• Home
  • News
    • Data Breaches
    • CyberCrime
    • Vulnerabilities
    • AI
    • Products Announcement
  • Leadership
    • Management
    • Compliance
    • Security Strategy
  • Reviews
    • Hi-tech Products
    • Enterprise Products
    • Deals
  • Home
  • News
    • Data Breaches
    • CyberCrime
    • Vulnerabilities
    • AI
    • Products Announcement
  • Leadership
    • Management
    • Compliance
    • Security Strategy
  • Reviews
    • Hi-tech Products
    • Enterprise Products
    • Deals

News

  • Home
  • News
    • Data Breaches
    • CyberCrime
    • Vulnerabilities
    • AI
    • Products Announcement
  • Leadership
    • Management
    • Compliance
    • Security Strategy
  • Reviews
    • Hi-tech Products
    • Enterprise Products
    • Deals
December 1,2023 9:39 AM
Follow us on:
Stay Informed and Secure
  • Home
  • News
    • Data Breaches
    • CyberCrime
    • Vulnerabilities
    • AI
    • Products Announcement
  • Leadership
    • Management
    • Compliance
    • Security Strategy
  • Reviews
    • Hi-tech Products
    • Enterprise Products
    • Deals
Search site...

Descope Security Team Uncovers “nOAuth” Flaw in Microsoft Azure AD OAuth Applications

June 21, 2023
Security Strategy, Vulnerabilities
  • The Descope security team has discovered a critical flaw, termed “nOAuth,” in Microsoft Azure AD OAuth applications, which allows attackers to take over accounts by exploiting mutable and unverified email claims.
  • In response to the vulnerability, Microsoft is collaborating with Descope to introduce new claims that will enable apps to verify domain-verified email addresses and prevent the exploitation of unverified email domains.

The Descope security team has recently uncovered a significant security vulnerability in Microsoft Azure AD OAuth applications, which they have dubbed “nOAuth”. This term has been coined to denote an authentication implementation flaw, with a touch of wordplay.

Credit: https://www.descope.com/blog/post/noauth

nOAuth is an authentication implementation flaw that primarily affects Microsoft Azure AD multi-tenant OAuth applications. According to the OAuth specification, users should be uniquely identified by the “sub” (subject) claim. However, it has been common practice to use the “email” claim as an identifier, despite it not being a standard practice.

In the case of Microsoft Azure AD, the email claim is both mutable and unverified, which poses a security risk. Mutable email claims mean that bad actors can modify the email attribute under “Contact Information” in Azure AD accounts, thereby controlling the “email” claim in the returned identity JWT (JSON Web Token).

This flaw essentially allows an attacker to create an Azure AD tenant, use “Log in with Microsoft” with a vulnerable app, and specially craft a “victim” user, effectively leading to a complete account takeover.

The Descope security team identified this flaw and communicated it to Microsoft. Previously, Microsoft’s documentation advised against using email addresses as unique identifiers but did not provide robust guidance. Since being informed of the issue, Microsoft has revamped its documentation to include more stringent guidelines and dedicated sections on claim verification.

In a collaborative effort with Descope, Microsoft is also taking measures to introduce two new claims that will help mitigate instances when nOAuth is exploited for cross-tenant spoofing. These features will empower apps to verify if an email claim contains a domain-verified email address and to redact email claims when the email domain is not verified.

Impacted Parties and Potential Risks:

The Descope security team reached out to several large applications that were vulnerable to the nOAuth tactic. Among them were a design application with millions of monthly users, a publicly-traded customer experience company, and a leading multi-cloud consulting provider.

account takeover authentication flaw Descope email claim identifier JWT Microsoft Azure AD nOAuth OAuth security
Share:
Bruce Scifiain Editor

Related posts

  • CISA Issues Urgent Warning on Critical Adobe ColdFusion Vulnerability Exploited in the Wild

  • Apple Issues Urgent Update to Fix Actively Exploited iOS Zero-Days

  • Bitwarden Password Manager Vulnerability Allows for Credential Theft via Malicious iFrames

  • Student Loan Servicers Expose Data of Over 2.5 Million Borrowers

  • Critical Exploitation Path Uncovered in Microsoft Azure Shared Key Authorization by Orca Security Researchers

  • Dole Food Company Confirms Employee Data Breach Following Ransomware Attack

Older Post Cybersixgill Breaks New Ground with Launch of AI-Driven Cyber Threat Intelligence Solution, Cybersixgill IQ
Newer Post Surge in Compromised ChatGPT Accounts

Categories

  • AI
  • Compliance
  • CyberCrime
  • Data Breaches
  • Deals
  • Enterprise Products
  • Hi-tech Products
  • Management
  • Products Announcement
  • Reviews
  • Security Strategy
  • Vulnerabilities

Recent News

  • AI Experiment in New Zealand Supermarket Goes Awry, Recommends Poisonous Recipes
  • AI Can Crack Your Password by Listening to Keyboard Clicks
  • AI Advancements Amplify Security Concerns as FBI Warns Tech Companies of Growing Hacker Threats
  • Apple Tackles New Zero-Day Exploits with Comprehensive Security Enhancements
  • Thales Dives Deeper into Cybersecurity with a $3.6 Billion Imperva Acquisition

ai (38) ChatGPT (15) Cybersecurity (59) data breach (76) data security (32) identity protection (38) identity theft (42) Management (28) personal information (18) Security Strategy (16)

. . .


Phish.News LLC
941 N Coleman #1417
Prosper, TX 75078
Email: contact@phish.news

COMPANY

  • About Phish.News
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • Affiliate Disclosure

News

  • AI
  • CyberCrime
  • Data Breaches
  • Vulnerabilities
  • Products Announcement

Leadership

  • Compliance
  • Management
  • Security Strategy

Reviews

  • Enterprise Products
  • Hi-tech Products
  • Deals

  • Facebook
  • Twitter

© 2023 Phish.News. All Rights Reserved