Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File

Posted on May 28, 2025May 28, 2025 By CWS

Might 28, 2025Ravie LakshmananData Privateness / Vulnerability
Cybersecurity researchers have found a safety flaw in Microsoft’s OneDrive File Picker that, if efficiently exploited, may enable web sites to entry a person’s total cloud storage content material, versus simply the recordsdata chosen for add by way of the device.
“This stems from overly broad OAuth scopes and deceptive consent screens that fail to obviously clarify the extent of entry being granted,” the Oasis Analysis Group stated in a report shared with The Hacker Information. “This flaw may have extreme penalties, together with buyer information leakage and violation of compliance rules.”

It is assessed that a number of apps are affected, similar to ChatGPT, Slack, Trello, and ClickUp, given their integration with Microsoft’s cloud service.
The issue, Oasis stated, is the results of extreme permissions requested by the OneDrive File Picker, which seeks learn entry to the whole drive, even in circumstances solely a single file is uploaded as a result of absence of fine-grained OAuth scopes for OneDrive.
Compounding issues additional, the consent immediate customers are offered with previous to a file add is imprecise and doesn’t adequately convey the extent of entry being granted, thereby exposing customers to sudden safety dangers.

“The dearth of fine-grained scopes makes it unimaginable for customers to differentiate between malicious apps that focus on all recordsdata and legit apps that ask for extreme permissions just because there isn’t any different safe possibility,” Oasis famous.

The New York-based safety firm additional identified that the OAuth tokens used to authorize entry are sometimes saved insecurely, including they’re saved within the browser’s session storage in plaintext format.
One other potential pitfall is that the authorization workflows may additionally contain issuing a refresh token, granting the appliance ongoing entry to person information by permitting it to get new entry tokens with out having to ask the person to log in once more when the present token expires.

Following accountable disclosure, Microsoft has acknowledged the issue, though there isn’t any repair as but. Within the interim, it is value contemplating quickly eradicating the choice to add recordsdata utilizing OneDrive by means of OAuth till a safe various is in place. Alternately, it is suggested to keep away from utilizing refresh tokens and retailer entry tokens in a safe method and eliminate them when not wanted.
The Hacker Information has reached out to Microsoft for additional remark, and we’ll replace the story if we hear again.
“The dearth of fine-grained OAuth scopes mixed with Microsoft’s imprecise person immediate is a harmful mixture that places each private and enterprise customers in danger,” Oasis stated. “This discovery reinforces the significance of steady vigilance in OAuth scope administration, common safety assessments, and proactive monitoring to guard person information.”

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Access, Apps, Cloud, File, Flaw, Full, Grants, Microsoft, OneDrive, Picker, Uploading

Post navigation

Previous Post: Hackers Exploit SimpleHelp RMM Tool to Deploy DragonForce Ransomware
Next Post: WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack

Related Posts

Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks The Hacker News
Key Findings from the Blue Report 2025 The Hacker News
1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub The Hacker News
New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries The Hacker News
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack The Hacker News
Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • MuddyWater Using New Malware Toolkit to Deliver Phoenix Backdoor Malware to International Organizations
  • Critical Windows Server WSUS Vulnerability Exploited in the Wild 
  • APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign
  • Hackers Target Perplexity Comet Browser Users
  • North Korean Hackers Aim at European Drone Companies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • MuddyWater Using New Malware Toolkit to Deliver Phoenix Backdoor Malware to International Organizations
  • Critical Windows Server WSUS Vulnerability Exploited in the Wild 
  • APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign
  • Hackers Target Perplexity Comet Browser Users
  • North Korean Hackers Aim at European Drone Companies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News