem was that since the database was not write-protected, an attacker could have inserted arbitrary HTML code. This could have been exploited to host a phishing page or to launch watering hole attacks against the site’s visitors.

The vulnerability was reported to Punchkick on February 5 and it was resolved within an hour, Vickery said. The web development firm told the expert that the misconfigured database is a separate service that is “consumed” by the mobile version of Microsoft’s careers website.

Contacted by SecurityWeek, Microsoft said it was made aware of the issue, and confirmed that it was addressed. However, Vickery believes the database was left unprotected for at least a few weeks.

“The lesson to learn here is that if you’re a big name player like Microsoft, it’s acceptable for third-parties to handle mundane operations like job posting webpages. But be aware that a hole in the third-party’s security can quickly become a hole in your security,” the researcher noted in a blog post.

Last month, Vickery warned that hackers can abuse misconfigured enterprise printers for storage. The expert’s analysis focused on HP printers, which are accessible over port 9100 and provide an anonymous FTP server to malicious actors.

Advertisement. Scroll to continue reading.

Related: Leaky Databases Expose 25 Million Accounts

Related: Second Database Exposing Voter Records Found Online

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Tabitha Craig has been named the CISO of the Congressional Budget Office (CBO).

Life360 has appointed Vari Bindra, former Amazon cybersecurity lead, as Chief Information Security Officer.

Forcepoint has appointed Guy Shamilov as CISO, Bakshi Kohli as CTO and Naveen Palavalli as CPO and CMO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.