A real-world cloud breach case study where attackers exploited an exposed Spring Boot Actuator /configprops endpoint to discover a SharePoint service account username, then found plaintext Azure AD client secrets in a spreadsheet. Using the OAuth2 Resource Owner Password Credentials (ROPC) flow, they combined both pieces of
Table of contents
Phase 2: Plaintext secrets in a spreadsheetPhase 3: Authentication abuse – ROPC loginSort: