Microsoft SharePoint bug exposes credentials, sensitive data
Microsoft says it's investigating a security flaw in older versions of its SharePoint Server product that an independent researcher says can easily expose sensitive data and user authentication credentials.
"The vulnerability exists due to failure in the '/_layouts/help.aspx' script to properly sanitize user-supplied input in 'cid0' variable," the advisory states. "Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data."
An example of a URL that will target the vulnerability is: http://host/_layouts/help.aspx?cid0=MS.WSS.manifest.xml%00%3Cscript%3Ealert%28%27XSS%27%29%3C/script%3E&tid=X. High-Tech Bridge said they notified Microsoft of the bug on April 12, but only made the report public on Thursday.
A Microsoft spokeswoman said Thursday that researchers are in the process of drafting a security advisory that includes mitigation and workaround details. With 17 days notice, it's unclear why Redmond's security team didn't already have that information ready to go.
XSS bugs are by far the most common form of vulnerability plaguing the web. Web masters and software makers often downplay them as insignificant, because the severity of many of them is minimal. But as breaches like the one experienced by the heavily fortified Apache Foundation demonstrate, they have the potential to serve as the chink that compromises an otherwise secure defense.
On Thursday, a separate advisory on the Future Musings blog warned of an XSS vulnerability in the iPhone's Facebook app.
"I've removed some of the technical details until Facebook has a chance to address this," author Jon Wedell wrote. "Let's just say you may want to avoid viewing 'friend's' notes using the Facebook iPhone app for now." ®
Sponsored: Network DDoS protection