Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

OneDrive File Picker Vulnerability Exposes Users’ Entire Cloud Storage to Websites

Posted on May 29, 2025May 29, 2025 By CWS

A important safety flaw in Microsoft’s OneDrive File Picker has uncovered hundreds of thousands of customers to unauthorized information entry, permitting third-party net functions to achieve full entry to customers’ complete OneDrive storage quite than simply chosen recordsdata. 

Safety researchers from Oasis Safety reported on Might 28, 2025, that this vulnerability stems from overly broad OAuth scopes and deceptive consent screens that fail to speak the extent of entry being granted clearly.

The OneDrive File Picker flaw impacts tons of of broadly used net functions, together with ChatGPT, Slack, Trello, and ClickUp, probably placing hundreds of thousands of customers in danger. 

OneDrive File Picker Vulnerability

The vulnerability arises from the picker’s implementation of inadequate OAuth scope granularity, which requests broad File Entry.Learn.All or Information.ReadWrite.All permissions even when customers intend to add or share a single file.

In contrast to rivals similar to Google Drive, which provides fine-grained OAuth scopes like drive.file to limit entry to app-created or user-selected recordsdata, Microsoft’s implementation grants unrestricted entry to all OneDrive content material. 

Dropbox employs an much more safe strategy with its Chooser SDK, utilizing a proprietary endpoint that avoids OAuth flows completely.

The consent dialog introduced to customers is especially problematic, because it doesn’t convey {that a} click on grants the integrator entry to each file and folder within the person’s OneDrive, not simply the doc they meant to share.

Insecure token storage practices throughout totally different variations of the OneDrive File Picker compound the safety dangers, reads the Oasis Safety report.

Older variations (6.0-7.2) used implicit authentication flows that uncovered delicate entry tokens in URL fragments or saved them insecurely in browser localStorage. 

The most recent model (8.0) requires builders to deal with authentication utilizing the Microsoft Authentication Library (MSAL), however nonetheless shops tokens in session storage in plain textual content.

MSAL’s Authorization Circulate implementation creates further vulnerabilities by probably issuing Refresh Tokens that reach entry durations past the everyday one-hour token expiration. 

These long-lived tokens, when cached in localStorage or backend databases with out encryption, create persistent assault vectors for malicious actors to entry complete OneDrive repositories.

The technical implementation requires builders to request permissions similar to MyFiles.Learn, Websites.Learn.All, or Information.ReadWrite.All by means of delegated permissions, however the lack of file-scoped permissions makes it not possible to restrict entry to particular paperwork.

Microsoft Response

Microsoft has acknowledged the safety report and indicated it “could take into account enhancements sooner or later,” although no particular timeline has been supplied. 

Safety specialists advocate rapid motion from each customers and organizations to mitigate dangers.

For particular person customers, specialists advise reviewing third-party app entry by means of Microsoft Account privateness settings and revoking pointless permissions. 

Organizations ought to implement admin consent insurance policies or conditional-access controls that block functions requesting something past Information.Learn permissions.

Internet utility builders are urged to keep away from requesting offline entry scopes that generate Refresh Tokens and to implement safe token storage practices. 

Moreover, safety groups ought to monitor Graph API and Cloud Entry Safety Dealer (CASB) logs for anomalous OneDrive entry patterns.

Attempt in-depth sandbox malware evaluation for your SOC workforce. Get ANY.RUN particular provide solely till Might 31 -> Attempt Right here

Cyber Security News Tags:Cloud, Entire, Exposes, File, OneDrive, Picker, Storage, Users, Vulnerability, Websites

Post navigation

Previous Post: Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations
Next Post: New Botnet Hijacks 9,000 ASUS Routers & Enables SSH Access by Injecting Public Key

Related Posts

Building a Cyber-Resilient Organization in 2025 Cyber Security News
New PathWiper Malware Attacking Critical Infrastructure To Deploy Administrative Tools Cyber Security News
UAT-638 Hackers Exploit Cityworks Zero-Day to Attack IIS Servers With VSHell Malware Cyber Security News
Guide to Cloud API Security Cyber Security News
CISOs Guide to Regulatory Compliance in Global Landscapes Cyber Security News
Microsoft Scripting Engine 0-Day Vulnerability Enables Remote Code Execution Over Network Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year
  • Beware of Fake AI Business Tools That Hides Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently
  • DragonForce Ransomware Claimed To Compromise Over 120 Victims in The Past Year
  • Beware of Fake AI Business Tools That Hides Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News