VulnerabilitiesHIGH

Vulnerabilities in Spring Boot Actuator Enable SharePoint Exfiltration

TMTrend Micro Research
🎯

Basically, hackers found a security hole in a web app and stole login details to access sensitive data.

Quick Summary

A recent breach exploited misconfigured Spring Boot Actuator endpoints, leading to SharePoint data exfiltration. Attackers bypassed MFA using stolen credentials. Organizations must tighten security to prevent such incidents.

What Happened

In a recent cybersecurity incident, attackers exploited a misconfigured Spring Boot Actuator endpoint to gain unauthorized access to sensitive data stored in SharePoint. This breach did not involve sophisticated malware or zero-day exploits, but rather stemmed from poor security practices. The attackers discovered an exposed endpoint, harvested credentials from a leaked configuration file, and utilized the OAuth2 Resource Owner Password Credentials (ROPC) flow to authenticate without triggering multi-factor authentication (MFA).

The Spring Boot Actuator is a module that provides operational information about a running application. In this case, the /env endpoint was publicly accessible, revealing crucial configuration data. This incident serves as a stark reminder that many breaches originate from simple misconfigurations and inadequate credential management.

Who's Affected

The breach primarily affected an organization using SharePoint Online, where sensitive documents and data were stored. The attackers targeted a SharePoint service account, which was compromised due to exposed credentials. This incident highlights the risks associated with poor security hygiene, such as storing sensitive information in plaintext and exposing critical application endpoints.

Organizations relying on cloud services like SharePoint must ensure that their configurations are secure. The consequences of such breaches can be severe, leading to data loss, reputational damage, and regulatory scrutiny. Companies must recognize that their attack surface extends beyond traditional malware threats.

What Data Was Exposed

The attackers gained access to a SharePoint service account by exploiting the exposed Spring Boot Actuator endpoint and retrieving sensitive configuration details. Although the password was masked, the attackers could still identify the existence of a valid account and its associated credentials. Additionally, plaintext secrets stored in a spreadsheet provided the necessary authentication details to bypass MFA.

Using these stolen credentials, the attackers successfully accessed SharePoint resources, enumerated document libraries, and downloaded files. This incident underscores the dangers of storing sensitive information in insecure locations and the potential for significant data exfiltration when proper security measures are not in place.

What You Should Do

Organizations can take several immediate actions to mitigate similar risks. First, disable public access to Actuator endpoints by implementing IP allowlists and requiring valid authenticated users. It's crucial to restrict access to sensitive endpoints like /env and /configprops in production environments.

Second, audit your environment for plaintext credentials stored in insecure locations, such as spreadsheets and configuration files. Rotate any exposed credentials immediately to prevent unauthorized access. Lastly, consider disabling the ROPC authentication method if it is not necessary, prioritizing modern authentication flows that enforce stronger security controls. By addressing these vulnerabilities, organizations can significantly reduce their risk of similar incidents in the future.

🔒 Pro insight: This incident highlights the critical need for robust configuration management and the risks of legacy authentication methods in cloud environments.

Original article from

Trend Micro Research · Ryan Soliven

Read Full Article

Related Pings

HIGHVulnerabilities

Jenkins Vulnerabilities - Security Advisory Released

Jenkins has issued a security advisory for vulnerabilities in several software versions. Users must update Jenkins weekly, LTS, and LoadNinja Plugin to stay secure. Ignoring these updates could expose systems to serious risks.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Citrix Vulnerability - Security Update for XenServer 8.4

Citrix has released a security advisory for XenServer 8.4, addressing a critical vulnerability. Users must apply the security update to protect their systems from potential exploitation. Immediate action is crucial to safeguard sensitive data and ensure operational integrity.

Canadian Cyber Centre Alerts·
CRITICALVulnerabilities

Vulnerabilities - ConnectWise Patches Critical ScreenConnect Flaw

ConnectWise has patched a critical vulnerability in ScreenConnect. This flaw could allow unauthorized access to systems. Users must upgrade to version 26.1 to mitigate risks.

BleepingComputer·
HIGHVulnerabilities

Roundcube Vulnerabilities - Security Advisory Released

Roundcube has issued a security advisory for vulnerabilities in older Webmail versions. Users must update to versions 1.6.14 or 1.5.14 to protect their data. Ignoring this advisory could lead to serious security risks.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Atlassian Vulnerabilities - Security Advisory Released

Atlassian issued a security advisory for vulnerabilities in key products. Users of Bamboo, Bitbucket, Confluence, and Jira must update to protect against potential risks. Timely updates are essential for maintaining system security.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

VMware Vulnerabilities - Security Advisory Released

VMware has issued a security advisory for vulnerabilities in Tanzu products. Users are urged to apply updates to mitigate risks. Staying informed is crucial for security.

Canadian Cyber Centre Alerts·