Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Sunday, February 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Azure AD Credentials Exposed in Public App Settings File
Cyber Security

Azure AD Credentials Exposed in Public App Settings File

Team-CWDBy Team-CWDSeptember 11, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A cybersecurity assessment has uncovered a serious vulnerability involving Azure Active Directory (Azure AD).

Resecurity’s HUNTER Team discovered that application credentials, specifically the ClientId and ClientSecret, were left exposed in a publicly accessible appsettings.json file.

A Direct Path to Compromise

These credentials allow direct authentication against Microsoft’s OAuth 2.0 endpoints. In practice, this means an attacker could impersonate the trusted application and access sensitive Microsoft 365 resources.

Depending on the permissions granted to the compromised app, attackers might:

  • Retrieve files and emails from SharePoint, OneDrive or Exchange Online

  • Enumerate users, groups and directory roles in Azure AD

  • Abuse the Microsoft Graph API to escalate privileges or maintain persistence

  • Deploy malicious applications under the organization’s tenant

Because the file was publicly available, the credentials could be harvested by both automated bots and sophisticated adversaries.

Why Misconfigurations Lead to Leaks

The researchers attributed this issue to common cloud misconfigurations.

Developers often embed secrets directly into configuration files like appsettings.json. The risk emerges when these files are accidentally pushed into production environments without proper restrictions.

Problems typically stem from:

  • Misconfigured servers that expose static files

  • Poor deployment practices that don’t secure configuration data

  • Lack of secrets management tools like Azure Key Vault

  • Minimal security testing and code reviews

  • A reliance on obscurity instead of actual protection mechanisms

Read more on cloud misconfigurations: Understanding Cloud Misconfiguration: Causes, Corrections, and Prevention

In ASP.NET Core applications, appsettings.json is a central configuration file. It usually stores database connection strings, API keys and cloud service credentials. When Azure AD details, such as ClientId, TenantId and ClientSecret, are included, the file becomes a blueprint not just for how the application runs, but also for how attackers might break in.

Mitigation and Lessons Learned

Resecurity researchers warned that exposing secrets in this way is not a harmless oversight but a direct attack vector.

“Put simply, exposing appsettings.json with Azure AD secrets is not just a misconfiguration; it’s an attack vector that directly hands adversaries the keys to the cloud,” the team explained.

“This is not just a misconfiguration – it’s a cloud compromise waiting to happen. Organizations must realize that cloud security is only as strong as its weakest exposed file.”

Mitigation requires immediate action. Administrators are advised to restrict public access to configuration files, remove hardcoded secrets, rotate compromised credentials, enforce least-privilege access and monitor for abnormal credential use.

Image credit: jackpress / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous Article61% of US Companies Hit by Insider Data Breaches
Next Article Zscaler Customer Info Taken in Salesloft Breach
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Is it time for internet services to adopt identity verification?

January 14, 2026

How to help older family members avoid scams

October 31, 2025

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.