Discovering XSS Vulnerabilitie: My Journey into Microsoft’s Azure Infrastructure

xss0r
2 min readJun 14, 2024

--

The Beginning

On a quiet afternoon, as I sat at my desk pondering my next challenge, an idea sparked in my mind: why not delve into Microsoft’s Azure services? With countless businesses relying on these services, ensuring their security is crucial. Fueled by curiosity and a passion for cybersecurity, I embarked on a journey to explore potential vulnerabilities.

The Exploration

Navigating to AppSource

I began my adventure by navigating to the AppSource marketplace. The URL that piqued my interest was:

https://appsource.microsoft.com/en-in/marketplace/partner-dir

I decided to test the waters by entering various inputs into the search field, hoping to uncover any hidden vulnerabilities.

The First Clue: Reflected Input

As I input different values, I noticed something intriguing. The freetext parameter in the URL reflected the input without proper sanitization. This was a promising lead, hinting at the possibility of Cross-Site Scripting (XSS).

The Discovery

Uncovering the Vulnerability

To confirm my suspicion, I crafted a payload designed to test for XSS. With anticipation, I entered it into the search field and hit enter. The result was immediate and revealing: the payload executed successfully, confirming a Reflected XSS vulnerability. The vulnerable URL looked something like this:

https://appsource.microsoft.com/en-in/marketplace/partner-dir?filter=sort=0;pageSize=18;radius=100;freetext=xxxxx;suggestion=true;locationNotRequired=true

My excitement grew as I realized the potential impact of this discovery. The freetext parameter was indeed vulnerable, and the implications could be significant.

Digging Deeper: Session Token Exposure

Encouraged by my initial success, I decided to dig deeper. I revisited the URL and observed the behavior more closely. It wasn’t long before I uncovered another critical issue: the XSS vulnerability was exposing session tokens. Specifically, I was able to extract ai_user and ai_session tokens from the domain:

https://main.prod.marketplacepartnerdirectory.azure.com/

Example tokens:

ai_user=Kkwb5YDxwj/AiAdXz/oongL|2024-04-24T17:32:11.179Z
ai_session=jfxPPRBAGVeL3f8lv6kRF/|1714339281358|1714345534792

This revelation underscored the severity of the vulnerability. By exploiting this flaw, an attacker could potentially hijack user sessions and gain unauthorized access to sensitive information.

FULL URL:

https://appsource.microsoft.com/en-in/marketplace/partner-dir?filter=sort=0;pageSize=18;radius=100;freetext=%22%3E%3Cimg%20src%3Dx%20onerror%3Dprompt(%27document.domain%27)%3B%3E;suggestion=true;locationNotRequired=true

FULL VIDEO:

By addressing these issues promptly, Microsoft can enhance the security of its applications, protect its users, and maintain trust in its brand. For further clarity, I have attached images and videos illustrating the exploitation of these vulnerabilities. If you have any questions or require additional information, feel free to contact me on my Linkedin profile:

https://www.linkedin.com/in/ibrahim-husi%C4%87-101430102/

#xss0r #ibrahimXSS #@ibrahimxss0r #ibrahimxss0r #xsstool

--

--

xss0r
xss0r

Written by xss0r

Deploying an alert box in a web app is like having a tiny pop-up comedian shout 'Surprise!' whenever you least expect it! https://store.xss0r.com/

No responses yet