A real-world cloud breach case study where attackers exploited an exposed Spring Boot Actuator /configprops endpoint to discover a SharePoint service account username, then found plaintext Azure AD client secrets in a spreadsheet. Using the OAuth2 Resource Owner Password Credentials (ROPC) flow, they combined both pieces of

8m read timeFrom trendmicro.com
Post cover image
Table of contents
Phase 2: Plaintext secrets in a spreadsheetPhase 3: Authentication abuse – ROPC login

Sort: