Menu
Microsoft investigates SharePoint 2007 zero day

Microsoft investigates SharePoint 2007 zero day

Proof-of-concept code was released two weeks after Microsoft was notified of the flaw

Microsoft is scrambling to fix a bug in its SharePoint 2007 groupware after a Swiss firm abruptly released code that could be used in an attack.

The proof-of-concept code was released Wednesday, just over two weeks after security consultancy High-Tech Bridge says it disclosed the issue to Microsoft on April 12.

Although Microsoft hasn't said much about the seriousness of the bug, security experts worry that hackers could exploit the flaw in order to steal sensitive corporate information used by SharePoint customers, who use the software for building Web portals and collaborating on internal projects.

High-Tech Bridge discovered what is known as a cross-site scripting flaw in SharePoint. If the attacker can get a SharePoint user to click on a link, the bug lets the attacker essentially take control of the user's account.

"With a little bit of insider knowledge you can send a link to a SharePoint user, and if you can cross-site script them, you can do data exfiltration on whatever their account has access to," said Jeremiah Grossman, chief technology officer with Web security consultancy WhiteHat Security.

"Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data," High-Tech Bridge said in a note posted with its code. The company could not be reached immediately for comment.

Even if attackers could take control of a user's account, they might still have a hard time getting data outside of the corporate network, said Thierry Zoller, a principal security consultant with Verizon Business. "It is currently unclear whether there are means to exfiltrate documents over this attack vector," he said via instant message.

Microsoft has reproduced the bug on its internal systems and is now working on a security advisory that will include more information on the bug and what customers can do to secure their systems, said Jerry Bryant, a Microsoft security program manager in an e-mail message.

Two weeks isn't much time to fix a big, especially one that was disclosed the day before Microsoft's monthly security updates, but High-Tech Bridge says that it automatically discloses vulnerability details two weeks after notifying the vendor.

The company could not be immediately reached for comment.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.​

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments