what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Microsoft Skype For Business DNS Query

Microsoft Skype For Business DNS Query
Posted Dec 6, 2019
Authored by Alphan Yavas

Microsoft Skype for Business latest versions affected from external service interaction (DNS) vulnerability. A remote attacker could force the vulnerable server to send DNS request to any remote server attacker wants.

tags | exploit, remote
SHA-256 | 31dcf21797598a1609a11a0a94cb747057677e0445801e5894f06e082761eb09

Microsoft Skype For Business DNS Query

Change Mirror Download
I. VULNERABILITY
-------------------------
Microsoft Skype for Business External Service Interaction (DNS)
Latest Version

II. CVE REFERENCE
-------------------------
Not Assigned Yet

III. VENDOR
-------------------------
https://www.microsoft.com

IV. TIMELINE
-------------------------
28/11/2019 Vulnerability discovered
03/12/2019 Vendor contacted
04/12/2019 Microsoft replay that “We determined that this behavior is
considered to be by design.”

V. CREDIT
-------------------------
Alphan Yavas from Biznet Bilisim A.S.

VI. DESCRIPTION
-------------------------
Microsoft Skype for Business latest versions affected from external
service interaction(DNS) vulnerability. A remote attacker could force
the vulnerable server to send DNS request to any remote server
attacker wants.

VII. PROOF OF CONCEPT
-------------------------
Affected Component:
Path(inurl): /Dialin/Conference.aspx
Parameter: Username

Login page of Skype for Business affected from external service
interaction (DNS) vulnerability. If username is being sent with
following format victim server will send out DNS queries to xxx
domain. (xxx is the domain which you want to send request from
server)

username: ssrf.xxx.com\pentest
password: (doesn't matter)

Reference: https://portswigger.net/kb/issues/00300200_external-service-interaction-dns
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close