Advisory Details

August 30th, 2023

Microsoft Teams Pluginhost Prototype Pollution Privilege Escalation Vulnerability

ZDI-23-1282
ZDI-CAN-21201

CVE ID
CVSS SCORE 7.5, AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Microsoft
AFFECTED PRODUCTS Teams
VULNERABILITY DETAILS

This vulnerability allows remote attackers to escalate privileges on affected installations of Microsoft Teams. An attacker must first obtain the ability to execute script within the application window in order to exploit this vulnerability.

The specific flaw exists within the Pluginhost window. The issue results from the lack of control over modifications to attributes of object prototypes. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.

ADDITIONAL DETAILS Microsoft has issued an update to correct this vulnerability. More details can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance/researcher-acknowledgments-online-services
DISCLOSURE TIMELINE
  • 2023-05-19 - Vulnerability reported to vendor
  • 2023-08-30 - Coordinated public release of advisory
CREDIT Li Jiantao (@CurseRed), Ngo Wei Lin (@Creastery), Pan Zhenpeng (@Peterpan980927), Poh Jia Hao (@Chocologicall) of STAR Labs SG Pte. Ltd.
BACK TO ADVISORIES