Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Office365 Autodiscover - Open Redirect

By kannthu

Medium
Vidoc logoVidoc Module
#redirect#office365#microsoft
Description

What is "Office365 Autodiscover - Open Redirect"?

The "Office365 Autodiscover - Open Redirect" module is designed to detect an open redirect vulnerability in Office365 Autodiscover. This vulnerability allows an attacker to redirect a user to a malicious site, potentially leading to the disclosure of sensitive information or unauthorized modification of data. The severity of this vulnerability is classified as medium.

This module was authored by dhiyaneshDk.

Impact

An open redirect vulnerability in Office365 Autodiscover can have serious consequences. By exploiting this vulnerability, an attacker can trick users into visiting malicious websites, leading to potential data breaches, phishing attacks, or the installation of malware on their devices. This can result in the compromise of sensitive information, unauthorized access to accounts, and other security risks.

How does the module work?

The "Office365 Autodiscover - Open Redirect" module sends a GET request to the "/autodiscover/autodiscover.json/v1.0/{randomText}@interact.sh?Protocol=Autodiscoverv1" endpoint. It then applies two matching conditions to determine if the vulnerability is present:

    - The module checks if the response header contains the word "autodiscover.interact.sh". - The module verifies if the response status code is 302 (Redirect).

If both conditions are met, the module reports the presence of the open redirect vulnerability in Office365 Autodiscover.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/autodiscover/autodi...
Matching conditions
word: autodiscover.interact.shand
status: 302
Passive global matcher
No matching conditions.
On match action
Report vulnerability