Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Lurking Shadow of Exploitable APIs: A Deep Dive into the Severe Security Flaws in Dynamics 365 and Power Apps Web API



Severe security flaws have been discovered in Dynamics 365 and Power Apps Web API. The vulnerabilities were identified by Stratus Security and have since been patched by Microsoft. We will delve deeper into the specifics of these vulnerabilities, exploring their root causes, consequences, and implications for organizations that utilize Dynamics 365 and Power Apps.


  • The Dynamics 365 and Power Apps Web API has been vulnerable to severe security flaws, highlighting the importance of constant vigilance.
  • Stratus Security discovered three vulnerabilities in the Power Platform's OData Web API Filter and FetchXML API.
  • The first vulnerability allows unauthorized access to sensitive information stored in the contacts table.
  • The second vulnerability enables attackers to bypass existing access controls and access restricted columns using an orderby query.
  • The third vulnerability uses the FetchXML API to exploit the contacts table, allowing for flexible attack methods.
  • Exploiting these vulnerabilities could lead to password hashes and emails being compiled and sold on the dark web.
  • Cybersecurity requires constant vigilance, especially for large companies holding sensitive information.



  • The cybersecurity landscape has long been marked by the ever-present specter of vulnerability, as threats lurk around every digital corner, waiting to pounce on unsuspecting users. In recent times, the revelation of severe security flaws in the Dynamics 365 and Power Apps Web API has sent shockwaves throughout the industry, highlighting the importance of constant vigilance in the face of an ever-evolving threat environment.

    In this article, we will delve into the specifics of these vulnerabilities, exploring their root causes, consequences, and implications for organizations that utilize Dynamics 365 and Power Apps. Our goal is to provide a comprehensive understanding of the risks at play and offer practical guidance on how to mitigate them.

    To begin, it is essential to understand the context in which these vulnerabilities were discovered. The Melbourne-based cybersecurity company Stratus Security was the first to identify the three now-patched security vulnerabilities in Dynamics 365 and Power Apps Web API. Their findings have been confirmed by Microsoft, which has subsequently released patches for the affected APIs.

    Two of the three identified vulnerabilities reside within the Power Platform's OData Web API Filter. The root cause of the first vulnerability lies in the lack of access control on this filter, thereby allowing unauthorized access to sensitive information stored in the contacts table. This vulnerability enables an attacker to perform a boolean-based search to extract complete hash values by sequentially guessing each character until the correct value is identified.

    The second vulnerability found within the Power Platform's OData Web API Filter utilizes the orderby clause to obtain data from specific database tables, such as EMailAddress1, which refers to the primary email address for contacts. This exploitation method allows an attacker to bypass existing access controls and access restricted columns using an orderby query.

    Furthermore, Stratus Security discovered a third vulnerability rooted in the FetchXML API, which enables attackers to exploit this API in conjunction with the contacts table to access restricted columns using an orderby query. Unlike the previous vulnerabilities, this method does not necessitate the orderby to be in descending order, adding a layer of flexibility to the attack.

    The consequences of these vulnerabilities are far-reaching and potentially devastating for organizations that utilize Dynamics 365 and Power Apps. An attacker able to exploit these flaws could compile a list of password hashes and emails before cracking passwords or selling the data on the dark web.

    "The discovery of vulnerabilities in the Dynamics 365 and Power Apps API underscores a critical reminder: cybersecurity requires constant vigilance, especially for large companies that hold so much data like Microsoft," Stratus Security stated in their initial report.

    As we move forward into 2025, it is clear that cybersecurity will play an increasingly crucial role in protecting sensitive information from falling prey to malicious actors. In this context, the patched vulnerabilities in Dynamics 365 and Power Apps Web API serve as a stark reminder of the importance of staying vigilant and proactive in our efforts to safeguard against emerging threats.

    In conclusion, the severe security flaws discovered in Dynamics 365 and Power Apps Web API highlight the need for organizations to prioritize cybersecurity vigilance. By understanding the root causes of these vulnerabilities and implementing practical measures to mitigate them, businesses can significantly reduce their exposure to potential threats.

    In the next section of this article, we will explore strategies for securing digital ecosystems and provide guidance on how to automate compliance in order to protect against similar threats in the future.



    Related Information:

  • https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html


  • Published: Thu Jan 2 08:09:53 2025 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us