Vulnerability allowed hackers to hijack active user sessions

Sep 30, 2015 02:17 GMT  ·  By
Microsoft patches its Exchange Server 2013 against information disclosure bug
2 photos
   Microsoft patches its Exchange Server 2013 against information disclosure bug

Microsoft Exchange Server has been recently patched to fix an important security vulnerability which would have allowed attackers to gain access to active Webmail sessions via an easy to exploit flaw.

The vulnerability was found in Outlook Web Access (OWA) in Microsoft Exchange Server 2013, and allows any attacker to force the Microsoft Exchange Server to dump debug data on the screen by accessing a maliciously crafted URL.

By sifting through the information shown on the screen, attackers would have been able to obtain previously inaccessible cookie session info.

This data could then be used to authenticate against the Exchange Server’s OWA service, and gain access to an active Webmail session.

This would then allow the attacker to exfiltrate sensitive and private information from a previously secure system.

According to the National Vulnerability Database entry, this vulnerability had a low complexity level and allowed any attacker with network access to the server to employ it in their hacking arsenal.

The vulnerability (CVE-2015-2505) has been fixed by Microsoft in MS15-103.

This is not the first time this month when a vulnerability has been fixed in one of Microsoft's Office server products. We previously reported on a XSS vulnerability found in SharePoint 2013, which allowed attackers to store attack vectors on a SharePoint server by entering malicious code in various unsanitized form fields.

Cookie information leaked in the debug screen
Cookie information leaked in the debug screen

Photo Gallery (2 Images)

Microsoft patches its Exchange Server 2013 against information disclosure bug
Cookie information leaked in the debug screen
Open gallery