Microsoft Leaks Unique User Account Identifiers in Clear Text

Researcher finds that Outlook and OneDrive leak unique user account identifiers in clear text

Microsoft’s OneDrive and Outlook.com are leaking unique user identifiers in plain text. A developer who goes by the name ofย ย ramen-hero has said that both Outlook.com, OneDrive, and Microsoft’s account pages incorporate a unique user identifier known as CID in URLs. ย The CID is a 64-bit integer (usually formatted in unsigned hexadecimal form) ย associated with each Microsoft account and used in Microsoft APIs for user identification.

Ramen-hero has made a post on aptly named, Annoyed Microsoft User, detailing how Microsoft is leaking this CIDs in plain text to anyone who wants them.

Whatโ€™s the problem with this?ย  Well, it turns out that the CID can reveal quite aย bit about the account owner.ย  For example, if your accountโ€™s CID is 039827D56AE85E00 and Alice knows it, she could

  • download your account picture (and do evil things with it);
  • know your display name (and maybe real name) is โ€œJohnny Fellowsโ€ on OneDrive.com (and cyberstalk you and your family); and
  • know that you created this account on Decemberย 2, 2013 and that you still use it.

It used to be the case that OneDrive.com simply showed anyoneโ€™s profile picture and display name; now they have changed the user interface to make finding it out aย little bit harder.ย  (The old UI is still available, though.)

These are not the only pieces of information that can be revealed.ย  In fact, the settings of some legacy apps are publicly accessible; for example, if you let the Calendar app display weather forecasts, Alice will be able to learn the location and temperature unit of your choice.

Microsoft leaking the CID in clear text can allow malicious actors to connect the companyโ€™s services to users, to grab a person’s account picture, view the display name attached to their account, and access information on when the account was created. On top of that, because the settings of some legacy apps such as Calendar are publicly accessible, the potential hacker can also also know the user’s location.

According to another developer,ย vbezhenar, the CID is visible to eavesdroppers even if no DNS lookup is made. The CID, as part of the host name, is sent in clear text during TLS handshake in aย process known as Server Name Indication (SNI).

When you use anย HTTPS proxy server, the host names are visible to anyone who can access the web traffic log.ย  This may be the case, for example, at schools and libraries that use proxy servers to filter web content.

In addition, when you share aย file on OneDrive, you get aย URL that contains your CID.ย  (Files on OneDrive are identified by aย CID and aย sequence number.)ย  So before you share this URL with someone else, think twice.

And thereโ€™s more.ย  If you have linked your Microsoft account with your Skype account, anyone who knows your Microsoft accountโ€™s main alias can also obtain your CID using the People app.

Microsoft has not yet commented on the issue.

Read More

Suggested Post