Sep. 19th, 2025

ahahaha

Sep. 19th, 2025 08:42 am
lev: (Default)
What Mollema discovered is that an API, Azure AD Graph API, did not check the tenant of an Actor token, meaning one could craft a token in their own test or low-privilege tenant and use it to impersonate an admin user in another unrelated tenant. Azure AD Graph is a legacy REST API that Microsoft introduced years ago for interacting programmatically with Azure Active Directory (Now Entra ID).

According to Mitiga, an Actor Token could be crafted using Tenant ID and netID values of target users, which can be accessed through guest accounts, leaked logs, or even brute force. The crafted (requested) Actor token, which Azure AD Graph does not scrutinize for source, could now be used to impersonate a Global administrator.

Profile

lev: (Default)
lev

December 2025

S M T W T F S
 12 3456
7 8910 111213
1415 16 17 18 1920
21 2223 2425 2627
28293031   

Page Summary

Style Credit

Expand Cut Tags

No cut tags
Page generated Dec. 28th, 2025 05:11 pm
Powered by Dreamwidth Studios