I seen a bizarre owa authentication conduct
What makes this conduct distinctive is that it passes the username and password by the Kind Submit, plus the Kind Submit incorporates the string “forcedownlevel”. Most OWA authentication I come throughout would not function this fashion.
Right here is an instance:
vacation spot=%s#authRedirect=true&flags=4&forcedownlevel=0&username=userApercents&password=***********%s&passwordText=&isUtf8=1
I’ve seemed on-line, a number of sources outlines that this could be a programmatic solution to authenticate with OWA, in different phrases, to authenticate through a command line or a script and bypass the login display. (references on the backside).
I seen the person that’s making an attempt to authenticate is utilizing safari agent.
Is that this simply part of safari (apple) being bizarre and genuine this fashion?
What do you assume? Thanks.
https://github.com/Ridter/cve-2020-0688/blob/grasp/cve-2020-0688.py
I’ve seemed on-line, a number of sources outlines that this could be a programmatic solution to authenticate with OWA, in different phrases, to authenticate through a command line or a script and bypass the login display.