Private businesses and public-sector organizations are unwittingly exposing millions of people's sensitive information to the public internet because they misconfigure Microsoft’s Power Pages website creation problem.
So says Aaron Costello, chief of SaaS security research at security-for- SaaS vendor AppOmni, who uncovered the issue in September.
In a post published Thursday, Costello details how he uncovered "significant amounts of data" – both internal org files and personal identifiable information (PII) – left out in the open for anyone to take a look at thanks to misconfigured access controls in websites built using Power Pages.
It's a big deal because more than 250 million users use Power Pages – a Microsoft website design service - each month.
"In one case, a large shared business service provider for the [UK National Health Service] NHS was leaking the information of over 1.1 million NHS employees, with large portions of the data including email addresses, telephone numbers, and even home addresses of the employees," he wrote.
That leak has been plugged and the employees' details are no longer exposed.
When asked about other organizations' leaking data, Costello declined to name names. "Several million records of sensitive data were found exposed to the public internet from authorized testing alone, and both private organizations and government entities are known to be affected, including those in technology, health, and finance," he told The Register.
"It's clear that organizations need to prioritize security when managing external-facing websites, and balance ease of use with security in SaaS platforms – these are the applications holding the bulk of confidential corporate data today, and attackers are targeting them as a way in to enterprise networks," Costello added.
Power Pages is a low-code, software-as-a-service platform that makes it easy for organizations to build external-facing websites on Microsoft infrastructure. The tool includes preconfigured role-based access controls and three out-of-the-box roles that may not be deleted or deactivated.
Two of these roles are especially important to exploit this security oversight: "anonymous users," which represents everyone who has not authenticated to the site, and "authenticated users" - anyone logged into the site.
The latter is relevant because many organizations allow anyone to register for an account on a website created using Power Pages. Those who register become an "authenticated user," with the elevated permissions that come with that role.
The problem is that many companies treat the "authenticated user" role as belonging to someone inside the organization and grant permissions accordingly – even for outsiders who register for their websites.
"This is of key significance … as organizations are far more likely to grant excessive permissions to a role that they believe is internal in nature," Costello wrote. In other words, Power Pages users who allow public registration, need to treat "authenticated users" just as if they were an "anonymous user" outside the organization.
Power Pages also uses a layered approach to access controls. If you think about its four layers as a pyramid, then the bottom – foundation level –is the site-level access controls, which control site authentication settings and determine which tables and columns in the database are accessible through the public web API. Any of those database resources marked as Web API accessible are at risk of being leaked to unauthorized viewers.
The next level up on the Power Pages management security pyramid is a Table Permissions section, and this is where the site administrator defines:
"Nearly all" of the data leaks that Costello said he's spotted are due to overly permissive table access control definitions. For instance, he's seen sites where public registration is enabled and the access type is set to "global access" – which, as the name the suggests, grants access to all rows within a table.
After the table permissions are determined, Power Pages applies any column access controls as another layer of security. This uses data masking to protect sensitive information and allows customers to obfuscate certain columns that match a regex pattern from users without the correct roles.
That arrangement could see an organization could use masking to prevent an unauthenticated user from seeing a column that stores people's home addresses.
However, setting up these masking rules is a complex, lengthy process. Because of this, many orgs simply skip it. "Throughout the entirety of my testing, not a single implementation of column-level security was present to prevent access to sensitive columns," Costello noted.
The primary types of misconfiguration noted by Costello were: Exposing too many or even all columns to the Web API; Allowing open registration and external authentication (that is, giving authenticated users elevated access when they may actually be anonymous); Granting global access for anonymous users; and not enabling column security.
He also provides a proof-of-concept (POC) of how these misconfigured access controls could be exploited to access sensitive information – but adds that a proxy tool such as Burp Suite is required to exploit Power Page’s problems.
Burp Suite sits between the user's browser and the website being probed, intercepting HTTP requests and allowing the user to modify them. In this case, it allowed Costello – posing as a would-be attacker – to capture and modify a request, identify exposed tables, and find columns containing sensitive data.
Microsoft does alert users via banners and other warnings when it detects potentially dangerous configurations, such as those exposing data to the public internet. Still, "the most effective way to resolve this issue in its entirety is to remove excessive levels of access to external users," Costello wrote.
The Register sought comment from Microsoft and had not received a response at the time of publication. ®
https://www.theregister.com//2024/11/15/microsoft_power_pages_misconfigurations/
Created by Tan KW | Nov 20, 2024
Created by Tan KW | Nov 20, 2024
Created by Tan KW | Nov 20, 2024
Created by Tan KW | Nov 20, 2024