Data leakage continues to represent a serious problem for organizations, now it’s up to Microsoft that accidentally exposed a Dynamics 365 TLS certificate and private key for at least 100 days.
The software developer Matthias Gliwka discovered the issue while working with the cloud version of the Microsoft ERP system.
Microsoft started offering the ERP product last year, it is SaaS solution hosted in Azure and accessible through a comprehensive control panel (Life Cycle Services).
According to Gliwka, the TLS certificate was exposed in the Dynamics 365 sandbox environment that is used for user acceptance testing (also referred to as “sandbox”) .
The user acceptance system mirrors the setup of the production environment with a single exception, it offers administrative RDP access.
The expert accessed a sandbox environment via RDP to learn how Microsoft would set up a server hosting such a business critical application.
“The hostname for a sandbox environment is customername.sandbox.operations.dynamics.com. A quick glance at the certificates inside the built-in “Certificate Manager” revealed something shocking” wrote Gliwka on Medium.
The certificate is used encrypt the web traffic between the users and the server, extracting the certificate an attacker could s access to any sandbox environment.
https://twitter.com/cerebuild/status/915697858313154560
Böck tried filing a bug ticket with Mozilla’s bug tracker that triggered the Microsoft’s action.
The issue was solved on 5 December, months later it first notification on 17 August.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(Security Affairs – Dynamics 365 sandbox, Data Leakage)
[adrotate banner=”5″]
[adrotate banner=”13″]