ahahaha

Sep. 19th, 2025 08:42 am
lev: (Default)
[personal profile] lev
What Mollema discovered is that an API, Azure AD Graph API, did not check the tenant of an Actor token, meaning one could craft a token in their own test or low-privilege tenant and use it to impersonate an admin user in another unrelated tenant. Azure AD Graph is a legacy REST API that Microsoft introduced years ago for interacting programmatically with Azure Active Directory (Now Entra ID).

According to Mitiga, an Actor Token could be crafted using Tenant ID and netID values of target users, which can be accessed through guest accounts, leaked logs, or even brute force. The crafted (requested) Actor token, which Azure AD Graph does not scrutinize for source, could now be used to impersonate a Global administrator.

Profile

lev: (Default)
lev

April 2026

S M T W T F S
   12 34
56 78910 11
121314 151617 18
19 202122 232425
2627282930  

Style Credit

Expand Cut Tags

No cut tags
Page generated Apr. 28th, 2026 09:08 pm
Powered by Dreamwidth Studios