CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

CVE-2020-0696 - Microsoft Outlook Security Feature Bypass Vulnerability

Summary:

During an investigation of a malware campaign, I discovered that multiple emails were bypassing a specific email security system. Interestingly, there were no bypass techniques used. Instead, the flood of spear-phishing emails made the email security system allow some of the emails, at which point I began my research on Microsoft Outlook.

The issue in this case was that the specially crafted malicious link parsing on the security system was weak. This is not about detection bypass; it is more about the link parser of the email security systems that cannot identify the emails containing the link.

The below investigation was performed with trial accounts provided by multiple vendors and reported responsibly. The vulnerability identified, as well as the subsequent mitigation bypass, have been patched by Microsoft.

How are the email security systems bypassed with vulnerability on ''Microsoft Outlook for Mac''?

Improper hyperlink translation in ''Microsoft Outlook for Mac'' leads to the complete bypassing of email security systems and sending the malicious link to the victim as clickable.

Vulnerable vector: http://trustwave.com with hyperlinked file:///malciouslink

When we send the above vector with hyperlink file:///trustwave.com, the email is delivered on the victim's‘ Microsoft Outlook for Windows’ as file:///trustwave.com. The link file:///trustwave.com then translates to http://trustwave.com after clicking.

During this transmission from sender to receiver, the link file:///trustwave.com is not recognized by any email security systems and is delivered to the victim as a clickable link. The initial test was done on Microsoft M365 security feature "Safelink protection." Later, I checked this action on multiple email security systems, confirmed the issue, and reported responsibly.

As investigated, the crafting of the malicious link will work only on ''Microsoft Outlook for Mac,” and the victim is ''Microsoft Outlook for Windows”.

Since the email security systems detections are based on URL signatures, Sandbox detonation, reputation, and ML-based patterns, the crafted link file:///trustwave.com is not considered a link for analysis.

Steps to Reproduce:

  1. Craft a new email from ''Microsoft Outlook for Mac.”
  2. Type a URL http://legitimatelink
  3. Make it hyperlinked with file:///malciouslink
  4. Send
  5. The email was successfully bypassed and received by the end-user as clickable in ''Microsoft Outlook for Windows.”
  6. Click the link received; the hyperlink will be like file:///maliciouslink
  7. Once the victim clicks, the translation from file:/// to http:// will be handled by "Outlook for Windows" and opens the link.

Other vulnerable vectors after fuzzing are below

file:/maliciouslink

file:maliciouslink

\\maliciouslink

///maliciouslink

//maliciouslink

/maliciouslink

This vulnerability was patched as CVE-2020-0696 in February 2020.


Here is a quick video that demonstrates how the bypass operates:


DOC_18429_poc-video-of-cve-2020-0696

 

Bypass of CVE-2020-0696

As per the CVE-2020-0696 patch, links with URI schemes will alert as a warning popup; also ":/" characters are stripped when delivered to users. However, that patch did not fully fix the original issue and I later discovered a bypass around the fix.

With the new exploit vector "http:/://maliciouslink, "The patch will strip ":/ " "from the link and be delivered to the user as "http://maliciouslink," bypassing Microsoft ATP Safelink and other Email security products.

Once the victim clicks, the link will be converted automatically to http://maliciouslink and open. This vulnerability can be exploited on both Windows and macOS Outlook clients.

Steps to Reproduce:

  1. Craft a new email (From "Outlook for Mac"")
  2. Type an URL http://legitimatelink
  3. Make it hyperlinked with ""http:/://maliciouslink""
  4. Send
  5. The email successfully bypasses and is delivered to the end-user as clickable in ''Microsoft Outlook for Windows”

This secondary bypass method was fixed by Microsoft during the summer of 2021, and the new update makes the URL accessible or proxied through Safelinks.

Latest SpiderLabs Blogs

The Secret Cipher: Modern Data Loss Prevention Solutions

This is Part 7 in my ongoing project to cover 30 cybersecurity topics in 30 weekly blog posts. The full series can be found here. Far too many organizations place Data Loss Prevention (DLP) and Data...

Read More

CVE-2024-3400: PAN-OS Command Injection Vulnerability in GlobalProtect Gateway

Overview A command injection vulnerability has been discovered in the GlobalProtect feature within Palo Alto Networks PAN-OS software for specific versions that have distinct feature configurations...

Read More

CNAPP, CSPM, CIEM, CWPP – Oh My!

We all know the cybersecurity industry loves its acronyms, but just because this fact is widely known doesn’t mean everyone knows the story behind the alphabet soup groups of letters, we must deal...

Read More